Showing 38 open source projects for "x86"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 1
    kcptun

    kcptun

    A stable and secure tunnel based on KCP with N:M multiplexing and FEC

    ...Available for ARM, MIPS, 386 and AMD64. kcptun is shipped with builtin packet encryption powered by various block encryption algorithms and works in Cipher Feedback Mode, for each packet to be sent, the encryption process will start from encrypting a nonce from the system entropy, so encryption to same plaintexts never leads to a same ciphertexts thereafter. kcptun made use of ReedSolomon-Codes to recover lost packets, which requires massive amount of computation, a low-end ARM device cannot satisfy kcptun well. To unleash the full potential of kcptun, a multi-core x86 homeserver CPU like AMD Opteron is recommended. If you insist on running under some ARM routers, you'd better turn off FEC and use salsa20 as the encryption method.
    Downloads: 24 This Week
    Last Update:
    See Project
  • 2
    UACMe

    UACMe

    Defeating Windows user account control

    Run executable from command line, akagi32 [Key] [Param] or akagi64 [Key] [Param]. First parameter is a number of methods to use, second is an optional command (executable file name including full path) to run. The second parameter can be empty - in this case, the program will execute elevated cmd.exe from the system32 folder. Since 3.5.0 version all "fixed" methods are considered obsolete and removed altogether with all supporting code/units. If you still need them. This tool shows ONLY...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3
    Trexo PDF Signer
    Trexo PDF Signer is a professional-grade, open-source application designed for creating legally binding digital signatures on PDF documents. Built with enterprise security standards in mind, it provides seamless integration with hardware security modules (HSM), software certificates, and native platform keystores.
    Downloads: 15 This Week
    Last Update:
    See Project
  • 4
    Poptop is an open source implementation of a PPTP server. Running under x86 or embedded Motorola ColdFire architectures Poptop provides full interoperability with the Microsoft PPTP VPN client.
    Leader badge
    Downloads: 556 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 5
    X-Ray of Death
    A professional PE (Portable Executable) analysis and modification tool for Windows executables and DLLs.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Screen Protector
    This application was developed to prevent data leaks such as screenshots and video recordings that can be made from systems without user permission. It does not require installation and is designed for portable use. The project is open source. Due to the techniques used to increase security, some security software (antivirus) may perceive it as a threat. Screen Protector Information ve Documents https://beytullahakyuz.gitbook.io/projects/screen-protector
    Downloads: 14 This Week
    Last Update:
    See Project
  • 7
    ESignPDF

    ESignPDF

    Sign PDF with Digital Signature Certificate

    ...A Computer running Windows 7 Service Pack 1 or higher 2. Java Runtime Environment (JRE) 8 or higher if JRE is not installed on your Computer, then download and install from here JRE 8 for Windows x86 -> https://www.azul.com/core-post-download/?endpoint=zulu&uuid=55abea0c-2aa5-4316-aafb-e90847f6ee21 JRE 8 for Windows x64 -> https://www.azul.com/core-post-download/?endpoint=zulu&uuid=5a34da4a-1821-4c79-a57c-7fce38d102c2 JRE 8 for Mac OS -> https://www.azul.com/core-post-download/?endpoint=zulu&uuid=f0851b11-f391-43b0-ae80-4a29f9cc8c9f -> Download ESignPDF jar file -> Double click on downloaded file -> Follow displayed instructions -> Get signed PDF You can request to concerned certificate authority for obtaining Digital Signature Certificate ( DSC ) file despite of USB token if you have any query, then mail me at parvesh.garg@outlook.com
    Downloads: 3 This Week
    Last Update:
    See Project
  • 8
    GoldBug - Encrypted Communications

    GoldBug - Encrypted Communications

    Chat Messenger. E-Mail-Client. Websearch. Filetransfer.

