Showing 65 open source projects for "new"

View related business solutions
  • Comet Backup - Fast, Secure Backup Software for MSPs Icon
    Comet Backup - Fast, Secure Backup Software for MSPs

    Fast, Secure Backup Software for Businesses and IT Providers

    Comet is a flexible backup platform, giving you total control over your backup environment and storage destinations.
    Learn More
  • Improve User Retention, UX and usability from your web or mobile app. Icon
    Improve User Retention, UX and usability from your web or mobile app.

    Get user testing from a global network of passionate crowdtesters. Optimize your web or mobile app for flawless performance.

    Tired of bugs and poor UX going unnoticed despite thorough internal testing? Testeum is the SaaS crowdtesting platform that connects mobile and web app creators with carefully selected testers based on your criteria.
    Learn More
  • 1
    cyphertite

    cyphertite

    Secure, encrypted, zero-knowledge online data backup.

    Introducing Cyphertite 2.0: An all new look and feel in Windows! Cyphertite is a tar-like secure remote archiver. It deduplicates, compresses, and encrypts data prior to transmission, providing total privacy while reducing unnecessary wire traffic. It seamlessly supports IPv6 and IPv4 on a variety of platforms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    The MOTET Cipher & SE Scrambler

    The MOTET Cipher & SE Scrambler

    A tiny, fast encryption tool in C

    MOTET is a tiny, fast super-encipherment application written in C, featuring the new CSPRNG/stream ciphers MOTE and BEDBUG in each of their three variants, as well as the "gold standard" among ciphers, ISAAC. MOTET brings multiple levels of encryption, including a ciphertext-hash, a Vigenere mixing function, a choice of Caesar MOD or Caesar MIX ciphering on the primary key-stream, plus a deeply scrambled "outer shell" as a final super-encryption stage. A unique nonce IV guarantees that each...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    SES Super-Encypherment Scrambler

    SES Super-Encypherment Scrambler

    SES brings back the uncrackable onetime pad, with a digital twist.

    SES brings back the uncrackable onetime pad, with a digital twist. It is well known that a random key of message-length is the only provably unbreakable cipher. SES uses cryptographic strength pseudo-random keys of message-length for its many encipherments, in addition to offering true one-time pad capability for the intrepid. SES is built on ISAAC, Bob Jenkins' unbroken CSPRNG, a fast and simple stream cipher placed in the Public Domain in 1996. SES now gives you the ability to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Secure Internet Live Conferencing

    Secure Internet Live Conferencing

    Secure chat and conferencing protocol

    See http://silcnet.org/ for detailed information. SILC provides common chat and conferencing services like private messages, instant messages, channels and groups, and video and audio conferencing. The main difference to other protocols is that SILC has been designed with security as its main feature. All packets and messages sent in SILC network are always encrypted. Private messages are encrypted end-to-end, channel message are encrypted with channel-wide secret key and secure...
    Leader badge
    Downloads: 39 This Week
    Last Update:
    See Project
  • High-performance Open Source API Gateway Icon
    High-performance Open Source API Gateway

    KrakenD is a stateless, distributed, high-performance API Gateway that helps you effortlessly adopt microservices

    KrakenD is a high-performance API Gateway optimized for resource efficiency, capable of managing 70,000 requests per second on a single instance. The stateless architecture allows for straightforward, linear scalability, eliminating the need for complex coordination or database maintenance.
    Learn More
  • 5
    FreeOTFE

    FreeOTFE

    A free "on-the-fly" transparent disk encryption program for PC & PDAs.

    An upstream source site housing the original files for this mirror is no longer available. With this software, you can create one or more "virtual disks" on your PC/PDA. These disks operate exactly like a normal disk, with the exception that anything written to one of them is transparently, and securely, encrypted before being stored on your computer's hard drive.
    Downloads: 26 This Week
    Last Update:
    See Project
  • 6
    This program will encrypt files. read more about it in the Readme. It incorporates AES256, Serpent, and Twofish. Please comment if you wish to see new features and I will see what I can do. Now has Blowfish Encryption. Now rewritten and imporved on.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    chameleon_14443

    Low-cost, ISO 14443 compliant emulator for contactless smartcards

    ! This website is discontinued ! The new, improved MiniChameleon is maintained as of January 2014 on github: https://github.com/emsec/ChameleonMini ATXmega based emulator for contactless smartcards, designed and maintained by Embedded Security Group at the Ruhr-University in Bochum.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    WhitewallManager

