Showing 61 open source projects for "executable"

View related business solutions
  • 99.99% Uptime for MySQL and PostgreSQL on Google Cloud Icon
    99.99% Uptime for MySQL and PostgreSQL on Google Cloud

    Enterprise Plus edition delivers sub-second maintenance downtime and 2x read/write performance. Built for critical apps.

    Cloud SQL Enterprise Plus gives you a 99.99% availability SLA with near-zero downtime maintenance—typically under 10 seconds. Get 2x better read/write performance, intelligent data caching, and 35 days of point-in-time recovery. Supports MySQL, PostgreSQL, and SQL Server with built-in vector search for gen AI apps. New customers get $300 in free credit.
    Try Cloud SQL Free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    Scrollout F1

    Scrollout F1

    An easy-to-use anti-spam email gateway

    • Designed for Linux and Windows email system administrators, Scrollout F1 is an easy to use, already adjusted email firewall (gateway) offering free anti-spam and anti-virus protection aiming to secure existing email servers, old or new, such as Microsoft Exchange, Lotus Domino, Postfix, Exim, Sendmail, Qmail and others. • Built-in multilayer security levels make configuration effort equal to a car radio. • It combines simplicity with effective protection using powerful open source...
    Leader badge
    Downloads: 103,730 This Week
    Last Update:
    See Project
  • 2
    Web Security Basics

    Web Security Basics

    Web security concepts

    ...It also covers token-based authentication patterns like access and refresh tokens, helping developers see how modern web applications attempt to balance security with usability. Rather than providing executable code or automated tools, the project emphasizes conceptual understanding and the reasoning behind why certain defenses matter in web architecture.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3
    venom - shellcode generator

    venom - shellcode generator

    msfvenom shellcode generator/compiler/listenner

    The script will use msfvenom (metasploit) to generate shellcode in diferent formats ( c | python | ruby | dll | msi | hta-psh ), injects the shellcode generated into one funtion (example: python) "the python funtion will execute the shellcode in ram" and uses compilers like: gcc (gnu cross compiler) or mingw32 or pyinstaller to build the executable file, also starts a multi-handler to recibe the remote connection (reverse shell or meterpreter session). -- 'shellcode generator' tool reproduces some of the technics used by Veil-Evasion framework, unicorn.py, powersploit, etc,etc,etc.."P.S. some payloads are undetectable by AV soluctions yes!!!" one of the reazons for that its the use of a funtion to execute the 2º stage of shell/meterpreter directly into targets ram.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    dex2jar

    Tools to work with android .dex and java .class files

    Mirrors: * https://bitbucket.org/pxb1988/dex2jar * https://github.com/pxb1988/dex2jar dex2jar contains following compment * dex-reader is designed to read the Dalvik Executable (.dex/.odex) format. It has a light weight API similar with ASM. * dex-translator is designed to do the convert job. It reads the dex instruction to dex-ir format, after some optimize, convert to ASM format. * dex-ir used by dex-translator, is designed to represent the dex instruction dex-tools tools to work with .class files...
    Leader badge
    Downloads: 355 This Week
    Last Update:
    See Project
  • Cut Cloud Costs with Google Compute Engine Icon
    Cut Cloud Costs with Google Compute Engine

    Save up to 91% with Spot VMs and get automatic sustained-use discounts. One free VM per month, plus $300 in credits.

    Save on compute costs with Compute Engine. Reduce your batch jobs and workload bill 60-91% with Spot VMs. Compute Engine's committed use offers customers up to 70% savings through sustained use discounts. Plus, you get one free e2-micro VM monthly and $300 credit to start.
    Try Compute Engine
  • 5
    Shiela USB Shield

    Shiela USB Shield

    The Powerful Protection for PC Against Viruses from Removable Drives

    Shiela USB Shield is a powerful first line defense against virus from infected removable drives. * It locks autorun.inf and associate executable files in multiple instance * Delete/Freeze the shortcut file or clone file, and restores the original automatically. * It is free and open source. System Requirements 1) Windows 2000 or later 2) 256Mb RAM or higher 3) 1GHz Processor or faster 4) .NET Framework 2.0 or later must be installed
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    FileSafe tools

    FileSafe tools

    Cool MS-DOS tools in a stand-alone application form.

    A small library of cool MS-DOS tools in a stand-alone application form. An example of some tool would be: Calculator or password generator.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Fake Name Generator

    Fake Name Generator

    Generates random fake names

    Program generates as many fake names as you want in lots of different languages. Works in Linux, *BSD & Windows. Version 2.0x saves the names to a file called filenames.txt , which you can load into a text editor. Currently v2.0x is the Latest Version.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    SauceWalk Proxy Helper

    Enumeration and automation of file discovery for your sec tools.

