Showing 36 open source projects for "obfuscation"

View related business solutions
  • Tigerpaw One | Business Automation Software for SMBs Icon
    Tigerpaw One | Business Automation Software for SMBs

    Fed up with not having the time, money and resources to grow your business?

    The only software you need to increase cash flow, optimize resource utilization, and take control of your assets and inventory.
  • Cloudflare secures and ensures the reliability of your external-facing resources such as websites, APIs, and applications. Icon
    It protects your internal resources such as behind-the-firewall applications, teams, and devices.
  • 1
    Obfuscar

    Obfuscar

    Open source obfuscation tool for .NET assemblies

    Obfuscar is an open-source .NET obfuscator released under MIT license. It provides basic obfuscation features that help secure secrets in a .NET assembly. An obfuscation tool designed for most .NET developers. Hide everything private, while keep everything public. You can achieve such simply via default settings. Hide class/method/property/event names that you don't want to expose. This is irreversible. String contents can be compressed so that end users won't easily learn them. However...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 2
    Sliver

    Sliver

    Adversary Emulation Framework

    Sliver is an open source cross-platform adversary emulation/red team framework, it can be used by organizations of all sizes to perform security testing. Sliver's implants support C2 over Mutual TLS (mTLS), WireGuard, HTTP(S), and DNS and are dynamically compiled with per-binary asymmetric encryption keys. The server and client support MacOS, Windows, and Linux. Implants are supported on MacOS, Windows, and Linux (and possibly every Golang compiler target but we've not tested them all).
    Downloads: 18 This Week
    Last Update:
    See Project
  • 3
    Optimus id transformation

    Optimus id transformation

    Id obfuscation based on Knuth's multiplicative hashing method for PHP

    With this library, you can transform your internal IDs to obfuscated integers based on Knuth's integer hash. It is similar to Hashids but will generate integers instead of random strings. It is also super fast. If you will be running your code on a 32-bit system or will be working with large prime numbers it is suggested that you install the GMP extension.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Logbook

    Logbook

    An extensible Java library for HTTP request and response logging

    Logbook is an extensible Java library to enable complete request and response logging for different client- and server-side technologies. It satisfies a special need by a) allowing web application developers to log any HTTP traffic that an application receives or sends b) in a way that makes it easy to persist and analyze it later. This can be useful for traditional log analysis, meeting audit requirements or investigating individual historic traffic issues. Logbook is ready to use out of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • The next chapter in business mental wellness Icon
    The next chapter in business mental wellness

    Entrust your employee well-being to Calmerry's nationwide network of licensed mental health professionals.

    Calmerry is beneficial for businesses of all sizes, particularly those in high-stress industries, organizations with remote teams, and HR departments seeking to improve employee well-being and productivity
  • 5
    ME.com

    ME.com

    Mathematical & engineering components for software development

    Mathematical & engineering components (abbreviation ME . com) for development of the software are the comprehensive collection of original fastest algorithms for scientific computing. Not based on any known software library. Used in AtteStat, StatAnt, Criterial projects and another with rights saved include in educational purposes. Registered 2003-03-21 with the Federal Service for Intellectual Property. Completely free. No donation required. Mathematical & engineering components come with...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Naeon

    Naeon

    The safest way to store private data in untrusted (cloud) environments

    Naeon is a secure cloud storage solution that uses unbreakable military-grade encryption and zero-knowledge privacy to protect confidential data in an untrusted environment. The data are encrypted using the AES 256-bit encryption algorithm with a randomly generated 128-character passphrase. Then, it is split into small pieces called chunks, which are obfuscated by adding random data to each chunk to make them unreadable and indecipherable to unauthorized individuals or processes. The...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Mixin

    Mixin

    Mixin is a trait/mixin and bytecode weaving framework for Java

    ... #mixin on the Sponge Discord Server. For handling obfuscation tasks, Mixin provides an Annotation Processor which works at compile time to generate obfuscation mappings for your toolchain to apply. If using Gradle 5 or later, annotation processors are no longer automatically loaded from compile configurations and must be specified explicitly via annotationProcessor configurations.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    BeaEngine 5

    BeaEngine 5

    BeaEngine disasm project

    BeaEngine is a C library designed to decode instructions from 16-bit, 32-bit and 64-bit intel architectures. It includes standard instructions set and instructions set from FPU, MMX, SSE, SSE2, SSE3, SSSE3, SSE4.1, SSE4.2, VMX, CLMUL, AES, MPX, AVX, AVX2, AVX512 (VEX & EVEX prefixes), CET, BMI1, BMI2, SGX, UINTR, KL, TDX and AMX extensions. If you want to analyze malicious codes and more generally obfuscated codes, BeaEngine sends back a complex structure that describes precisely the...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    V2Ray

    V2Ray

    V2Ray is a set of tools for building your own private network

    Project V is a set of tools to help you build your own privacy network over internet. The core of Project V, named V2Ray, is responsible for network protocols and communications. It can work alone, as well as combine with other tools.
    Downloads: 302 This Week
    Last Update:
    See Project
  • Discover Multiview ERP: The Financial Management Revolution Icon
    Discover Multiview ERP: The Financial Management Revolution

    Reclaim precious moments with loved ones while our robust cloud accounting software streamlines your financial processes.