    Whitelist manager

    WhitewallManager is a whitelist manager. It aims to be a web based administration tool for administrators using a default-deny approach to the security of the network they are responsible for. Default-deny is a superior model for network security as compared to default-allow, which is how the security model of most local area networks is modeled. Default-deny disallows all but access granted to resources which you specifically allow. The advantage to this is that any new resources which...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Delay Based Routing Protocol

    Delay Based Routing Protocol

    A distance vector routing protocol based on delay for IPv4 & IPv6

    A new routing protocol called Delay Based Routing Protocol (DBRP). It is a flexible distance vector routing protocol with a metric based on delay. It natively supports IPv4 and IPv6, and can also carry information for common services such DNS servers
    Downloads: 0 This Week
    Last Update:
    See Project
  • Real Time Accounts Payable Automation. Icon
    Real Time Accounts Payable Automation.

    Invoice capture and automation seamlessly integrated with your accounting software

    Yooz provides the smartest, most powerful, and easiest-to-use cloud-based E-invoicing and Purchase-to-Pay automation solution. It delivers unmatched savings, speed, and security with affordable zero-risk subscriptions to more than 5,000 customers and 300,000 users worldwide.
    Learn More
  • 10
    Porz-Wahn is a Security Scanner based on the GPL Source of Nessus (2.2.5), which new versions are closed source.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Post Memory Corruption Memory Analysis

    PMCMA - Post Memory Corruption Memory Analysis

    Pmcma is a tool aimed at automating the most time consuming taskes of exploitation. It for instance determine why an application is triggering a segmentention fault, evaluate if the faulting instruction can be used to write to memory or execute arbitrary code, and list all the function pointers potentially called from a given point in time by an application. Pmcma is a totally new kind of debugger, which allows for easy experimentation with a process in memory by forcing it to fork...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    MetFS is a filesystem in userspace that is FUSE based, encrypted, dynamic sized (increase when new data added, decrease when data removed), single file when it's unmounted and very fast. MetFS 's proved to be running on Linux and FreeBSD.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    Big Numbers Calculator
    Arithmetic, bitwise and base conversion operations over the big integers.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 14
    Application proxy toolkit which inherits the ideology of TIS fwtk and maintains API backwards compatibility. The design goal is to make it simple yet powerful; no performance hacks allowed in the code and library dependencies are reduced to minimum.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    TBFAA/encoder
    A program that encrypts multiple files. It uses new encryption algorithms, such as a Three-Block Feistel chiper, ArchFurry's algorithm and a new hash function. Licensed under the ISC.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This program is used as a tool to check for ASCII code and strip it out to a new file to recover documents that got corrupted or find hidden data in viruses that contain text by the virus writer or spies puting comments in images or other files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    A basic keylogger developed by Alpha.Aetsu (New version in March-April on 2010)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    n00bRAT
    An undetectable Remote Administration Tool -OR- trojan, an all new approach. Easily usable, Client just requires any Web Browser to control remote machine via WebPage. Fooling firewalls/ids/ips security solutions, as it operates like any web-site.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    CyberDemon is highly experimental prototype of the antivirus engine and is based on a new model of artificial neuron (cyberneuron).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    A tool to monitor internet hosts` bandwidth usage in a Linux-NAT network. A daemon collects data and clients display them (currently a Java applet with a graph). It automatically detects new hosts and has a nice summary statistic.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    This project is an attempt to redesign the snort database schema and to provide a new analysis frontend and associated tools.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Snort_inline is a modified version of Snort. It accepts packets from iptables, instead of libpcap. It uses new rule types to tell iptables if the packet should be dropped or allowed to pass based on the Snort rules.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    The Mav.Crypt tool will be upgraded to many different encryption methods. At the Moment, the only method is ROT13, but we are developing some other technics and a new Algorithm. More Infos shortly at the Project Web Page.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    POLUS, a software maintenance tool capable of iteratively evolving running software into new versions, aims to retain backward binary compatibility, support for multithread software and recover already tainted state of running software with low overhead.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Ncat - The culmination of many key features from various Netcat incarnations such as Netcat 1.10, Netcat6, SOcat, Cryptcat, GNU Netcat, etc. Ncat also has a host of new features such as "Connection Brokering", TCP redir (proxying), SOCKS client/server,
    Downloads: 5 This Week
    Last Update:
    See Project