Security & Utilities Software

OS OS

  • More...
    • More...

Category Category

License License

    • More...

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...

User Interface User Interface

    • More...
  • More...

Database Environment Database Environment

Freshness Freshness

Security & Utilities Software

  • The Sight of Sound The Sight of Sound Icon
    The Sight of Sound Icon

    ­ Improve VoIP Visibility from SIP to RTP

    Cloudbased voice solutions are common in enterprise networks and frustrating for operations teams to manage. Simplify VoIP monitoring by having a proactive analysis of on-prem, hybrid and UCaaS voice services. Try the ThousandEyes VoIP monitoring solution today, free.
  • BeeCrypt Cryptography Library

    BeeCrypt is an ongoing project to provide a strong and fast cryptography toolkit. Includes entropy sources, random generators, block ciphers, hash functions, message authentication codes, multiprecision integer routines, and public key primitives.

  • VeraCrypt Icon

    VeraCrypt

    Open source disk encryption with strong security for the Paranoid

    VeraCrypt is a free disk encryption software brought to you by IDRIX (https://www.idrix.fr) and based on TrueCrypt 7.1a. It adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. It also solves many vulnerabilities and security issues found in TrueCrypt. This enhanced security adds some delay ONLY to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted data. All released files are PGP signed with key ID=0x54DDD393, available on key servers and downloadable at https://www.idrix.fr/VeraCrypt/VeraCrypt_PGP_public_key.asc VeraCrypt can mount TrueCrypt volumes. It also can convert them to VeraCrypt format. Documentation: https://www.veracrypt.fr/en/Documentation.html FAQ : https://www.veracrypt.fr/en/FAQ.html

  • Advanced Onion Router Icon

    Advanced Onion Router

    Advanced Onion Router is a portable client for the OR network and is intended to be an improved alternative for Tor+Vidalia+Privoxy bundle for Windows users. Some of the improvements include UNICODE paths, support for HTTP and HTTPS proxy protocols on the same Socks4/Socks5 port with HTTP header filtering that generates fake identity-dependent headers every time the identity is changed (proxy chains are also supported), support for NTLM proxies, a User Interface that makes Tor's options and actions more accessible, local banlist for forbidden addresses, private identity isolation, a point-and-click process interceptor that can redirect connections from programs that don't support proxies, also giving them fake information about the local system and support for .onion addresses. Also, it can estimate AS paths for all circuits and prevent AS path intersections, it can restrict circuits to be built using only nodes from different countries, can change circuit lengths and more.

  • File Crypter

    File Crypter is a Simple program, that is able to encrypt your files and decrypt them. A version of File Crypter is included as an example in the xCrypter Library and is called "ncrypter" which is short for "new crypter".

  • Remote Command Executor

    RemCom is RAT [Remote Administration Tool] that lets you execute processes on remote windows systems, copy files, process there output and stream it back. It allows execution of remote shell commands directly with full interactive console.

  • infotec

    The goal of this project is to design and write comercial quality software and aplications with fully respect to free software (like in "free speach"). The software designed by us will target various fields: from scientific applications to multimedia an

    Downloads: 14 This Week Last Update: See Project
  • BitVisor

    BitVisor is a tiny hypervisor initially designed for mediating I/O access from a single guest OS. Its implementation is mature enough to run Windows and Linux, and can be used as a generic platform for various research and development projects.

  • Encrypter Icon

    Encrypter

    Encrypter is a free folder encrypting and hiding utility software.

    Encrypter is a free folder encrypting and hiding utility software for Windows 32bit platform. Encrypter is powerful but lightweight software written in VB.NET for Windows 7, Vista and XP.

