Showing 34 open source projects for "32 bit iso"

View related business solutions
  • Achieve perfect load balancing with a flexible Open Source Load Balancer Icon
    Achieve perfect load balancing with a flexible Open Source Load Balancer

    Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.

    Boost application security and continuity with SKUDONET ADC, our Open Source Load Balancer, that maximizes IT infrastructure flexibility. Additionally, save up to $470 K per incident with AI and SKUDONET solutions, further enhancing your organization’s risk management and cost-efficiency strategies.
  • An All-in-One EMR Exclusively for Therapy and Rehab. Icon
    An All-in-One EMR Exclusively for Therapy and Rehab.

    Electronic Medical Records Software

    Managing your therapy and rehab practice is a time-consuming process. You spend hours on paperwork, billing, scheduling, and more. Raintree’s Therapy & Rehab EHR is here to help you manage your practice more efficiently. With our all-in-one solution, you’ll get the tools you need to streamline your therapy and rehab practice, improve patient care, and get back to doing what you love.
  • 1
    ExtPassword!

    ExtPassword!

    Recover passwords stored on external drive

    ExtPassword! is tool for Windows that allows you to recover passwords stored on external drive plugged to your computer. ExtPassword! can decrypt and extract multiple types of passwords and essential information, including passwords of common Web browsers, passwords of common email software, dialup/VPN passwords, wireless network keys, Windows network credentials, Windows product key, Windows security questions. This tool might be useful if you have a disk with Windows operating system...
    Downloads: 41 This Week
    Last Update:
    See Project
  • 2
    Crypt Tool

    Crypt Tool

    A simple password manager for Windows based on OpenSSL

    A simple password manager for Windows based on OpenSSL (included). Allow encryption, decryption of messages, passwords, files and images with AES 256 CBC algorithm. Integrated FTP(S) client. Console based commands, random password generator. Stand alone application need no installer, runable from USB sticks. Working with Windows 7-11 (OpenSSL 1.1.1s 32 Bit) Read Wiki for more details.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    This software adds OpenSSL encryption and decryption commands to the menu that pops up when you right-click on a file or folder in Windows XP/Vista/7/8/10 (32-bit or 64-bit). To encrypt or decrypt a file or folder, just right-click on it and select the desired command.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    LEACrypt

    LEACrypt

    TTAK.KO-12.0223 Lightweight Encryption Algorithm Tool

    The Lightweight Encryption Algorithm (also known as LEA) is a 128-bit block cipher developed by South Korea in 2013 to provide confidentiality in high-speed environments such as big data and cloud computing, as well as lightweight environments such as IoT devices and mobile devices. LEA is one of the cryptographic algorithms approved by the Korean Cryptographic Module Validation Program (KCMVP) and is the national standard of Republic of Korea (KS X 3246). LEA is included in the ISO/IEC 29192...
    Downloads: 1 This Week
    Last Update:
    See Project
  • All-in-One Payroll and HR Platform Icon
    All-in-One Payroll and HR Platform

    For small and mid-sized businesses that need a comprehensive payroll and HR solution with personalized support

    We design our technology to make workforce management easier. APS offers core HR, payroll, benefits administration, attendance, recruiting, employee onboarding, and more.
  • 5

    ProxyCrypt

    Encrypted volumes through command line

    ... for more informations and an example of use: https://sourceforge.net/p/proxycrypt/doc/ Password for extracting 32-bit builds is: proxycrypt Requirements: - Windows XP, Vista, 7, 8, 8.1,10 or 11 - ImDisk Virtual Disk Driver or Arsenal Image Mounter - Administrative privileges - CPU with SSE2 instructions - About 140 MB of RAM temporarily required for password checking with default settings Hashes of all versions: https://sourceforge.net/p/proxycrypt/doc/Hash
    Downloads: 7 This Week
    Last Update:
    See Project
  • 6

    ProxyCryptGUI

    An easy to use 'front-end' to ProxyCrypt encryption application

    About ProxyCryptGUI 2022-03-11: • Setup now bundles ProxyCrypt 2.6.3 • See ProxyCrypt website for info on ImDisk driver issues • this version fixes some key files issues. It does not support 32-bit. It removes previous 32-bit exe's. Please treat this version as a beta release. Note: It appears to work on Windows 11. • ProxyCryptGUI is a free application that provides a Windows GUI (graphical user interface) for ProxyCrypt to manage encrypted virtual disk drives. • The setup file...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Pharos

