Showing 21 open source projects for "processing"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Network Management Software and Tools for Businesses and Organizations | Auvik Networks Icon
    Network Management Software and Tools for Businesses and Organizations | Auvik Networks

    Mapping, inventory, config backup, and more.

    Reduce IT headaches and save time with a proven solution for automated network discovery, documentation, and performance monitoring. Choose Auvik because you'll see value in minutes, and stay with us to improve your IT for years to come.
    Learn More
  • 1
    ModSecurity

    ModSecurity

    Cross platform web application firewall (WAF) engine for Apache

    ...Libmodsecurity is one component of the ModSecurity v3 project. The library codebase serves as an interface to ModSecurity Connectors taking in web traffic and applying traditional ModSecurity processing. In general, it provides the capability to load/interpret rules written in the ModSecurity SecRules format and apply them to HTTP content provided by your application via Connectors. Before starting the compilation process, make sure that you have all the dependencies in place.
    Downloads: 24 This Week
    Last Update:
    See Project
  • 2
    XORimg

    XORimg

    A secure open source tool for performing XOR operations on images

    XorImg Decryptor (Beta) A lightweight Windows utility designed to decrypt images encrypted via XOR operations, specifically compatible with files processed through xorimg.ru. This tool allows users to reconstruct original images by applying a stored XOR key, ensuring privacy and offline processing.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    KeyKiller-Cuda

    KeyKiller-Cuda

    Solving the Satoshi Puzzle

    KeyKiller is a GPU-accelerated version of the KeyKiller project, designed to achieve extreme performance in solving Satoshi Nakamoto's puzzles using modern NVIDIA GPUs. KeyKiller CUDA pushes the limits of cryptographic key search performance by leveraging CUDA, thread-beam parallelism, and batch EC operations. The command-line version is open-source and free to use. For the paid advanced graphics version, please visit: https://gitlab.com/8891689/KeyKiller-Cuda/
    Downloads: 10 This Week
    Last Update:
    See Project
  • 4
    CyberGod KSGMPRH

    CyberGod KSGMPRH

    Open-Source antivirus for Windows

    This is an effective tool which is capable of detecting thousands and thousands of malware in your PC, including the shortcut virus to nasty ransomware, The database is regularly updated. See the video for how to use this tool. Version: 1.3 MD5: 707D4BE2AA4547A542A7EEFDB7BC4C4D SHA-1: 899B80928DF59C5745B56480DAA6A51E7F65CB18A4 Source code MD5: 38B3A08D62E7ADD2EE30FCA375207499 IMPORTANT: =========== FULL VERSION :...
    Leader badge
    Downloads: 10 This Week
    Last Update:
    See Project
  • Zendesk: The Complete Customer Service Solution Icon
    Zendesk: The Complete Customer Service Solution

    Discover AI-powered, award-winning customer service software trusted by 200k customers

    Equip your agents with powerful AI tools and workflows that boost efficiency and elevate customer experiences across every channel.
    Learn More
  • 5

    NCrypted

    NCrypted - simple file encryption software with GPU support

    ...This software was designed to be as simple as possible, so you won't find any fancy, flashy gui elements or complicated advanced options. You can also use it directly from command line. NCrypted can automatically detect and take advantage of your NVidia graphics card to speed up the file processing.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6

    inKey

    inKey - small & strong encryption utility (> 800 000 bit).

    inKey - small encryption utility with big encryption block (> 800 000 bit). This program can protect very sensitive data, such e-mail, which has size up to 100 kilobytes, but processing speed might be too small with the bigger size of source data. ProcessingTime(data) = O(data ^ 2); USE IT ONLY TO PROTECT SMALL FILES (~ 100 Kb or a bit bigger). You can use "PaperBack" to print your 100 Kb encrypted *.iK file to A4 paper and get strong encrypted digital letter. https://sourceforge.net/projects/paperback P.S. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7

    EAESCrypt

    Extended AES Cryptography

    EAEScrypt is a utility that is designed to protect sensitive data using secure encryption. It uses the Advanced Encryption Standard (AES) as published by the Federal Information Processing Standards Publications (FIPS PUBS) and issued by the National Institute of Standards and Technology (NIST). The official version of AES allows only 128-bit, 192-bit or 256-bit keys, and EAESCrypt is fully compliant with FIPS-197 when using these values. But EAEScrypt can use any key size from 128-bit to 2048-bit. EAESCrypt is a command line utility. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Cracker-ng

    Cracker-ng

    Cracker-ng is a multiple file password finder.

