A free "on-the-fly" transparent disk encryption program for PC & PDAs.
An upstream source site housing the original files for this mirror is no longer available. With this software, you can create one or more "virtual disks" on your PC/PDA. These disks operate exactly like a normal disk, with the exception that anything written to one of them is transparently, and securely, encrypted before being stored on your computer's hard drive.
Simple to install and use Tor client / server with WASTE and VideoVoIP
*** PLEASE NOTE: There are now 2 seperate versions here. *** One is Pre Firefox 57. The other is Post Firefox 57. *** For those providing mirrors, please enable your users to realize this. MicroSip: enables FREE PC to PC video calling with no account sign-up and no middleman server. WASTE: enables chat, file transfer and support. Tor: enables safer browsing. Tor Firefox Profile: Browse over Tor. As with all versions of Tor - do not rely on this for strong anonymity. A usability enhanced Privacy Pack. An installer, for : Windows XP 32/64, Vista 32/64, Win7 32/64, Win8 32/64, Win10 32/64.
USB History Dump is a forensic tool used to trace evidence of USB thumb drive activity from the Windows Registry. It can be used to gather information such as the last time the thumb drive or mp3 player was connected as well as the last drive letter.
Web Scanner is a command-line program that is designed to scans web servers to find default and potentially vulnerable web pages. 2.0 - Java, 1.3 - Perl Web scanner supports both HTTP and HTTPS protocols and can be configured to use custom data files.
OW.NET -- 1-Wire API port from Java (and J#) to C#. Use the Dallas 1-Wire and iButton chips with standard C# using a serial adapter (also CF.net) or the TMEX drivers on the Windows platform. No J# distribution installation required.
Another one of em' DoS Tools!
Just a little project I've made last summer.Nothing too serious.If you want to help be my guest.It's written in .NET(C#) so you can de-compile it using IL-Spy.
Criptex is a free software for crypting texts
DownRoll: The downloadable RickRoll. How many people can you fool? Instructions: 1. Download it. 2. Change the file name. 3. Upload it to a file sharing site. 4. Trick people into running it.
Extended AES Cryptography
EAEScrypt is a utility that is designed to protect sensitive data using secure encryption. It uses the Advanced Encryption Standard (AES) as published by the Federal Information Processing Standards Publications (FIPS PUBS) and issued by the National Institute of Standards and Technology (NIST). The official version of AES allows only 128-bit, 192-bit or 256-bit keys, and EAESCrypt is fully compliant with FIPS-197 when using these values. But EAEScrypt can use any key size from 128-bit to 2048-bit. EAESCrypt is a command line utility. The instaler for Windows 7 provides some basic functionality in the context menu for the files in Windows Explorer, to encrypt and decrypt them, as well as to manage the encryption keys. Go to the EAESCrypt Web Site to download the installer and the source code.
Автоматическая блокировка процессов
K.a.t.e-kill and tell effect Функции: 1)Блокировка процессов стронних программ 2)Резервное копирование системных файлов 3)Сборка мусора 4)Автоматическое добавление исполняемых файлов при установке
Mon projet est de mettre en place une application de vote sécurisé par une authentification biometriques avec le chiffrement de Paillier
NT/Win2k Hosting Controller will allow users of NT/Win2k to run a smooth web hosting operation.
Raiden block cipher: An extremely lightweight and fast block cipher, developed using genetic programming, with the intention to be an alternative to TEA. This cipher is as fast as TEA, and without many of its known weaknesses.
SHA PadLock computes SHA-1 or SHA-256 file checksums using VIA Nano's processors hardware PHE engine. Currently it can only be run on VIA Nano processors (in Samsung NC20 netbook for example) under Windows. It was build using VIA PadLock SDK.
Lightweight file deleter.
This is a software that converts a text file into non readable format using a mathematical expression. To convert the non readable format into the original version the same mathematical expression should be used.
SecureProxy is an proxy application which sits in front of a web server and enforces general security policies which prevent clients from accessing restricted portions of the website or providing dangerous or unauthorized input.
Distributed Syslog collector and viewer system with reliable Syslog msgs over tcp, and query with reg ex. using PERL. Supports IETF syslog and syslog relay, JAVA/JINI based, uses postgreSQL, JBOSS. Chain of custody raw to db data link. UTF8, D, F , UK
Send secret messages that can only be decrypted with a password and knowledge of level of encryption.
Innovative prototype of network applications such as TCP fuzzers that can be used for many purposes such as network and application security assessments and more. Adapt it freely to fit your needs or to simply understand how TCP works in .NET.
VBigInt is a large integer package developed for use in Microsoft Visual Basic and other COM aware languages. The underlying cryptographic code is Wei Dai's Crypto++.
A windows batch file attributes editor in pure Python
This project is still in development and will be updated as it progesses
This application is designed as an extension to the popular sandbox software Sandboxie. This application runs as an alternative GUI for Windows to give the user an environment secure environment that is completely sandboxed.