    Built for growing businesses and well-established enterprises alike, Multiview is a highly scalable and robust ERP.
  • 10
    Hikari

    Hikari

    LLVM Obfuscator

    All releases prior to and including LLVM8 are signed using this PGP Key from Naville. Verifiable on his Keybase. Security is not now, and will never be based purely on Obscurity. The "Security Companies" might say so to sell more of their products. But no, binary obfuscation won't magically fix all your exploits and bugs, (If not introducing more). Designing an Obfuscator is hard, and keeping the source open definitely leaks the pattern to crackers which could potentially make the crackers...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 11
    Simplify

    Simplify

    Android virtual machine and deobfuscator

    Simplify virtually executes an app to understand its behavior and then tries to optimize the code so that it behaves identically but is easier for a human to understand. Each optimization type is simple and generic, so it doesn't matter what specific type of obfuscation is used. Provides a virtual machine sandbox for executing Dalvik methods. After executing a method, it returns a graph containing all possible register and class values for every execution path. It works even if some values...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
    Miasm

    Miasm

    Reverse engineering framework in Python

    The Miasm intermediate representation is used for multiple task: emulation through its jitter engine, symbolic execution, DSE, program analysis, but the intermediate representation can be a bit hard to read. We will present in this article new tricks Miasm has learned in 2018. Among them, the SSA/Out-of-SSA transformation, expression propagation and high-level operators can be joined to “lift” Miasm IR to a more human-readable language. We use graphviz to illustrate some graphs. Its layout...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Cloud Filer

    Cloud Filer

    S3 file management tool with encryption

    Cloud Filer is a graphical cloud file management tool and S3 client. Cloud Filer allows you to upload and download files to cloud storage and can be used as part of your backup strategy. Cloud Filer includes pre-internet encryption and file name obfuscation making access to your cloud data useless without the right password. Download and install using pip install cloudfiler - see also https://pypi.org/project/cloudfiler/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Obclipse manage the obfuscation of an ready build eclipse product. It collects the necessary information of a product, configure a third party obfuscator, obfuscate the product and fixes the textual files of the plugins by the obfuscated class names.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    MoonSharp

    MoonSharp

    An interpreter for the Lua language, written entirely in C#

    A complete Lua solution is written entirely in C# for the .NET, Mono, Xamarin and Unity3D platforms. Support for the complete Lua standard library with very few exceptions (mostly located on the 'debug' module) and a few extensions (in the string library, mostly). Supports dumping/loading bytecode for obfuscation and quicker parsing at runtime. An embedded JSON parser (with no dependencies) to convert between JSON and Lua tables. Easy opt-out of Lua standard library modules to sandbox what...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    vHDL Obfuscator GUI

    vHDL Obfuscator GUI

    vHDL Obfuscator is an small GUI to obfuscate and reformat HDL files

    VHDL and Verilog HDL are standards languages for hardware description. Sometimes is necessary to share the source HDL file but maintaining a little level of control and protection of the intellectual property. This tool generate obfuscated code that is almost unreadable to humans, but is still readable to compilers and simulators. This tool use GHDL (https://sourceforge.net/projects/ghdl-updates/), HDLObf (https://sourceforge.net/projects/hdlobf/), Icarus Verilog...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    AntiLVL Reloaded

    AntiLVL Reloaded

    AntiLVL Android LVL Hack Remove License verification of Android

    .... It will not always work. However, it has been designed to get around obfuscation and to apply many variations. AntiLVL is a configurable Smali code patcher with rules defined in user-modifiable XML files stored inside the jar called fingerprints. Brief summary of how it works: Decompiles the Apk Perform regular expression matching Carrie out defined modifications Recompile, update classes.dex Resign and zipalign Remove Google Play Store Check
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    WTF Obfuscator

    WTF Obfuscator

    WTF Obfuscator is a new obfuscator for your .NET applications

    [W]hat [T]he ob[F]uscator is a new obfuscator which protects your application. Not too good protection until!
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    Kirisurf

    Kirisurf

    Kirisurf is an open-source internet traffic integrity protector

    Kirisurf is an open-source internet traffic integrity protector based on SSH and SSL, with many innovations in traffic obfuscation and server distribution. It can be safely and reliably used to circumvent censorship in China. Please visit our website for downloads, as SourceForge downloads are packet-scanned in China and may be unreliable and/or hijacked.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    libObfuscate
    libObfuscate 2.00 ISO C / open-source / system independent * Modern 256bit cryptography: AES, Anubis, Camellia, Cast-256, Clefia, FROG, Hierocrypt3, Idea-NXT, MARS, RC6, Safer+, SC2000, Serpent, Speed, Twofish, Unicorn-A, Wrapper * CSPRNG (based on AES) * Modern 512bit hashing: Grostl, Keccak, SHA2, Skein, Wrapper * Scrambling * Multi-layered obfuscation
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21

    KnProxy

    Lightweight, PHP, cURL based HTTP/HTTPS Web Proxy

    Lightweight, PHP-based Web Proxy that can utilize whatever remote connecting ablities your server has to offer. It should work out of the box. No configuration needed. For educational purposes. For a full proxy (that deals with connections), see http://sourceforge.net/projects/level5/ Note: Please post bugs/questions/feature requests on the Tracker or Forum. Also, active development for this project has transfered to GitHub at https://github.com/jabbany/knProxy .
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22

    Web code format tool

    A tool to format json and js, and obfuscation for js and css

    Desobfuscates json and javascript codes, also it uses the yui compressor to compress css and js files, can obfuscate and put the output in a -min file relative to the source file or put the output in a text field. Also can compress multiple files related to one project just adding and storing the files that you want to compress for an application deploy for example.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    rydeen

    Java obfuscation framework.

    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    Cryptkeeper

    Cryptkeeper Secuirty tool

    ... , RC2 , RC4 , MD5 , SHA1 , SHA2 , SHA3 , SHA4 , XoR , Crypt , HeX , BINARY , Rijndael 256 , Obfuscation String , RSA , BASE64. The password manager anything saved WILL NOT BE ENCRYPTED so it is smart to protect the program from others not using it.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    This class allow you to retrieve remote Web pages using the TOR network or a user specified proxy. This class can add further obfuscation to Internet accesses via TOR network by switching between random TOR user identities on each access.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next