    /!\ Developer(s) needed to optimize routines, multi-processing; any kind of help is accepted :)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    ENIGMA 2000

    ENIGMA 2000 is a reliable file encrypter for DOS shell

    ENIGMA 2000 is a symmetric cryptographic algorithm developed in C++ for Windows, to encrypt any file. It is not optimized for speed processing but it is extremly reliable. Tests state that a huge input file just with zeros, will return an output file whose frequency analysis is white noise. It uses six phases to encrypt any file and the phases sequence depends on the password. On phase 5, it uses the Rubik's cube paradigm to encrypt the data. It's extremly reliable and the password varies between 8 and 16 characters. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Loan management software that makes it easy. Icon
    Loan management software that makes it easy.

    Ideal for lending professionals who are looking for a feature rich loan management system

    Bryt Software is ideal for lending professionals who are looking for a feature rich loan management system that is intuitive and easy to use. We are 100% cloud-based, software as a service. We believe in providing our customers with fair and honest pricing. Our monthly fees are based on your number of users and we have a minimal implementation charge.
    Learn More
  • 10
    The PKI Framework (PKIF) is a cross-platform library for performing PKIX-compliant certificate processing. It includes support for SCVP, OCSP, CMS and Timestamps. It uses Windows CAPI, NSS or Crypto++ for cryptographic services and hardware support.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    edx33v2 is a Silkroad Online proxy application that uses a man-in-the-middle attack vector to provide the end user full access to the underlying communication channel between the client and server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    An alternative to the string library for C and C++ which is more functional and does not have buffer overflow problems.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 13
    QFileHasher
    A program to calculate and verify checksums of multiple files with wizard-like GUI. Supports 12 hashes: CRC32, MD2, MD4, MD5, SHA1, SHA2, RIPEMD,Whirlpool, ED2K, AICH, Tiger, TTH. Allows processing of nested directories and updating of checksum files
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Video surveillance for Windows platform (for now) with nice GUI. It supports multiple camera and video file inputs. Detects motion in input video using fast algorithms. Alarm notification is provided by e-mail, alarm sound and video recording.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 15
    Generate RSA key pairs of arbitrary length; convert text between formats or use keys to transform/crypt text. Supports decimal, hexadecimal, base64 and text input and output. Entirely ANSI C++; no external dependencies.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Command line encryption tool for one time, daemon, or stream data processing. Data stats, check sums, conversion to/from text. Data/keys from files, pipes, standard input. In-place/diverted processing or data-analysis-only. Random, file, password keys.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    CCTVnix will be a complete CCTV video surveillance system for use with V4L2 complient capture cards. Much like Kodicom, and other commercial Windows based software, it will feature motion detection, remote interfaces and event notification. Watch this sp
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    iDVR (formerly Devolution Security System) is a video surveillance system which can handle up to 16 cameras with motion detection, notification and record on motion to mp4. Stream over the LAN (Multicast) or Over the Net (Unicast).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    TextCodec can encode texts using simple algorithm and then decode them by using statistical language data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Turn-key secure credit card processing appliance
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    BP-Sim

    BP-Sim

    EFT simulator

    BP-Sim allows users to perform an extensive range of tests across the chain of payment services and thus identify potential causes of failures before launching payment systems into production. BP-Sim consists of following modules: BP-Source, BP-Host, BP-HSM and BP-SeeEMV. BP-Source and BP-Host are payment transaction simulators supporting formats as: APACS30, AS2805, many ISO8583 dialects, IFSF, SPDH, TCMP. Together with industry-standard cryptography, multi-platform support, configurable...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next