Security & Utilities Software

OS OS

    • More...
  • More...
    • More...
    • More...

Category Category

    • More...
    • More...

License License

    • More...

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...

User Interface User Interface

    • More...
  • More...

Database Environment Database Environment

Freshness Freshness

Security & Utilities Software

  • 2018 Thomson Reuters Top 100 Global Tech Leaders 2018 Thomson Reuters Top 100 Global Tech Leaders Icon
    2018 Thomson Reuters Top 100 Global Tech Leaders Icon

    See how tech-sector leadership is being redefined in today’s complex business environment.

    21st century technology-sector leadership requires not only optimal financial performance but also attention to many other factors, including management and investor confidence, risk and resilience, legal compliance, innovation, environmental impact, social responsibility, and reputation. Successfully managing these areas may determine which tech companies have the fortitude to succeed in the future. Here’s to those that made the list.
    Who are today’s top global tech leaders?
    Read the report
  • VeraCrypt Icon

    VeraCrypt

    Open source disk encryption with strong security for the Paranoid

    VeraCrypt is a free disk encryption software brought to you by IDRIX (https://www.idrix.fr) and based on TrueCrypt 7.1a. It adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. It also solves many vulnerabilities and security issues found in TrueCrypt. This enhanced security adds some delay ONLY to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted data. All released files are PGP signed with key ID=0x54DDD393, available on key servers and downloadable at https://www.idrix.fr/VeraCrypt/VeraCrypt_PGP_public_key.asc VeraCrypt can mount TrueCrypt volumes. It also can convert them to VeraCrypt format. Documentation: https://www.veracrypt.fr/en/Documentation.html FAQ : https://www.veracrypt.fr/en/FAQ.html

  • BeeCrypt Cryptography Library

    BeeCrypt is an ongoing project to provide a strong and fast cryptography toolkit. Includes entropy sources, random generators, block ciphers, hash functions, message authentication codes, multiprecision integer routines, and public key primitives.

  • Advanced Onion Router Icon

    Advanced Onion Router

    Advanced Onion Router is a portable client for the OR network and is intended to be an improved alternative for Tor+Vidalia+Privoxy bundle for Windows users. Some of the improvements include UNICODE paths, support for HTTP and HTTPS proxy protocols on the same Socks4/Socks5 port with HTTP header filtering that generates fake identity-dependent headers every time the identity is changed (proxy chains are also supported), support for NTLM proxies, a User Interface that makes Tor's options and actions more accessible, local banlist for forbidden addresses, private identity isolation, a point-and-click process interceptor that can redirect connections from programs that don't support proxies, also giving them fake information about the local system and support for .onion addresses. Also, it can estimate AS paths for all circuits and prevent AS path intersections, it can restrict circuits to be built using only nodes from different countries, can change circuit lengths and more.

  • DiskCryptor

    DiskCryptor - fully open solution to encrypt all partitions, including system. The program is a replacement for proprietary DriveCrypt Plus pack and PGP WDE.

  • BitVisor

    BitVisor is a tiny hypervisor initially designed for mediating I/O access from a single guest OS. Its implementation is mature enough to run Windows and Linux, and can be used as a generic platform for various research and development projects.

  • Unicornscan

    Unicornscan is an asynchronous TCP and UDP port scanner developed by the late Jack C. Louis.

    Downloads: 29 This Week Last Update: See Project
  • File Crypter

    File Crypter is a Simple program, that is able to encrypt your files and decrypt them. A version of File Crypter is included as an example in the xCrypter Library and is called "ncrypter" which is short for "new crypter".

  • Remote Command Executor

    RemCom is RAT [Remote Administration Tool] that lets you execute processes on remote windows systems, copy files, process there output and stream it back. It allows execution of remote shell commands directly with full interactive console.

  • Yoda's Protector Icon

    Yoda's Protector

    Yoda's Protector is a free, open source, Windows 32-bit software protector.

    Downloads: 26 This Week Last Update: See Project
  • Secure Internet Live Conferencing Icon

    Secure Internet Live Conferencing

    Secure chat and conferencing protocol

    See http://silcnet.org/ for detailed information. SILC provides common chat and conferencing services like private messages, instant messages, channels and groups, and video and audio conferencing. The main difference to other protocols is that SILC has been designed with security as its main feature. All packets and messages sent in SILC network are always encrypted. Private messages are encrypted end-to-end, channel message are encrypted with channel-wide secret key and secure file transfer is protected peer-to-peer.

