Showing 11 open source projects for "using"

View related business solutions
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • 1
    JS Beautifier

    JS Beautifier

    Beautifier for javascript

    ...You can also use js-beautify as a node library (install locally, the npm default). The beautifier can be added on your page as web library. JS Beautifier is hosted on two CDN services: cdnjs and rawgit. You can beautify javascript using JS Beautifier in your web browser, or on the command-line using node.js or python.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    Mixin

    Mixin

    Mixin is a trait/mixin and bytecode weaving framework for Java

    ...For handling obfuscation tasks, Mixin provides an Annotation Processor which works at compile time to generate obfuscation mappings for your toolchain to apply. If using Gradle 5 or later, annotation processors are no longer automatically loaded from compile configurations and must be specified explicitly via annotationProcessor configurations.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 3
    ProGuard Java Optimizer and Obfuscator

    ProGuard Java Optimizer and Obfuscator

    Java class file shrinker, optimizer, obfuscator, and preverifier

    ...It detects and removes unused classes, fields, methods, and attributes. It optimizes bytecode and removes unused instructions. It renames the remaining classes, fields, and methods using short meaningless names. ProGuard is useful for making code more compact and more efficient, on the desktop, on tablets, on smartphones, and on embedded devices. It also makes code more difficult to reverse engineer.
    Leader badge
    Downloads: 61 This Week
    Last Update:
    See Project
  • 4
    Hikari

    Hikari

    LLVM Obfuscator

    All releases prior to and including LLVM8 are signed using this PGP Key from Naville. Verifiable on his Keybase. Security is not now, and will never be based purely on Obscurity. The "Security Companies" might say so to sell more of their products. But no, binary obfuscation won't magically fix all your exploits and bugs, (If not introducing more). Designing an Obfuscator is hard, and keeping the source open definitely leaks the pattern to crackers which could potentially make the crackers' life easier if they have the right skillset. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Retool your internal operations Icon
    Retool your internal operations

    Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.

    Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
    Build an app in Retool
  • 5
    Miasm

    Miasm

    Reverse engineering framework in Python

    The Miasm intermediate representation is used for multiple task: emulation through its jitter engine, symbolic execution, DSE, program analysis, but the intermediate representation can be a bit hard to read. We will present in this article new tricks Miasm has learned in 2018. Among them, the SSA/Out-of-SSA transformation, expression propagation and high-level operators can be joined to “lift” Miasm IR to a more human-readable language. We use graphviz to illustrate some graphs. Its layout...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Cloud Filer

    Cloud Filer

    S3 file management tool with encryption

    ...Cloud Filer includes pre-internet encryption and file name obfuscation making access to your cloud data useless without the right password. Download and install using pip install cloudfiler - see also https://pypi.org/project/cloudfiler/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    DowningGames's open source portal. It contains: Our simple ActionScript obfuscator for Windows. It obfuscates code by renaming all of the functions and variables and optionally using #define-style macro substitutions. The Flash template used as a starting point to make Momentum Master, Momentum Master II, and Myrrored.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    IDFC Maven ProGuard Plug-in

    A maven plugin for obfuscating java code via ProGuard

    This plugin allows you to obfuscate maven artifacts using the ProGuard open source obfuscator, which is a very powerful and well established Java obfuscator. ProGuard can also be found on SourceForge at http://proguard.sourceforge.net/. This plugin can be used from your POM as follows: <groupId>com.idfconnect.devtools</groupId> <artifactId>idfc-proguard-maven-plugin</artifactId> <version>1.0.1</version> Apache Maven, Maven, Apache, the Apache feather logo, and the Apache Maven project logos are trademarks of The Apache Software Foundation.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9

    Cryptkeeper

    Cryptkeeper Secuirty tool

    ...some uses encryption keys and some dont. there are AES , 4DES , RC2 , RC4 , MD5 , SHA1 , SHA2 , SHA3 , SHA4 , XoR , Crypt , HeX , BINARY , Rijndael 256 , Obfuscation String , RSA , BASE64. The password manager anything saved WILL NOT BE ENCRYPTED so it is smart to protect the program from others not using it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 10
    This class allow you to retrieve remote Web pages using the TOR network or a user specified proxy. This class can add further obfuscation to Internet accesses via TOR network by switching between random TOR user identities on each access.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    ...This tool can be used to process single pages, or whole webpage bundles, to protect email addresses occuring in them from spam bots and other harvesters, by hiding them using various methods.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next