    GoldBug is a decentralized & secure communication suite that offers an integrated e-mail client, an instant messenger & a file transfer. Also included is an URL-RSS-DB & a p2p web search. Current vers. w/ McEliece Algorithm. GoldBug has been 2013 - 2023 ten years just another Graphical User Interface of the Spot-On Encryption Suite. Main GUI features: Minimal & colorful Interface with Tabs in the East. Microsoft & Qt MinGW deprecated Win32 & for Compiling: ●...
    Downloads: 27 This Week
    Last Update:
    See Project
  • 9
    Hidden Gestione Password

    Hidden Gestione Password

    permette di salvare i codici segreti e le password

    ...MiCla Hidden conserva i dati in un archivio codificato con nome "HiddenX.fdb". Questo file è possibile condividerlo anche con la versione android. Sistemi operativi supportati : Windows™ x86 / 64bit
    Downloads: 1 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 10
    Password generator

    Password generator

    Software per generare password casuali di lunghezza variabile

    Software per generare password casuali di lunghezza variabile, in varie modalità e affidabilità, inoltre può attingere ai vocaboli di alcune lingue per ottenere chiavi di accesso più pratiche. Sistemi operativi supportati : Windows™ x86 / 64bit
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Private File

    Private File

    Container software to encrypt files.

    ...All encrypted data is managed by a file saved in a location decided by the user. It is possible to manage multiple archives and save them on a pen drive or other removable media. . Supported operating systems: Windows™ x86 / 64bit
    Downloads: 4 This Week
    Last Update:
    See Project
  • 12
    Backup timer

    Backup timer

    software per effettuare backup temporizzati

    ...Per ulteriori chiarimenti sull'utilizzo della finestra principale vedi Imposta Programma Per la configurazione dei backups consultare Imposta Backups Sistemi operativi supportati : Windows™ x86 / 64bit
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Enigma critta file

    Enigma critta file

    Software per crittare qualsiasi tipo di file con una chiave privata

    ...Pertanto se si desidera che una qualunche persona ci mandi un messaggio cifrato, basta distribuire la propria chiave pubblica. Sistemi operativi supportati : Windows™ x86 / 64bit
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    Alan Framework

    Alan Framework

    A C2 post-exploitation framework

    ...You can run your preferred tool directly in-memory. JavaScript script execution (in-memory without third party dependency) Fully compliant SOCKS5 proxy. Supported agent types: Powershell (x86/x64), DLL (x86/x64), Executable (x86/x64), Shellcode (x86/x64). Server.exe can be executed in Linux (via dotnet core) The network communication is fully encrypted with a session key not recoverable from the agent binary or from a traffic dump. Communication performed via HTTP/HTTPS. No external dependencies or libraries need to be installed. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    sRDI

    sRDI

    Shellcode implementation of Reflective DLL Injection

    sRDI is a compact project that implements a shellcode form of Reflective DLL Injection, enabling DLLs to be converted into position-independent shellcode and loaded in memory by a small in-process PE loader. The codebase groups a C implementation of a reflective PE loader with multiple loader/wrapper components (native C loader, a .NET loader, Python and PowerShell conversion helpers) so authors can produce and embed sRDI blobs in different environments. The loader aims to behave like a...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 16
    Shadowsocks for Windows

    Shadowsocks for Windows

    A secure socks5 proxy for Windows

    ...It also has a flexible industry-level encryption algorithm that supports custom algorithms. Shadowsocks for Windows requires a Microsoft .NET Framework 4.7.2 or higher, as well as Microsoft Visual C++ 2015 Redistributable (x86).
    Downloads: 89 This Week
    Last Update:
    See Project
  • 17
    ISP UNLOCKER

