20 projects for "convert c# to delphi" with 2 filters applied:

  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 1
    jCasbin

    jCasbin

    An authorization library that supports access control models

    An authorization library that supports access control models like ACL, RBAC, ABAC for Golang, Java, C/C++, Node.js, Javascript, PHP, Laravel, Python, .NET (C#), Delphi, Rust, Ruby, Swift (Objective-C), Lua (OpenResty), Dart (Flutter) and Elixir. In Casbin, an access control model is abstracted into a CONF file based on the PERM metamodel (Policy, Effect, Request, Matchers). So switching or upgrading the authorization mechanism for a project is just as simple as modifying a configuration. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    readpe

    readpe

    The PE file analysis toolkit

    readpe (formerly known as pev) is a multiplatform toolkit to work with PE (Portable Executable) binaries. Its main goal is to provide feature-rich tools for properly analyze binaries with a strong focus on suspicious ones.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 3
    X Certificate and Key management is an interface for managing asymetric keys like RSA or DSA. It is intended as a small CA for creation and signing certificates. It uses the OpenSSL library for the cryptographic operations. Please see the XCA homepage http://hohnstaedt.de/xca
    Leader badge
    Downloads: 131 This Week
    Last Update:
    See Project
  • 4
    Gryptonite

    Gryptonite

    Cross-platform encrypted password and file database

    A user-friendly, cross-platform utility for managing and accessing your most secret data. It stores passwords and whole files, so it can literally store any information you want to keep secret. Access your most-used passwords/URLs right out of a desktop tray icon. For advanced users, it includes a separate utility called Grypto-Transforms, which has a universal hash calculator with all the major hash functions, generic encrypt/decrypt functions and a base64/hex converter. It's not just...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Level Up Your Cyber Defense with External Threat Management Icon
    Level Up Your Cyber Defense with External Threat Management

    See every risk before it hits. From exposed data to dark web chatter. All in one unified view.

    Move beyond alerts. Gain full visibility, context, and control over your external attack surface to stay ahead of every threat.
    Try for Free
  • 5
    RSA Converter
    A multi-platform tool to convert RSA private keys between SFM format (modulus, public exponent, private exponent) and CRT format, in both ways.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 6
    Generates a list of passwords (wordlist) for password crackers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Dr. Crypt Encryption Algorithm & Library
    DrCrypt, based on basic xor(exclusive or) encryption which is designed to be fast and reliable. Also DrCrypt supports 3 platform.(Java, .NET, Win32)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    This is a set of programs convert a .p7m file into an .eml file. A private key of RSA would be needed when you convert an encrypted .p7m file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Generate RSA key pairs of arbitrary length; convert text between formats or use keys to transform/crypt text. Supports decimal, hexadecimal, base64 and text input and output. Entirely ANSI C++; no external dependencies.
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 10
    Common Hardware Recovery Solutions by Ukrainian-Russian network
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    The goal of this project is to design and write comercial quality software and aplications with fully respect to free software (like in "free speach"). The software designed by us will target various fields: from scientific applications to multimedia an
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    “garuda” is an intrusion detection system against wireless threats. It is a progressive proof of concept project to ward off wireless threats such as war-drivers, rogue AP, wifi DoS and MAC spoofing attacks. Please enjoy and we welcome your volunteerism.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Output spool reader for Snort! This program decouples output overhead from the Snort network intrusion detection system and allows Snort to run at full speed. It takes input and output plugins and can therefore be used to convert almost any spooled fil
    Downloads: 5 This Week
    Last Update:
    See Project
  • 14
    This is a multiplatform general utility suite for use with existing network stumbling software, such as Kismet or NetStumbler. The program will convert between multiple output logs, including the popular wi-scan format, between platforms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    sechk - SEcurity CHecKer It is a powerful and useful tool to check if you got exploited and rooted, it will use checksum comparation via md5 sum, it exchanges file lists and csums from the sechk server. It\'s gonna work with all posixes and unixes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    A command line tool to create secure encrypted file using private key. You must provide key string to convert you source file into ecrypted one.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    This is a simple program to encode normal, ASCII text in to its ASCII value and then convert that number to roman numerals. Ideal for quick notes to friends that you don't want others to easily read. Unlike encryption though, I just described the algo
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    This project will convert the RSA Ace/Agent Authentication API 5.0.1 into JAVA API by using JNI Interface. Currently RSA doesn\\\\\\\'t provide any Java API.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Packet2sql will convert any text file/log file which contains ipchains packet logs into a stream of SQL inserts which can be used as the base for a firewall-analyzing database application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    IDTrans is developing b2b technologies. The primary aspects of the project are secure transmission libraries, a key server, and a application to demonstrate the use of the libraries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next