Open source disk encryption with strong security for the Paranoid
VeraCrypt is a free disk encryption software brought to you by IDRIX (https://www.idrix.fr) and based on TrueCrypt 7.1a. It adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. It also solves many vulnerabilities and security issues found in TrueCrypt. This enhanced security adds some delay ONLY to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted data. All released files are PGP signed with key ID=0x54DDD393, available on key servers and downloadable at https://www.idrix.fr/VeraCrypt/VeraCrypt_PGP_public_key.asc VeraCrypt can mount TrueCrypt volumes. It also can convert them to VeraCrypt format. Documentation: https://www.veracrypt.fr/en/Documentation.html FAQ : https://www.veracrypt.fr/en/FAQ.html
BeeCrypt is an ongoing project to provide a strong and fast cryptography toolkit. Includes entropy sources, random generators, block ciphers, hash functions, message authentication codes, multiprecision integer routines, and public key primitives.
Advanced Onion Router is a portable client for the OR network and is intended to be an improved alternative for Tor+Vidalia+Privoxy bundle for Windows users. Some of the improvements include UNICODE paths, support for HTTP and HTTPS proxy protocols on the same Socks4/Socks5 port with HTTP header filtering that generates fake identity-dependent headers every time the identity is changed (proxy chains are also supported), support for NTLM proxies, a User Interface that makes Tor's options and actions more accessible, local banlist for forbidden addresses, private identity isolation, a point-and-click process interceptor that can redirect connections from programs that don't support proxies, also giving them fake information about the local system and support for .onion addresses. Also, it can estimate AS paths for all circuits and prevent AS path intersections, it can restrict circuits to be built using only nodes from different countries, can change circuit lengths and more.
DiskCryptor - fully open solution to encrypt all partitions, including system. The program is a replacement for proprietary DriveCrypt Plus pack and PGP WDE.
BitVisor is a tiny hypervisor initially designed for mediating I/O access from a single guest OS. Its implementation is mature enough to run Windows and Linux, and can be used as a generic platform for various research and development projects.
Unicornscan is an asynchronous TCP and UDP port scanner developed by the late Jack C. Louis.
File Crypter is a Simple program, that is able to encrypt your files and decrypt them. A version of File Crypter is included as an example in the xCrypter Library and is called "ncrypter" which is short for "new crypter".
RemCom is RAT [Remote Administration Tool] that lets you execute processes on remote windows systems, copy files, process there output and stream it back. It allows execution of remote shell commands directly with full interactive console.
Yoda's Protector is a free, open source, Windows 32-bit software protector.
Secure chat and conferencing protocol
See http://silcnet.org/ for detailed information. SILC provides common chat and conferencing services like private messages, instant messages, channels and groups, and video and audio conferencing. The main difference to other protocols is that SILC has been designed with security as its main feature. All packets and messages sent in SILC network are always encrypted. Private messages are encrypted end-to-end, channel message are encrypted with channel-wide secret key and secure file transfer is protected peer-to-peer.
The goal of this project is to design and write comercial quality software and aplications with fully respect to free software (like in "free speach"). The software designed by us will target various fields: from scientific applications to multimedia an
A package of Rijndael, Twofish and Serpent encryption algorithms implemented in x86 assembly. Meant to learn basics of assembly, learn about the algorithms or to be used in a C program.
This project is intended to demonstrate that current popular approaches to software security (e.g. DAC, VMA randomization, etc) are not sufficient and that other approaches should be considered more seriously (e.g. MAC, design by contract).
Software for a van eck phreaking device. Please use to test security only. <a href="http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci550525,00.html">Here</a>'s an explanation if you don't know what van eck phreaking is.
GTCop Professional Security Appliance aims to provide a powerful tool for satellite communications, with enhanced QoS and bandwidth controls. As derived from IPCop Firewall, it is a stable, secure, easy to configure and maintain GNU/Linux firewall box.
Strokey is a small hardware keyboard logger saving all keystrokes into an EEPROM memory for later investigation. The device may get attached to any PS/2-keyboard by intercepting the cable, or get placed directly inside for maximum invisibility.
Simple and easy to use password generator.
7PasswordManager is a simple and easy to use random password generator software program. It will create different combinations of letters and numbers.
Do AES by GPU
This is a simpe Implementation of an The 128-bit AES Encryption Algorithm core in 16-Bit ASM
This is a very powerfull criptography project that basicaly can be used to transmit or store secure data and study some cipher, hash and compression algorithms to understands how it works.
_Alocertifications5896 as secure portable certificate; it is a JavaX project type, on english language which, for bordificant stand alone connectivity; all-weather-anywhere: strong forces. The objectives from this project are, to grabb validating certifications functions in aultraspeed elements, fundaments, etcetra; for coercitive coherence purposes while, realizing some specific works. This document the Alocertifications5896 logo; the Certifications5896, the CodY and the CodZ projects logos, are ready logos-registered trade mark from: Frank IV; rights reserved. Security issues from this project are, the Signerment Socked Liablity applied to away-alone-aultragens elements, fundaments, etc.; keeping them with active valid certifications anytime. This document is addressed temporaly under claims at: http://Alocertifications5896.sf.net [Creative Commons: Non Commercial]. ©Frank A. Nassau IV; reserved. |Warning DC VAP|.
A library implementing the AES (American Encryption Standard) or Rijndael algorithms, intended to provide a neat packaged solution for other projects to use. Package includes C and Intel Pentium/MMX assembler versions of AES, along with an extensive
AOEmu is a high performance server emulator for the sci-fi MMORPG Anarchy-Online. This project aims to provide a fully functional server system for running and maintaining an Anarchy-Online server over one or many server machines running Linux.
Attack Vector Entropic Network Generating Environment
The Artificial Intelligence Based Intrusion System finds 0-day vulnerabilities on a host and/or in a network. It does this by using a Feed Forward Back Propagation Neural Network that has been trained against thousands of vulnerable applications and virus/malware byte-code. To date; Aibis has discovered over 1400 previously-unknown 0-day vulnerabilities! There are certain discrete patterns found in the binary and byte-code of an application that make it more susceptible to exploitation. Pattern matching neural networks are ideal for identification of these discrete patterns. The Aibis project has been in private-development for over 14 years under a different name. The current project represents a complete-rewrite of the software in an attempt to make it cleaner and more efficient. In addition; the rewrite makes possible the addition of modules that could not be incorporated in the original version.
GPL cryptographic functions using Binomial coefficients, Addition, Rotation, Panmagic squares and cubes.