    ISP UNLOCKER

    Unlock Your ISP and access all your restricted websites

    Main Functions Links to official domain names only Users can visit linked sites or enter there on sites Easy and user-friendly interface All data is encrypted over the network Non-installer runs from CD HDD or USB Pen Auto updates System requirements Windows 7 SP1 (x86 and x64) Windows 8 (x86 and x64) Windows 8.1 (x86 and x64) Windows 10 (x86 and x64) .NET Framework 4.6.1 Requires Administrator Privileges Processor Intel or AMD x86 or 64 bit 1 GHz or faster processor 1GB of RAM At least 100 megabytes (MB) available space on the hard disk An active internet connection We have set a few website restrictions within the app for security reasons and to stop browser-based Bruteforce attacks all banks and payment gateways are restricted and will not load from within the app
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Scrollout F1

    Scrollout F1

    An easy-to-use anti-spam email gateway

    ... • Available as 64bit: - ISO image (Internet connection required during installation) - install from scratch (Internet connection required during installation). • Minimum Requirements (for 5,000 messages/day): 1 GB of RAM 30 GB storage drive 1 Processor x86/AMD64 1 Ethernet x 1 IPv4 address UDP ports: 53 123 4500 6277 24441 TCP ports: 25 80 443 2703
    Leader badge
    Downloads: 100,953 This Week
    Last Update:
    See Project
  • 20

    ConvertShellCode

    Disassemble Shellcode.

    ConvertShellcode takes Shellcode as input and disassemble it in a list of instructions in assembly language. This is a CLI tool. Supported formats: - "\xEB\x08\xBA\x4D\x11\x86\x7C\xFF\xD2\xCC\xE8\xF3\xFF\xFF\xFF\x63" - "%uc92b%ue983%ud9eb%ud9ee%u2474%u5bf4%u7381%u1313%u2989" - "%40%6E%40%6E%40%6E%40%6E%40%6E%40%6E%40%6E%40%6E%97%6E%40" - "%u9090" - "\u9090" - "&#x9090" Also take a look at: - https://zeltser.com/convert-shellcode-to-assembly - http://www.aldeid.com/wiki/ConvertShellcode
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21

    openSSLGOSTSigner

    Simple GUI tool for openssl to sign files with GOST algorithm

    ...If you have your ".PEM" file already - nothing else will be needed. But you can easily make one within this utility. All you need to do this - is a ".PFX"(p12) file. In the openssl folder you'll find an x86 and x64 installation packets of openssl commandline utility which are HIGHLY recommended to use, 'cause this utility was created and tested exactly with those versions of openssl.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Mpge

    Mpge

    Mpge

    Mpge is a wrapper of meterpreter (msfconsole, msfpayload and msfencode) of Metasploit Framework directly integrated with Mac OS X Snow Leopard 10.6.8 and with OS X Mavericks 10.9. With Mpge is possible make trojan horse files for Microsoft Windows, Linux and Mac OS X 10.3 Panther, OS X 10.4 Tiger, OS X 10.5 Leopard and OS X Montain Lion 10.8.1 for all Mac OS X is possible make a trojan horse files contains a reverse shell into files .pkg and files .app. I used three real Mac OS X: Attacker:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Bifrozt

    Bifrozt

    High interaction honeypot solution for Linux based systems

    NOTICE: The format of this project has been changed from ISO to using ansible and has been moved to GitHub. Github link: https://github.com/Bifrozt/bifrozt-ansible
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Flicker is a project to execute security-sensitive code in isolation from an operating system such as Windows or Linux. Flicker works on x86-class systems from AMD and Intel with support for dynamic root of trust.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    PhishBlock

    PhishBlock

    A program that detects and blocks phishing, pharming, Hacker's C&C.

    PhishBlock is a security program that detects and blocks Phishing, Pharming, Hacker’s C&C(Command and Control) Servers which are located in databases with URLs, DNS hostnames, and IP Addresses. This program detects and blocks Malware URLs, bad Hosts, and bad IP addresses. Recently, most malware codes are delivered covertly to users’ personal computers through Google ads, SNS, Blogs, BBS and so on, which users visit often. And After the malware codes connect the C&C server(or...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB