Showing 16 open source projects for "malware-patch"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Nonprofit Budgeting Software Icon
    Nonprofit Budgeting Software

    Martus Solutions provides seamless budgeting, reporting, and forecasting tools that integrate with accounting systems for real-time financial insights

    Martus' collaborative and easy-to-use budgeting and reporting platform will save you hundreds of hours each year. It's designed to make the entire budgeting process easier and create unlimited financial transparency.
    Learn More
  • 1
    FinalCrypt

    FinalCrypt

    FinalCrypt - Unbreakable One-Time Pad Encryption

    Why FinalCrypt? 1. Most people choose Disk-Encryption as it's easier to unlock a whole drive, but Big-Brother or Malware can then also read all your files. Only use File-Encryption! 2. Most software uses recently broken AES encryption. 3. Soon The Shor's algorithm will instantly break all assymmetric encryption with Quantum Computers. 4. FinalCrypt uses Symmetric One Time Pad Encryption, which is the most unbreakable encryption there is. 5.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Abdal 2-Key Triple DES Builder

    Abdal 2-Key Triple DES Builder

    encrypt / decrypt all your texts with Two-Key Triple DES

    If you need more security to send your messages, we introduce the new tool of Abdal security team called Abdal 2-Key Triple DES Builder. This tool can actually encrypt all your texts that are to be sent as a message between you and any person. Two-Key Triple DES is used to encrypt these messages. This algorithm performs 3 cryptographic processes on each block of information to reduce the penetration rate. The Abdal 2-Key Triple DES Builder tool has four modes for encrypting your data.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    JChecksum

    JChecksum

    MD5 Checksum Tool

    This tool checks the integrity of files. It is very important if you don’t want your computer to get infected with viruses and malware. Sometimes, hackers and malicious software developers modify the contents of a downloadable zip, which can even result in granting them remote access to your system. While downloading various software, you might have noticed that developers usually provide hash values (MD5) of their files. This tool enables you to verify the file integrity of the downloaded content. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Skillfully - The future of skills based hiring Icon
    Skillfully - The future of skills based hiring

    Realistic Workplace Simulations that Show Applicant Skills in Action

    Skillfully transforms hiring through AI-powered skill simulations that show you how candidates actually perform before you hire them. Our platform helps companies cut through AI-generated resumes and rehearsed interviews by validating real capabilities in action. Through dynamic job specific simulations and skill-based assessments, companies like Bloomberg and McKinsey have cut screening time by 50% while dramatically improving hire quality.
    Learn More
  • 5
    WebLocker

    WebLocker

    Ad-Blocker ,Anti-Porn, Anti-DNS Leak, Web Blocker, Connectivity Fixer

    WebLocker is a free software that allows you to block annoying ads, block domains known to spread malware, block adult websites (Pornography), block social networks, block online gambling, stop DNS leaking and more features. Available for Windows: XP, 7, 8, 8.1 and 10. We hope you enjoy using WebLocker! TheYousSoft Team
    Downloads: 10 This Week
    Last Update:
    See Project
  • 6

    GoodCrypto private server

    Secure mail + Tor gateway

    ... * Protects email metadata and resists traffic analysis * Automatic encryption, decryption, and key management * All private keys stay on *your* server * Users don't change their email or browser software * Blocks web malware * Runs on your private server * Completely decentralized
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    Crypto

    A powerful data encrypting tool.Encrypt data inside files.

    Crypto encrypts data inside any file.Not only the data is encrypted but also hidden.You can choose any type of file and hide your valuable data inside it.But the host file's size does not increase.So none can notice that you have Gigabytes of secret data inside a tiny 10kb text file.Try it now.Totally free.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Python3 GnuPGInterface (GPG)

    Python3 GPG aka GnuPG Interface

    Python3 port of Frank Tobin's Python GnuPGInterface incorporating the --keyring and --secret-keyring patch. "Python GnuPGInterface is meant to be a filehandle-concentrating Python interface to GnuPG, the GNU Privacy Guard. It has an API similar to the Perl module GnuPG::Interface" and identical to the Python2 module GnuPGInterface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Anoubis is a Security Suite which implements a secured environment for applications. The core of the suite is an Application Firewall alongside with a Sandbox. Mechanisms to assure the authenticity of files, directories and applications are provided.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Create and run cloud-based virtual machines. Icon
    Create and run cloud-based virtual machines.

    Secure and customizable compute service that lets you create and run virtual machines.

    Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
    Try for free
  • 10
    Migale eraser is a software permitting to erase safely any file or folder from your hard drive so that no recovery will be possible, even when using forensic tools.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Firecat package project aims to group a list of auditing extensions for Firefox based on FireCat project : http://www.security-database.com/toolswatch/+-FireCAT-+.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Software repository of the hack://src project. Includes security related software for crypto, vulnerability/patch notification & management, and ultra low level system access for stealth forensics & intrusion detection or malware removal.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    *Unofficial* patch for DALnet's ircd, currently for version 1.4.36. Provides complete IPv6 and IPv4-in-IPv6 support and SSL support.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    SPipe (Secure Pipe) is a patch of mod_ssl package which allows the same corporate web server to be used as a secure access door to internal servers that do not use HTTPS protocol, while also retaining normal web server functionality for all HTTP requests
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    How to set up a Linux system to use encryption in disk and network accesses. This document describes how you can use the International Kernel Patch and other packages to make harddisk contents and network traffic inaccessible to others by encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Air Raid Siren is multi-platform software designed to keep users safe on wireless networks when they log onto the Internet. This easy to use software protects against common attacks, like man-in-the-middle and packet sniffing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next