Deobscufates .NET assemblies, primarily by rearranging IL code (basic block reordering) and removing junk. Designed to be modular, it is built from reusable pieces.
Grained Login is a fine-grained login system for Qt applications. It uses SHA1 hashed passwords to retrieve user rights from a SQLite database. An administration dialog handles the maintenance of the users, the roles, the rights and the password history.
A Web Based Self Service Active Directory Password Reset Tool
A package of Rijndael, Twofish and Serpent encryption algorithms implemented in x86 assembly. Meant to learn basics of assembly, learn about the algorithms or to be used in a C program.
APing2 is an improved (and C rewritten) version of APing. [dev has ceased, we are waiting for the official NPing project to start]
ASOPEC is a framework for dealing with security in a diverse range of environments. It abstracts security from your application with a AOP approach. It is written in Java and works in Spring and EJB3 containers.
viewstate is a decoder and encoder for ASP .Net viewstate data. It supports the different viewstate data formats and can extract viewstate data direct from web pages. viewstate will also show any hash applied to the viewstate data.
AST is a security platform written in python. It's composed by modules that can be installed and loaded on it.
A minimal CSPRNG reflecting the Zen of cipher design
AUM is an extremely fast, small-state, cryptographically secure pseudo-random number generator and stream cipher. AUM exhibits uniform distribution, mixes rapidly, has no detected bias, and comes in three variants: AUM16, with an internal state array of 16+4 32-bit words; AUM32, with an internal state of 32+4 words; and AUM64 with a 64+4-word state. The former permit seeding with a key of up to 512 or 1024 bits, the latter with a 2048-bit key.
Encrypting, anonymous, unlimited size message transfer system
AleHu is an open source encrypted message transfer system that encompasses both server (PHP) and client software (Java). Give it a shot: You can try out AleHu by simply running the client using the preconfigured AleHu test server! For further details and instructions on how to quickly install and run AleHu, have a look at the documentation in the Wiki section.
The Aleph project is a simple Web API for using an access control list composed of OpenIDs.
AmavisAdmin is a tool to maintain SPAMs, Viruses and blocked mails written to an SQL database by Amavisd-new. Mails can be removed automatically or manually, or they can be released to be send to the recipients.
Ampare Hide Link is a script which auto hide real link on your website
Ampare Hide Link is a script which auto hide link on your website to prevent user from knowing the final destination. Ampare Hide Link is using Defat Technology and other to protect your link on iframe and other tags. If you want to share some content but want to keep the url private. You can use Ampare Hide Link . It is free
Ano (Anonymous Network Overlay) is a decentralized IP router based on relaying principle. In Ano all IP traffic is anonymized, including TCP, UDP, ICMP and DNS protocols. Each node acts as a relay and NAT for external traffic.
Anomos is an anonymous, encrypted multi-P2P file sharing protocol, originally based on BitTorrent. See our homepage for more details.
Anti Inference Hub is the first dynamic query processing engine that defends against the Inference Problem in Multilevel Databases by integrating smoothly with common DBMSs (Oracle, PostgreSQL, and MySQL), and monitoring queries submitted by users. The project source is hosted at: https://github.com/angyjoe/aih. Post your questions to Anti Inference Hub mailing list at: https://lists.sourceforge.net/lists/listinfo/aih-list.
How to detect multimedia spam such as image spam? This project implemented some algorithms to detect and recognize the image spam based on Image Processing, Pattern Recognition incluing Edge-Detection,Region-Grow, ANN, SVM, LLE, ICA, PCA,etc.
Anti net-cut program, programme Anti net-cut, anti netcut, ,netcut , Arcai
This is a apache v2.0 authentication module. Based on html form authentication and cookie authentication session. Cookie session are stored in memcache deamon. Can be used has an simple "Single Signe-On" (SSO). All the code source and the bug tracking has migrated to github: https://github.com/ZenProjects/Apache-Authmemcookie-Module All the documentation are here: https://zenprojects.github.io/Apache-Authmemcookie-Module/
Encryption addressing long-term data secrecy
Most of today's cryptographic standards will be broken with tomorrow's computational power. Azrar is a user-friendly tool for the encryption/decryption of single files - preferably compressed archives - addressing long-term data secrecy. Thus, Azrar provides the possibility to use webspace for secure data transfer between two communication/transfer partners (encryption only, network transfer not yet included in current version). Data in encrypted files are secret/private indefinitely. To achieve long-term data secrecy, Azrar differs from other approaches in terms of not to rely on effective computational deficiencies. It combines a one-time pad with a stream cipher method using the strong cryptographic hash function (family) Skein. Azrar fulfills business requirements for secure data transfer and supports several operating systems natively. It does not use a runtime environment.
GPL cryptographic functions using Binomial coefficients, Addition, Rotation, Panmagic squares and cubes.
A family of FLEA-inspired CSPRNGs and Stream Ciphers
BEDBUG is a small, fast, cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It exhibits uniform distribution, mixes rapidly (with worst-case avalanche better than 16-bits), has no detected bias, and comes in three variants: BEDBUG128, with an internal state array of 128+3 32-bit words; BEDBUG256, with an internal state of 256+3 words; and BEDBUG512 with a 512+3-word state. The former permit seeding with a key of up to 4096 or 8192 bits, the latter with a 16384-bit key. The BEDBUG generator itself is a mere 5 lines of code: Three rotations; two pseudo-random lookups. The default BEDBUG configuration alternates the rotation constants unpredictably. These four sets of three values differ between BEDBUG128, BEDBUG256 and BEDBUG512 and were selected, tuned and tested in each case for optimal avalanche, which is never less than 16.5 bits. BEDBUG has passed stringent industry-standard tests for randomness, including NIST and DIEHARD.
Backup P2P is a peer to peer application doing automated and secured backups inside a community (Jabber, XMPP). Each user shares some available space on his disk with others, to be able in return to remotely backup some of his own data.
A program to generate random reciprocal bigram tables
A command-line program to encrypt/decrypt a message using a random reciprocal bigram table and write a bigram table to a text file. Executing the program without any command-line arguments starts bigram in message encryption/decryption mode. The program prompts for a password or passphrase and a message to encrypt/ decrypt. After the message is entered the ciphertext is displayed. Executing the program with command-line arguments causes bigram to generate a random bigram table to print to screen or save to disk depending on whether the -f filename argument was given. If the -p passphrase argument is given a specific table is generated and is repeatable each time the same passphrase is given. This program was written to supplement the Enigma Simulator by Dirk Rijmenants. http://users.telenet.be/d.rijmenants/en/enigmasim.htm Enigma message procedures: http://users.telenet.be/d.rijmenants/en/enigmaproc.htm
It moves by itself inside networks like virus infection & plagues, it is being written to solve computer virus problem drastically and responsibly. It is legal, free and open for public domain to improve W3 ICT Security.