    Pharos

    RTOS for Secure, Safe and Real-Time Systems

    Pharos is a free open-source RTOS for secure, safe and real-time systems with the following characteristics: - Memory and enhanced time partitioning (TSP) - Native support for sporadic, periodic and aperiodic threads - Fixed-priority preemptive scheduler - Execution time protection (threads are prevented from executing for more time than they are configured to) - Small size (full image has ~100 to 300KiB text, ~30KiB data) - Hard real-time determinism - Fast critical sections - Prioritized...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    ELF Workbench

    A workbench to analyze ELF object files

    ELF Workbench is a program intended for analyzing/inspecting ELF object files that also allows to patch them. It provides an interactive user interface similar to that used by GDB. See feature list below for more details.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    TEAENCRYPTION

    A TEA encryption with GUI for 32-bit 64-bit works only on windows.

    A algorithm encryption based on TEA (Tiny encryption Algorithm) that will help the user to encrypt his text files and decrypt whenever the user wants as long as he uses the same key.It is simple to use but doesnt work with really really long text files.Will implement mac and other OS in the future.
    Downloads: 0 This Week
    Last Update:
    See Project
  • HRSoft Compensation - Human Resources Software Icon
    HRSoft Compensation - Human Resources Software

    HRSoft is the only unified, purpose-built SaaS platform designed to transform your complex HR processes into seamless digital ones

    Manage your enterprise’s compensation lifecycle and accurately recognize top performers with a digitized, integrated system. Keep employees invested and your HR team in control while preventing compensation chaos.
  • 10

    The Encode

    Encode your text files

    This software is intended to encode your text files efficiently. You can decode them later using the same algorithm you used to encode it. Encode is professionalism packed simply and freely. You can use Encode for any non-illegal purposes. You can make any number of copies and redistribute Encode as it is.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    AUM CSPRNG & Stream Cipher

    AUM CSPRNG & Stream Cipher

    A minimal CSPRNG reflecting the Zen of cipher design

    AUM is an extremely fast, small-state, cryptographically secure pseudo-random number generator and stream cipher. AUM exhibits uniform distribution, mixes rapidly, has no detected bias, and comes in three variants: AUM16, with an internal state array of 16+4 32-bit words; AUM32, with an internal state of 32+4 words; and AUM64 with a 64+4-word state. The former permit seeding with a key of up to 512 or 1024 bits, the latter with a 2048-bit key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    MOTE CSPRNG & Stream Cipher

    MOTE CSPRNG & Stream Cipher

    A family of small-state CSPRNGs and Stream Ciphers

    MOTE is a fast, small-state, cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. MOTE exhibits uniform distribution, mixes extremely rapidly, has no detected bias, and comes in three variants: MOTE8, with an internal state array of 8+4 32-bit words; MOTE16, with an internal state of 16+4 words; and MOTE32 with a 32+4-word state. The former permit seeding with a key of up to 256 or 512 bits, the latter with a 1024-bit key. Reduced to essentials, MOTE is only 5...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    BEDBUG CSPRNG & Stream Cipher

    BEDBUG CSPRNG & Stream Cipher

    A family of FLEA-inspired CSPRNGs and Stream Ciphers

    BEDBUG is a small, fast, cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It exhibits uniform distribution, mixes rapidly (with worst-case avalanche better than 16-bits), has no detected bias, and comes in three variants: BEDBUG128, with an internal state array of 128+3 32-bit words; BEDBUG256, with an internal state of 256+3 words; and BEDBUG512 with a 512+3-word state. The former permit seeding with a key of up to 4096 or 8192 bits, the latter with a 16384...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Fake Name Generator

    Fake Name Generator

    Generates random fake names

    Program generates as many fake names as you want in lots of different languages. Works in Linux, *BSD & Windows. Version 2.0x saves the names to a file called filenames.txt , which you can load into a text editor. Currently v2.0x is the Latest Version.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 15
    ISC - The ISAAC Stream Cipher

    ISC - The ISAAC Stream Cipher

    ISC lets you encrypt & decrypt text and files of any type up to 4GB

    ISAAC is a cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It was developed by Bob Jenkins from 1993-1996 and placed in the Public Domain. ISAAC is fast - especially when optimised - and portable to most architectures in nearly all programming and scripting languages. After more than 20 years of existence ISAAC has not been broken, and the little program you have here allows you to use it to encrypt and decrypt text of arbitrary length, files of any type,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Safe Autorun

    Safe Autorun

    Creates permanent autorun.inf to avoid USB infections

    Safe Autorun is an application which can be used to create permanent autorun.inf file in USB removable drives so viruses/malwares can't create their own autorun.inf file to infect others. You can remove created autorun.inf file using this application too. It has both 32 and 64 bit version and is compatible with Windows XP, 7 and 8. It only works with FAT32 file system which most USB removable drives are FAT32. It needs Visual C++ 2008 Redistributable Package.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17

    Smooth-Sec

    IDS/IPS Linux distribution.

    Smooth-Sec is a lightweight and fully-ready IDS/IPS (Intrusion Detection/Prevention System) Linux distribution based on Debian 7 (wheezy), available for 32 and 64 bit architecture. The distribution includes the latest version of Snorby, Snort, Suricata, PulledPork and Pigsty. An easy setup process allows to deploy a complete IDS/IPS System within minutes, even for security beginners with minimal Linux experience. Join the community, share your experiences, tips and ideas.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 18
    CodeName C.I.A V3 Wheezy 7.1 Kali-Linux

    CodeName C.I.A V3 Wheezy 7.1 Kali-Linux

    CodeName CIA Wheezy7.1 kali-linux IMPROVE 2 Darkc0d3 TOP-HAT-SEC Team

    System: Debian Wheezy 7.1 Stable Kernel: 3.7-trunk-amd64 x86_64 (64 bit) Multiarch Desktop: Gnome Distro: Wheezy 7.1 Kali GNU/Linux 1.0 User name: root/Pass: toor FOR IMPORTANT FIX AND TIPS: LOOK THE TICKETS AND FILES SECTION To install the distribution could begin to Default or live mode, and the Application menu select System tools >Live Installer. Video in Youtube http://www.youtube.com/watch?v=dPhLYG8Wr-g The project has keep Update all the time, there is always ways to further improve...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 19
    scannerz pentesting os Totally based on Ubuntu 12.04 Lts 32-bit. Tools arsenal taken from Kali Linux repositories and re-packed to fit Ubuntu file system.More than 300 penetration testing tools use. root user pass - user - root pass - toor
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Windows Screen Locker

    Windows Screen Locker

    Tool for lock your computer screen to protect accessibility by others.

    Screen Locker Description: Screen Locker is a security tool for all 32 bit and 64 bit editions of Windows. Using this tool you can lock your PC screen to protect accessibility from other users. Instruction: Choose a password, confirm password and click OK. Then your screen will locked. You can unlocked it only by given correct password and can change it by clicking 'Change Password' button.If you forget your password then press windows button from your keyboard and restart your PC. License...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 21

    smbexec

    A rapid psexec style attack with samba tools

    ... Tested on: - BackTrack 5R2 - 32 & 64 Bit - Ubuntu 10.04.4 LTS - 32 & 64 Bit - Ubuntu 12.04 LTS - 32 & 64 Bit - Debian 6 - 32 & 64 Bit - Fedora 16 - 32 & 64 Bit - Fedora 17 - 32 & 64 Bit Coming Soon: Pentoo Pwnie Express - Pwn Plug 1.1 Happy hunting!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    ORDO vers.1.0

    AES-128, Linux, OpenBSD, Assembly-Language

    Small cryptographic command line tool for LINUX and OpenBSD (x86) completely in 32-Bit Assembly Language. ORDO encrypt/decrypt files (max. size 2 GB) with AES-128-Algorithm (Rijndael) in CBC-Mode (Cipher-Block-Chaining). No libs are included, only system-calls are used. ORDO is under BSD License.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Hash Codes
    Program can hash data from keyboard, file or CD/DVD by Adler32, CRC32, CRC64, GOST, HAVAL, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, TIGER or Whirlpool algorithm.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 24

    RC4-32.ASM

    Code to brute force the 32-bit key used to RC4 encrypt .pwl files.

    PROJECT HAS MOVED TO GITHUB: https://github.com/alex-georgiou/rc4-32.asm Code to brute force the 32-bit key used to RC4 encrypt .pwl files. Assembles to a 992 byte .COM file using the Intel Architecture Assembler v1.0 Copyright (c) 1998 augusto at dcc.ufmg.br. http://web.archive.org/web/19981205090800/http://www.dcc.ufmg.br/~augusto/project/iasm.zip
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    This java tools design to decrypt and obtain the MS Windows Admin password from encrypted password get from Amazon EC2. It can run as standalone application or embedded as Java applet in HTML.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next