    Downloads: 1 This Week Last Update: See Project
  • AESsc

    This is a simpe Implementation of an The 128-bit AES Encryption Algorithm core in 16-Bit ASM

    Downloads: 0 This Week Last Update: See Project
  • Avenge

    Attack Vector Entropic Network Generating Environment

    The Artificial Intelligence Based Intrusion System finds 0-day vulnerabilities on a host and/or in a network. It does this by using a Feed Forward Back Propagation Neural Network that has been trained against thousands of vulnerable applications and virus/malware byte-code. To date; Aibis has discovered over 1400 previously-unknown 0-day vulnerabilities! There are certain discrete patterns found in the binary and byte-code of an application that make it more susceptible to exploitation. Pattern matching neural networks are ideal for identification of these discrete patterns. The Aibis project has been in private-development for over 14 years under a different name. The current project represents a complete-rewrite of the software in an attempt to make it cleaner and more efficient. In addition; the rewrite makes possible the addition of modules that could not be incorporated in the original version.

    Downloads: 0 This Week Last Update: See Project
  • BARP Binomial Addition Rotation Panmagic

    GPL cryptographic functions using Binomial coefficients, Addition, Rotation, Panmagic squares and cubes.

    Downloads: 0 This Week Last Update: See Project
  • Biocentrica Voyager Antivirus

    It moves by itself inside networks like virus infection & plagues, it is being written to solve computer virus problem drastically and responsibly. It is legal, free and open for public domain to improve W3 ICT Security.

    Downloads: 0 This Week Last Update: See Project
  • Block Based Encryption aka 2Bx4Bx2B

    An original bruteforce-based encryption/decryption system. BBE was originally conceived to chat with encrypted text on IRC. mIRC and X-Chat support BBE via script addon. BBE can also encrypt MIME encoded files. Blowfish encryption is currently supported.

    Downloads: 0 This Week Last Update: See Project
  • CODE-LABS Icon

    CODE-LABS

    Code-Labs Project is about sharing my algorithm and code on software development. They are mainly based on Assembly, C, C++, and Python. I opened it freely to all of you. It's an open project.

    Downloads: 0 This Week Last Update: See Project
  • CheckSum Library

    This library contains functions to calculate hash values and checkdigits like Adler, MD5 and much more. Over 30 different hash codes, checkdigits and barcodes will be supported.

    Downloads: 0 This Week Last Update: See Project
  • Kainoa Biometric User Authentication

    The purpose of this project is to provide a biometric security solution by using voice print, fingerprint and/or facial recognition along with a password and/or smart card support using AES to protect data. Please read forums for if interested.

    Downloads: 0 This Week Last Update: See Project
  • LuCAS

    A Computer Algebraic System. Designed to do advanced mathematical operations and calculations with a simple user interface.

    Downloads: 0 This Week Last Update: See Project
  • RootContest

    Objective of this project is to DEVELOP OPENSOURCE portal written in PHP/MySQL to practise websecurity in real time. Rootcontest portal will help users to understand websecurity in a better way.

    Downloads: 0 This Week Last Update: See Project
  • Security Depot

    Security Depot is a central place for computer security tools and documentation for every OS and platform. Defense, attack, and auditing tools for and against all OSes have been collected into one repository.

    Downloads: 0 This Week Last Update: See Project
  • Tecnotel - Telecommunications Technology

    Tecnotel is a project that seeks security and comodity to the end-user, controlling your house through the telephone line, internet or remote-controller. The software available controls the electronic-equipment and others.

    Downloads: 0 This Week Last Update: See Project
  • The Felix

    The Felix can propagate accross a network without the knowledge of the users and randomly run a program, which can be incorparated. It's ideal for keeping programs running that advanced users would remove and can even optionally play Bach's famous two

    Downloads: 0 This Week Last Update: See Project
  • The Hackers Lab

    The Hackers Lab is aimed to provide hackers, system audits, system and server and network administrators with applications to secure their own servers.

    Downloads: 0 This Week Last Update: See Project
  • The Secure Internet Connection

    TSIC is a comprehensive solution for secure Internet connection against all kinds of threats and harmful programs for Windows platforms and ReactOS. It's features include a built-in FIREWALL,IDS,Parental and privacy Control and also antivirus.

    Downloads: 0 This Week Last Update: See Project
  • common hardware recovery solutions

    Common Hardware Recovery Solutions by Ukrainian-Russian network from http://hardw.net/forum

  • md5tdi

    This program try to crack any md5 hash , but not using one cpu, using the power of distributed computing to get better results in less time

    Downloads: 0 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • 2
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you