Showing 797 open source projects for "c 4 decompiler"

View related business solutions
  • Secure remote access solution to your private network, in the cloud or on-prem. Icon
    Secure remote access solution to your private network, in the cloud or on-prem.

    Deliver secure remote access with OpenVPN.

    OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
    Get started — no credit card required.
  • Red Hat Ansible Automation Platform on Microsoft Azure Icon
    Red Hat Ansible Automation Platform on Microsoft Azure

    Red Hat Ansible Automation Platform on Azure allows you to quickly deploy, automate, and manage resources securely and at scale.

    Deploy Red Hat Ansible Automation Platform on Microsoft Azure for a strategic automation solution that allows you to orchestrate, govern and operationalize your Azure environment.
    Learn More
  • 1
    inoclam monitors directories with inotify and virus scans files with ClamAV when they are created or changed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    The goal of this project is to create a GnuPG front end for Mac OS X. To that extent, it will make installing GnuPG on OS X easier and provide inter application services to access GPG. Also, GPGME wrapper in ObjC will be done.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 3
    MSLK provides the precompiled Win32 binaries of some excellent porject with a GPL or similar open source license. Here will keep updated.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4

    Network Basics

    All of the basic network diagnostic tools in a single package

    A collection of asynchronous, hi-speed network diagnostics and administation tools, including Connections, Trace Route, Subnet Scan, Port Scan, Terminal, Whois, Hardware Info, TCP Statistics, External IP query, and others. Includes port names and a large list of whois serves.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Auth0 Free: 25K MAUs + 5-Min Setup Icon
    Auth0 Free: 25K MAUs + 5-Min Setup

    Enterprise Auth, Zero Friction: Any Framework • 30+ SDKs • Universal Login

    Production-ready login in 10 lines of code. SSO, MFA & social auth included. Scale seamlessly beyond free tier with Okta’s enterprise security.
    Get Your API Keys
  • 5
    The ClamAV Power Tools is a set of tools that complement ClamAV under Windows. It includes tools to run clamd/freshclam as a service, and hooks for Windows Explorer, Microsoft Office and Outlook.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    KeyChainDD is a highly secure password manager for Mac OS X. KeyChainDD is a native Mac application that offers full integration with the OS X keychain system, secure drag-and-drop operation and support for sites requiring a second pass-phrase.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    This its a simple project of the RSA algorithm. The purpose of this project isn't to develop an impressive program, it's an easy understand of the algorithm and the C programing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Simple multi tool for scouts. It contains: chat server chat client encryption tool simple www browser simple www editor e-mail client (for sending messagess) mass e-mail sender Written in VS2008
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    With the Log Parser one can scan logs, whitelist out legitimate, non-corrupt entries (usually file paths), and apply a standard format to a log generated by any antivirus or malware-removal program. This makes for easier reading of the meat in any log.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Payroll Services for Small Businesses | QuickBooks Icon
    Payroll Services for Small Businesses | QuickBooks

    Save 50% off for 3 months with QuickBooks Payroll when you Buy Now

    Easily pay your team and access powerful tools, employee benefits, and supportive experts with the #1 online payroll service provider. Manage payroll and access HR and employee services in one place. Pay your team automatically once your payroll setup is complete. We'll calculate, file, and pay your payroll taxes automatically.
    Learn More
  • 10
    Netstorm is a highly flexible, fast and plattform independent network security and reliability tester which allows you to setup real world low level flood attack scenarios (such as MITM, DoS and DDoS) within a local area network and on the internet.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    PQStego is a C implementation of J. Fridrich algorithm for embedding secret messages in JPEG images as described in her paper "Perturbed quantization steganography with wet paper codes "
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Making spam reporting easy. A collection of tools for catching and reporting spam e-mails.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    EGDW is a random number daemon for Microsoft Windows. It sits in the background and collects randomness, and makes this random data available to cryptographic software. It has an EGD compatible interface, at least as compatible as Windows allows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    SpillGuard is a Data Loss/Leak Prevention (DLP) plugin for Microsoft Office designed to help prevent the opening, saving or printing of Microsoft Office files containing classification markings higher than the classification of the user's computer.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    SQL DB INJECTOR, Oracle, SQL SERVER BY WINDOWS .NET(2.0)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This software implements the time stamp service. (mainly implements the Hierarchical Time-stamp Protocol. This protocol is proposed in a published paper which can be found in this package.)The code can help you to construct your time-stamp server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    TwitrCYRPT is a Windows application that encrypts and decrypts messages that are compatible for Twitters 140 Character limit. This was a school project that has been releases to be Open Source
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    By emulating widespread vulnerabilities the honeypot Nepenthes is able to catch and store viruses worms using these vulnerabilities. The api interface to add new vulnerability modules is easy to use, so there is no problem in writing new ones.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Kahunapule's Password Vault and Kahunapule's Random Password Generator allow you to generate and keep track of random passwords and other sensitive data. Requires Mono or .NET; runs on Linux, OS X, & Windows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    The kernel network stack may behave not as expected, especially in the case of receiving packets. With Ianus it is possible to bypass the kernel network stack and to develop your own network stack in user space or other tools.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    A simple C++ program which parses the .csi file generated by Argos and provides a more readable output.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    RunAsAdmin Explorer Shim is a tool that lets administrators to keep and easily use their administrative rights but still enjoy safety of using least privileged accounts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    A tool to monitor internet hosts` bandwidth usage in a Linux-NAT network. A daemon collects data and clients display them (currently a Java applet with a graph). It automatically detects new hosts and has a nice summary statistic.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 24
    SuperPing is Windows utility writtein C# that allows you to customize your ping requests to a remote host.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    You can compute what you have in common with untrusted parties, without disclosing what you have. This is an implementation of a cryptographic protocol that is tailored for privacy-preserving set intersection.
    Downloads: 0 This Week
    Last Update:
    See Project