    SauceWalk is a freeware(.exe)/Open Source(.py) tool for aiding in the enumeration of web application structure. It consists of 2 parts a local executable (walk.exe) and a remote agent. Walk.exe iterates through the local files and folders of your target web application (for example a local copy of Wordpress) and generates requests via your favourite proxy (for example burp suite) against a given target url. The remote agent can be used to identify target files and folders on a live system via a PHP script on the target server(ASP/JSP coming soon). ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Zero Wine Tryouts

    Zero Wine Tryouts

    An open source malware analysis tool

    Zero Wine Tryouts is an open source malware analysis tool. Just upload your suspicious file (e.g. Windows executable file, PDF file) through the web interface and let it analyze. For more information, please visit project website: http://zerowine-tryout.sourceforge.net/
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go from Data Warehouse to Data and AI platform with BigQuery Icon
    Go from Data Warehouse to Data and AI platform with BigQuery

    Build, train, and run ML models with simple SQL. Automate data prep, analysis, and predictions with built-in AI assistance from Gemini.

    BigQuery is more than a data warehouse—it's an autonomous data-to-AI platform. Use familiar SQL to train ML models, run time-series forecasts, and generate AI-powered insights with native Gemini integration. Built-in agents handle data engineering and data science workflows automatically. Get $300 in free credit, query 1 TB, and store 10 GB free monthly.
    Try BigQuery Free
  • 10

    MLCrypt

    Simple, lightweight, standalone command-line single file encryption.

    ...GnuPG is probably the best application for cross-platform encryption. However, its usage on Windows PCs may be inconvenient (installation administrator rights; large executable size for perhaps just a one-time file decryption, complicated command-line switches for stronger encryption). NCrypt would fulfill this task, but does not operate on 64-bit Windows - MLCrypt was created because of this. The program's primary aim is cascade encryption: create an encrypted outer layer over an existing compressed and encrypted archive file. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    samizdat

    Kerberized Messaging Toolkit for Java

    Samizdat is a toolkit for Java for building Kerberos secured distributed, message-oriented applications. The toolkit contains base classes that simplifies the management of Kerberos login contexts as well as flexibly sign and seal messages between principals using the Java GSS API. The toolkit contains Transformation classes for Kerberizing JMS traffic as well as a super-lean HTTP based protocol stack that supports both Synchronous (RPC) and Asynchronous modalities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Cardito
    ...If you feel there is a need to add any more formats which you encounter, it is very simple to do so from the source. Also, you can raise a ticket for the same. If I feel there is an increasing demand for some file formats to be added to the executable, I'll sure compile it in the exe and release it. Enjoy using Cardito and drop your reviews good or bad. :)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    mFileBinder

    mFileBinder

    An advanced file binder which binds multiple file of any type

    mFileBinder is an advanced file binder which binds multiple file of any type and merges into a single executable file. mFileBinder uses rijndael encryption algorithm to encrypt the file which can make Virus / Trojans Fully Undetectable. Set the drop location of all files and set the execution mode(Background,Foreground) of each file. Predefined set of ICON Package is included set your desired icon. Silently extracts and sequentially execute files.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 14

    ASEPMonitor

    A Windows malware detection system

    ...ASEPMonitor can be used on all version of Windows but at the present time it is not code-signed, so attempts to use it on Vista, Win7, Win8, or Server 2008 (or above) with UAC enabled may cause the program to fail. A code-signed version will be available as soon as I can afford to purchase a code-signing certificate. ASEPMonitor comes with an example config file, the executable program itself, and an installation document that explains how to install and configure ASEPMonitor. Autorunsc must be downloaded separately from the Microsoft Sysinternals website.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    This download site contains the Reliable v1.0.5 remailer setup program for Windows, Reliable executable, Reliable source code, various Reliable manuals, and the Panta-Reliable-Modifications-2005-04-20. These are the original program files and have not been modified. See 'Browse All Files' link for all downloads.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Simple Read-Only protection tool for removable devices. Make Empty File on selected disk with required size. Most common usage - place executable file on USB-flash drive and run it for space filling. When free space will need, delete empty file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Zero Wine is a malware's behavior analysis tool. Just upload your suspicious PE file (windows executable) through the web interface and let it analyze the behaviour of the process.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    FileKiller
    It completely removes a file from your disk without leaving any track. It is very fast. It overwrites any deleted file with blanks or random data N times - where N is given by the user. Also, it changes the filename. No setup is needed.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 19
    ELFTool is an interface to several binary executable file formats such as ELF, PE or Mach-O. ELFTool can be used to interactively manipulate binaries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Store your secret notes in a safe place. Application and document in one executable file: the mechanism to encrypt/decrypt notes is part of it.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 21
    Encrypt and decrypt text with my own encryption algorithm. (Executable included)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Java based Portable hashing application capable of multiple individual file signatures or proprietary group signatures (1 signature for a folder and all its contents). GUI and command line in the same executable. -sha1 -sha256 -sha51 -md5 -crc32
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Yet another Windows password manager, easy to learn and easy to use, no categorization, strong Blowfish encryption. There is no installation, just a single executable in a small package, no mess with the windows system registry.
    Leader badge
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    The Cryptographic Implementations Analysis Toolkit (CIAT) is compendium of command line and graphical tools whose aim is to help in the detection and analysis of encrypted byte sequences within files (executable and non-executable).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Searches for Win32 executables that do not have an executable extension (e.g. exe, com, dll). Can also optionally display all Win32 executables encountered.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB
Gen AI apps are built with MongoDB Atlas
Atlas offers built-in vector search and global availability across 125+ regions. Start building AI apps faster, all in one place.
Try Free →