Showing 7 open source projects for "all to"

View related business solutions
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • Vibes don’t ship, Retool does Icon
    Vibes don’t ship, Retool does

    Start from a prompt and build production-ready apps on your data—with security, permissions, and compliance built in.

    Vibe coding tools create cool demos, but Retool helps you build software your company can actually use. Generate internal apps that connect directly to your data—deployed in your cloud with enterprise security from day one. Build dashboards, admin panels, and workflows with granular permissions already in place. Stop prototyping and ship on a platform that actually passes security review.
    Build apps that ship
  • 1
    JS Beautifier

    JS Beautifier

    Beautifier for javascript

    This little beautifier will reformat and re-indent bookmarklets, ugly JavaScript, unpack scripts packed by Dean Edward’s popular packer, as well as partly deobfuscate scripts processed by the npm package javascript-obfuscator. All of the source code is completely free and open, available on GitHub under MIT licence, and we have a command-line version, python library and a node package as well. You may install the NPM package js-beautify. When installed globally, it provides an executable js-beautify script. As with the Python script, the beautified result is sent to stdout unless otherwise configured. ...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 2
    Hikari

    Hikari

    LLVM Obfuscator

    All releases prior to and including LLVM8 are signed using this PGP Key from Naville. Verifiable on his Keybase. Security is not now, and will never be based purely on Obscurity. The "Security Companies" might say so to sell more of their products. But no, binary obfuscation won't magically fix all your exploits and bugs, (If not introducing more).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Simplify

    Simplify

    Android virtual machine and deobfuscator

    ...Each optimization type is simple and generic, so it doesn't matter what specific type of obfuscation is used. Provides a virtual machine sandbox for executing Dalvik methods. After executing a method, it returns a graph containing all possible register and class values for every execution path. It works even if some values are unknown, such as file and network I/O. For example, any if or switch conditional with an unknown value results in both branches being taken. Analyzes the execution graphs from smalivm and applies optimizations such as constant propagation, dead code removal, unreflection, and some peephole optimizations. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    proten

    Makes the computer try keep the 10 commandments (Holy Bible'Exodus 20)

    .... ======= Current implementation includes: ) the 2nd law against images, and this is done with a passive, non-destructive obfuscation of the jpg library path. ) the 4th law against working all 7 days of the week. ======= Proten's project has a list of ideas for implementation, and ofcourse implementation concerns only arbitrary methods because each method aught to be standalone.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5
    DowningGames's open source portal. It contains: Our simple ActionScript obfuscator for Windows. It obfuscates code by renaming all of the functions and variables and optionally using #define-style macro substitutions. The Flash template used as a starting point to make Momentum Master, Momentum Master II, and Myrrored.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    This simple Java applet will use a few URL obfuscation methods to mask a URL. This isn't meant to be anything earth shattering, but maybe useful. It does more than basic URL encoding (although it does that). Also contains a library to do it all.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Jymini is a JavaScript minifier and obfuscator. While there are several of these out there, I couldn't find one that did exactly what I needed. This program is very flexible and has features that others don't.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next