BeeCrypt is an ongoing project to provide a strong and fast cryptography toolkit. Includes entropy sources, random generators, block ciphers, hash functions, message authentication codes, multiprecision integer routines, and public key primitives.
Open source disk encryption with strong security for the Paranoid
VeraCrypt is a free disk encryption software brought to you by IDRIX (https://www.idrix.fr) and based on TrueCrypt 7.1a. It adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. It also solves many vulnerabilities and security issues found in TrueCrypt. This enhanced security adds some delay ONLY to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted data. All released files are PGP signed with key ID=0x54DDD393, available on key servers and downloadable at https://www.idrix.fr/VeraCrypt/VeraCrypt_PGP_public_key.asc VeraCrypt can mount TrueCrypt volumes. It also can convert them to VeraCrypt format. Documentation: https://www.veracrypt.fr/en/Documentation.html FAQ : https://www.veracrypt.fr/en/FAQ.html
Advanced Onion Router is a portable client for the OR network and is intended to be an improved alternative for Tor+Vidalia+Privoxy bundle for Windows users. Some of the improvements include UNICODE paths, support for HTTP and HTTPS proxy protocols on the same Socks4/Socks5 port with HTTP header filtering that generates fake identity-dependent headers every time the identity is changed (proxy chains are also supported), support for NTLM proxies, a User Interface that makes Tor's options and actions more accessible, local banlist for forbidden addresses, private identity isolation, a point-and-click process interceptor that can redirect connections from programs that don't support proxies, also giving them fake information about the local system and support for .onion addresses. Also, it can estimate AS paths for all circuits and prevent AS path intersections, it can restrict circuits to be built using only nodes from different countries, can change circuit lengths and more.
File Crypter is a Simple program, that is able to encrypt your files and decrypt them. A version of File Crypter is included as an example in the xCrypter Library and is called "ncrypter" which is short for "new crypter".
RemCom is RAT [Remote Administration Tool] that lets you execute processes on remote windows systems, copy files, process there output and stream it back. It allows execution of remote shell commands directly with full interactive console.
The goal of this project is to design and write comercial quality software and aplications with fully respect to free software (like in "free speach"). The software designed by us will target various fields: from scientific applications to multimedia an
BitVisor is a tiny hypervisor initially designed for mediating I/O access from a single guest OS. Its implementation is mature enough to run Windows and Linux, and can be used as a generic platform for various research and development projects.
Encrypter is a free folder encrypting and hiding utility software.
Encrypter is a free folder encrypting and hiding utility software for Windows 32bit platform. Encrypter is powerful but lightweight software written in VB.NET for Windows 7, Vista and XP.
This is a simpe Implementation of an The 128-bit AES Encryption Algorithm core in 16-Bit ASM
Attack Vector Entropic Network Generating Environment
The Artificial Intelligence Based Intrusion System finds 0-day vulnerabilities on a host and/or in a network. It does this by using a Feed Forward Back Propagation Neural Network that has been trained against thousands of vulnerable applications and virus/malware byte-code. To date; Aibis has discovered over 1400 previously-unknown 0-day vulnerabilities! There are certain discrete patterns found in the binary and byte-code of an application that make it more susceptible to exploitation. Pattern matching neural networks are ideal for identification of these discrete patterns. The Aibis project has been in private-development for over 14 years under a different name. The current project represents a complete-rewrite of the software in an attempt to make it cleaner and more efficient. In addition; the rewrite makes possible the addition of modules that could not be incorporated in the original version.
GPL cryptographic functions using Binomial coefficients, Addition, Rotation, Panmagic squares and cubes.
It moves by itself inside networks like virus infection & plagues, it is being written to solve computer virus problem drastically and responsibly. It is legal, free and open for public domain to improve W3 ICT Security.
An original bruteforce-based encryption/decryption system. BBE was originally conceived to chat with encrypted text on IRC. mIRC and X-Chat support BBE via script addon. BBE can also encrypt MIME encoded files. Blowfish encryption is currently supported.
Code-Labs Project is about sharing my algorithm and code on software development. They are mainly based on Assembly, C, C++, and Python. I opened it freely to all of you. It's an open project.
This library contains functions to calculate hash values and checkdigits like Adler, MD5 and much more. Over 30 different hash codes, checkdigits and barcodes will be supported.
The purpose of this project is to provide a biometric security solution by using voice print, fingerprint and/or facial recognition along with a password and/or smart card support using AES to protect data. Please read forums for if interested.
A Computer Algebraic System. Designed to do advanced mathematical operations and calculations with a simple user interface.
Objective of this project is to DEVELOP OPENSOURCE portal written in PHP/MySQL to practise websecurity in real time. Rootcontest portal will help users to understand websecurity in a better way.
Security Depot is a central place for computer security tools and documentation for every OS and platform. Defense, attack, and auditing tools for and against all OSes have been collected into one repository.
Tecnotel is a project that seeks security and comodity to the end-user, controlling your house through the telephone line, internet or remote-controller. The software available controls the electronic-equipment and others.
The Felix can propagate accross a network without the knowledge of the users and randomly run a program, which can be incorparated. It's ideal for keeping programs running that advanced users would remove and can even optionally play Bach's famous two
The Hackers Lab is aimed to provide hackers, system audits, system and server and network administrators with applications to secure their own servers.
TSIC is a comprehensive solution for secure Internet connection against all kinds of threats and harmful programs for Windows platforms and ReactOS. It's features include a built-in FIREWALL,IDS,Parental and privacy Control and also antivirus.
Common Hardware Recovery Solutions by Ukrainian-Russian network from http://hardw.net/forum
This program try to crack any md5 hash , but not using one cpu, using the power of distributed computing to get better results in less time