    Downloads: 20 This Week Last Update: See Project
  • infotec

    The goal of this project is to design and write comercial quality software and aplications with fully respect to free software (like in "free speach"). The software designed by us will target various fields: from scientific applications to multimedia an

    Downloads: 10 This Week Last Update: See Project
  • AES x86 - Algorithms in Assembly

    A package of Rijndael, Twofish and Serpent encryption algorithms implemented in x86 assembly. Meant to learn basics of assembly, learn about the algorithms or to be used in a C program.

    Downloads: 5 This Week Last Update: See Project
  • Project Bukowski

    This project is intended to demonstrate that current popular approaches to software security (e.g. DAC, VMA randomization, etc) are not sufficient and that other approaches should be considered more seriously (e.g. MAC, design by contract).

    Downloads: 2 This Week Last Update: See Project
  • Eckbox

    Software for a van eck phreaking device. Please use to test security only. <a href="http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci550525,00.html">Here</a>'s an explanation if you don't know what van eck phreaking is.

  • GTCop

    GTCop Professional Security Appliance aims to provide a powerful tool for satellite communications, with enhanced QoS and bandwidth controls. As derived from IPCop Firewall, it is a stable, secure, easy to configure and maintain GNU/Linux firewall box.

    Downloads: 1 This Week Last Update: See Project
  • hardware keylogger / keyboard recorder

    Strokey is a small hardware keyboard logger saving all keystrokes into an EEPROM memory for later investigation. The device may get attached to any PS/2-keyboard by intercepting the cable, or get placed directly inside for maximum invisibility.

    Downloads: 1 This Week Last Update: See Project
  • 7PasswordManager

    Simple and easy to use password generator.

    7PasswordManager is a simple and easy to use random password generator software program. It will create different combinations of letters and numbers.

    Downloads: 0 This Week Last Update: See Project
  • AES by GPU

    Do AES by GPU

    Downloads: 0 This Week Last Update: See Project
  • AESsc

    This is a simpe Implementation of an The 128-bit AES Encryption Algorithm core in 16-Bit ASM

    Downloads: 0 This Week Last Update: See Project
  • ARLEKIN

    This is a very powerfull criptography project that basicaly can be used to transmit or store secure data and study some cipher, hash and compression algorithms to understands how it works.

    Downloads: 0 This Week Last Update: See Project
  • Alocertifications®. Icon

    Alocertifications®.

    _Alocertifications5896 as secure portable certificate; it is a JavaX project type, on english language which, for bordificant stand alone connectivity; all-weather-anywhere: strong forces. The objectives from this project are, to grabb validating certifications functions in aultraspeed elements, fundaments, etcetra; for coercitive coherence purposes while, realizing some specific works. This document the Alocertifications5896 logo; the Certifications5896, the CodY and the CodZ projects logos, are ready logos-registered trade mark from: Frank IV; rights reserved. Security issues from this project are, the Signerment Socked Liablity applied to away-alone-aultragens elements, fundaments, etc.; keeping them with active valid certifications anytime. This document is addressed temporaly under claims at: http://Alocertifications5896.sf.net [Creative Commons: Non Commercial]. ©Frank A. Nassau IV; reserved. |Warning DC VAP|.

    Downloads: 0 This Week Last Update: See Project
  • An AES/rijndael encryption library

    A library implementing the AES (American Encryption Standard) or Rijndael algorithms, intended to provide a neat packaged solution for other projects to use. Package includes C and Intel Pentium/MMX assembler versions of AES, along with an extensive

    Downloads: 0 This Week Last Update: See Project
  • Anarchy-Online Server Emulator

    AOEmu is a high performance server emulator for the sci-fi MMORPG Anarchy-Online. This project aims to provide a fully functional server system for running and maintaining an Anarchy-Online server over one or many server machines running Linux.

    Downloads: 0 This Week Last Update: See Project
  • Avenge

    Attack Vector Entropic Network Generating Environment

    The Artificial Intelligence Based Intrusion System finds 0-day vulnerabilities on a host and/or in a network. It does this by using a Feed Forward Back Propagation Neural Network that has been trained against thousands of vulnerable applications and virus/malware byte-code. To date; Aibis has discovered over 1400 previously-unknown 0-day vulnerabilities! There are certain discrete patterns found in the binary and byte-code of an application that make it more susceptible to exploitation. Pattern matching neural networks are ideal for identification of these discrete patterns. The Aibis project has been in private-development for over 14 years under a different name. The current project represents a complete-rewrite of the software in an attempt to make it cleaner and more efficient. In addition; the rewrite makes possible the addition of modules that could not be incorporated in the original version.

    Downloads: 0 This Week Last Update: See Project
  • BARP Binomial Addition Rotation Panmagic

    GPL cryptographic functions using Binomial coefficients, Addition, Rotation, Panmagic squares and cubes.

    Downloads: 0 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you