Showing 150 open source projects for "using"

View related business solutions
  • Vibes don’t ship, Retool does Icon
    Vibes don’t ship, Retool does

    Start from a prompt and build production-ready apps on your data—with security, permissions, and compliance built in.

    Vibe coding tools create cool demos, but Retool helps you build software your company can actually use. Generate internal apps that connect directly to your data—deployed in your cloud with enterprise security from day one. Build dashboards, admin panels, and workflows with granular permissions already in place. Stop prototyping and ship on a platform that actually passes security review.
    Build apps that ship
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 1

    CDSecret

    File encrypt software

    Using this software, you will able to encrypt/decrypt your files. If you get dll error, please goto http://www.microsoft.com/en-us/download/details.aspx?id=40784, and download the redistributable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    lecithine

    FUSE File system powered by secret sharing scheme

    Lecithine is a FUSE (file system in user space) using a secret sharing scheme. You can use Lecithine as regular file system. When writing to disk, data will be devided into randomly chosen pieces (secret shares) and stored into different places. Upon reading, the shares are merged together such that in turn the plaintext results. From a cryptographers point of view, there is no symmetric or private key ever needed to produce a ciphertext.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    BitKiller
    BitKiller securely shreds files and directories, removing them completely from your hard disk. It can quickly and efficiently overwrite files using anything from random data to the Gutmann method. It also changes filenames to make them harder to find. No setup or installation needed.
    Leader badge
    Downloads: 60 This Week
    Last Update:
    See Project
  • 4
    Cube Password Manager

    Cube Password Manager

    A secure and light-weight password manager

    ...This password manager is very light-weight, extremely secure and very easy to use with a simple, no-frills interface. All the passwords are stored locally on your PC, where it is encrypted using a secure and unique encryption method. NOTE: Should you want to compile this yourself, this project was built using Visual Studio 2010. The DLL dependencies are included in the main VS files zip file(taken out of the "redist" folder of VS). There is a folder containing the project written in QT, so you can compile and run this in Linux, although the QT project is not being updated anymore. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • 5
    PhishBlock

    PhishBlock

    A program that detects and blocks phishing, pharming, Hacker's C&C.

    PhishBlock is a security program that detects and blocks Phishing, Pharming, Hacker’s C&C(Command and Control) Servers which are located in databases with URLs, DNS hostnames, and IP Addresses. This program detects and blocks Malware URLs, bad Hosts, and bad IP addresses. Recently, most malware codes are delivered covertly to users’ personal computers through Google ads, SNS, Blogs, BBS and so on, which users visit often. And After the malware codes connect the C&C server(or...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    RSA Converter
    A multi-platform tool to convert RSA private keys between SFM format (modulus, public exponent, private exponent) and CRT format, in both ways.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    CryptoEngine

    CryptoEngine (C) is a DLL Library that provide Cryptography Services.

    CryproEngine (C) is a Class Library (DLL) that provide (API) interface, programmer can use it when writing applications that needs Standard Cryptography Algorithms, using Qt-SDK. Actually this library is a Wrapper for Crypto++ library, by Wei Dai, which is approved by NIST (see www.cryptopp.com for details), CryptoEngine is intended to provide simple & easy to use interface (API) for standard cryptography algorithms for Qt-SDK Developers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Safe Autorun

    Safe Autorun

    Creates permanent autorun.inf to avoid USB infections

    Safe Autorun is an application which can be used to create permanent autorun.inf file in USB removable drives so viruses/malwares can't create their own autorun.inf file to infect others. You can remove created autorun.inf file using this application too. It has both 32 and 64 bit version and is compatible with Windows XP, 7 and 8. It only works with FAT32 file system which most USB removable drives are FAT32. It needs Visual C++ 2008 Redistributable Package.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    SSL Diagnos

    SSL Diagnos

    SSL Strength Evaluation and Test Utility

    ...It can also be used for testing and rating ciphers on SSL clients. It has also specific support for pop3s, sip, smtp and explicit ftps. Tests for heartbleed (including dtls). Furthermore a separate tool, SSLPressure, not using openssl can be used to check the whole spectrum of possible SSL protocols on a server. Can also be used for testing ssl for mssql-servers (was added since nessus did not support this) and contains mitm poc for stripping ssl from mssql-connections.
    Downloads: 3 This Week
    Last Update:
    See Project
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 10
    Bigram Table Generator

    Bigram Table Generator

    A program to generate random reciprocal bigram tables

    A command-line program to encrypt/decrypt a message using a random reciprocal bigram table and write a bigram table to a text file. Executing the program without any command-line arguments starts bigram in message encryption/decryption mode. The program prompts for a password or passphrase and a message to encrypt/ decrypt. After the message is entered the ciphertext is displayed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Azrar

    Azrar

    Encryption addressing long-term data secrecy

    ...To achieve long-term data secrecy, Azrar differs from other approaches in terms of not to rely on effective computational deficiencies. It combines a one-time pad with a stream cipher method using the strong cryptographic hash function (family) Skein. Azrar fulfills business requirements for secure data transfer and supports several operating systems natively. It does not use a runtime environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    QPass password manager
    QPass is easy to use, open source password manager application with built-in password generator. You can store in it's database such data as passwords and logins which will be encrypted using AES-256 with PBKDF2(number of iterations set by user). Each entry can include additional information about entry such as name, url adress and description.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 13
    PiShare

    PiShare

    RetroShare binaries compiled for Raspberry Pi

    compiled RetroShare binaries, and packaged for Raspberry Pi using Debian 7.0 Wheezy ARMHF known Raspbian If you want to compile it yourself, download the source-tarball, it is only ~7MB big, or pull the code repository with SubVersioN. compiling takes up to 2-3 hours. or install the .deb files with dpkg -i "retrosharefilename".deb if necessary make a "apt-get update && apt-get upgrade" to update your system for all how to start it in a detached screen session: screen -t retroshare -dmS RetroShare retroshare -display :0 If you run headless, i suggest to use X11VNC to control it remote. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    ICRON's Keyloger

    Version one of ICRON's Basic Keylogger

    ...I do not condone any nefarious uses for said keylogger. DO NOT USE ON ANY SYSTEM THAT IS NOT YOUR OWN. Also you must inform all users of said computer (if their are multiple accounts) that you will be using said program. I am not responsible for how you use this. (*Note: Looking for more positive criticism than actual publishing)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    EAESCrypt

    Extended AES Cryptography

    EAEScrypt is a utility that is designed to protect sensitive data using secure encryption. It uses the Advanced Encryption Standard (AES) as published by the Federal Information Processing Standards Publications (FIPS PUBS) and issued by the National Institute of Standards and Technology (NIST). The official version of AES allows only 128-bit, 192-bit or 256-bit keys, and EAESCrypt is fully compliant with FIPS-197 when using these values.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    yeo

    command-line steganography application

    designed to hide messages in jpg and png images without the requirement for any plain-text files. uses aes256 on data, using an sha256 hash of the password as the encryption key. rotates the password by 1 character, and uses an sha256 hash of that for the random seed for the image pointer access. security and invisibility of data is currently being peer-reviewed (since ~2014). At this point it looks like no vulnerabilities have been identified yet.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Sudoku Solver

    A simple sudoku solver !

    This program solves sudoku grids, using human techniques and brute force. It is written in c++ using Qt.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18

    iPassword Generator

    portable password generator

    iPassword Generator is a free, lightweight and portable Windows application designed to create a strong and unique password for each of your applications or online accounts from the keyfile you selected using a technology called Tabula recta. In addition, you are allowed to encrypt and hide your keyfile inside any other file with the AES-256( Advanced Encryption Standard ) algorithm. The main difference between iPassword Generator and other password creators is that, the passwords created by it looks like random strings, but they're not. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Hash Monster
    A versatile gui and console application capable of generating and comparing hashes using a variety of popular hashing libraries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Lib/Framework for using SmartCards in Qt
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    ClamCour is a Courier-MTA multithread filter that allows Courier to scan mail for viruses using Clam Antivirus package.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    mysafekey
    MySafeKey provides a strong authentication with a classical usb flash. The authentication is achieved using several elements including the USB stick identifier, the user ID and password. These elements are combined, encrypted and stored on the flash.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    ...German/Austrian ID-card and passport). It can check the numbers for correctness. Also it can extract information from the numbers (e.g. birthday) or generate numbers using custum values.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    Secure Enterprise File Transfer Server
    SEFT is an appliance based (physical or virtual) secure enterprise file transfer system. It is able to send and receive files in an ad-hoc fashion or based on a schedule. SEFT supports many communication protocols such as HTTPS, SFTP, FTPS, SOAP, etc
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    MUTE is a secure, anonymous, distributed communications framework. Node-to-node connections are encrypted, and messages are routed using an ant-inspired algorithm. The first MUTE-based app supports anonymous file sharing.
    Downloads: 8 This Week
    Last Update:
    See Project