Showing 226 open source projects for "ti89/page/2"

View related business solutions
  • Top-Rated Free CRM Software Icon
    Top-Rated Free CRM Software

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
    Get started free
  • Red Hat Enterprise Linux on Microsoft Azure Icon
    Red Hat Enterprise Linux on Microsoft Azure

    Deploy Red Hat Enterprise Linux on Microsoft Azure for a secure, reliable, and scalable cloud environment, fully integrated with Microsoft services.

    Red Hat Enterprise Linux (RHEL) on Microsoft Azure provides a secure, reliable, and flexible foundation for your cloud infrastructure. Red Hat Enterprise Linux on Microsoft Azure is ideal for enterprises seeking to enhance their cloud environment with seamless integration, consistent performance, and comprehensive support.
    Learn More
  • 1
    ansvif

    ansvif

    An advanced cross platform fuzzing framework suited to find code bugs.

    ansvif, or A Not So Very Intelligent Fuzzer, suited to find bugs in code by throwing garbage arguments, files, and environment variables at the target program, that you may or may not have the source code to. It supports many features, such as buffer size, randomization of the buffer size, random data injection, templates, and much more. The purpose of this project is to identify bugs in software, specifically bugs that can induce a segmentation fault under various conditions. This aids...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Wi-PWN

    Wi-PWN

    ESP8266 firmware for performing deauthentication attacks

    ESP8266 firmware for performing deauthentication attacks, with ease. Wi-PWN is a firmware that performs death attacks on cheap Arduino boards. The ESP8266 is a cheap microcontroller with built-in Wi-Fi. It contains a powerful 160 MHz processor and it can be programmed using Arduino. A deauthentication attack is often confused with Wi-Fi jamming, as they both block users from accessing Wi-Fi networks. The 802.11 Wi-Fi protocol contains a so-called deauthentication frame. It is used to...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 3
    CMP for OpenSSL

    CMP for OpenSSL

    CMP [RFC4210] implementation based on OpenSSL

    | | PLEASE NOTE: this project has MOVED to https://github.com/mpeylo/cmpossl | | An implementation of the Certificate Management Protocol (CMP) version 2, defined in RFC 4210, 4211, and 6712. This git branch of OpenSSL provides an RFC compliant implementation including a CMP client CLI.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Motion monitors the video signal from one or more cameras (video4linux interface) and is able to detect if a significant part of the picture has changed. Features: interval snapshots, live streaming webcam, mpeg generation, database interface, OSD etc. For the latest releases and deb packages go to the Motion home page
    Downloads: 9 This Week
    Last Update:
    See Project
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 5
    Scandiff is a tool used to find the differences between two nmap scan logs and display results to the user. Scandiff detects changes in port status, operating system, scantime, nmap version, and more. Supports nmap grepable and XML output formats
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    rtl2832-entropyd

    Use an rtl2832 USB dongle to generate random data for the linux kernel

    ... already has a module to use the rtl2832 for its intended purpose, listening to radio, so if you want to use it to generate entropy, you will have to blacklist that module, so it doesn't load. If it is loaded, this program will not be able to acquire the rtl2832 device, and won't run. Create the file /etc/modprobe.d/blacklist-dvb_usb_rtl28xxu.conf with the line blacklist dvb_usb_rtl28xxu in it. The project website is an html version of the man page, so you can find more complete information there.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    OMEN

    OMEN

    OMEN: Ordered Markov ENumerator - Password Guesser

    OMEN is a Markov model-based password guesser written in C. It generates password candidates according to their occurrence probabilities, i.e., it outputs most likely passwords first. OMEN significantly improves guessing speed over existing proposals. If you are interested in the details on how OMEN improves on existing Markov model-based password guessing approaches, please refer to OMEN: Faster Password Guessing Using an Ordered Markov Enumerator. OMEN consists of two separate program modules...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    nfsegplus

    Fourprint (fingerprint) segmentation

    Fork of the nfseg project by NIST (V 5.0.0). Presented with a BSD style license. Please read header of source files for more terms. Baseline segmentation algorithm in C. Version 0.2.0.3 License see license.txt (BSD) Sourcecode see File page (nfsegplus.zip).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    MySuiteA

    This is not NSA Suite B. This is MySuiteA!

    MySuiteA is a cryptographic suite consisting of symmetric ciphers and hash algorithms, as well as two proof-of-concept quantum-safe asymmetric cryptographic algorithms for digital signature and key agreement. This suite implements: AES-128, AES-192, AES-256, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHAKE128, SHAKE256, NEWHOPE, REBLISS-512A, (and the self-devised)REBLISS-1024A, among a few other things...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Start building the next generation of GenAI apps today Icon
    Start building the next generation of GenAI apps today

    MongoDB and Google Cloud bring together powerful technologies that enable you to confidently build GenAI experiences.

    MongoDB Atlas is a fully-managed developer data platform built by developers, for developers. With tight integration to Google Cloud services such as Vertex AI and BigQuery, you can accelerate application deployment to stay at the forefront of AI innovation.
    Learn More
  • 10
    Is a tool to enchantments security by allowing user see what goes.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Advanced Onion Router
    Advanced Onion Router is a portable client for the OR network and is intended to be an improved alternative for Tor+Vidalia+Privoxy bundle for Windows users. Some of the improvements include UNICODE paths, support for HTTP and HTTPS proxy protocols on the same Socks4/Socks5 port with HTTP header filtering that generates fake identity-dependent headers every time the identity is changed (proxy chains are also supported), support for NTLM proxies, a User Interface that makes Tor's options and...
    Leader badge
    Downloads: 183 This Week
    Last Update:
    See Project
  • 12

    smartIDS

    Lightweight intrusion detection for IoT and embedded devices.

    The aim of the project is a lightweight intrusion detection library for embedded devices which supports MSP430 and ARM Cortex based devices. Features include DSP/SIMD support, IoT and embedded protocols, distributed operation, event and history management, tool supported configuration and visualization. There is a Java port that supports less features.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    Primes

    Calculate primes by using extremely fast sorting

    ... any kind of data. And as already mentioned, it's just the most efficient tree-based sorting algorithm that you can get. But furthermore this way of finding primes interestingly leaves a hard nut to crack for mathematicians: In very rare cases it finds numbers that are not primes. For all primes below one million this phenomenon arises in exactly two cases: 31213 which is 7 * 7 * 7 * 7 * 13 336141 which is 3 * 3 * 13 * 13 * 13 * 17 Who can explain, why?
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Zebedee is a simple program to establish an encrypted, compressed "tunnel" for TCP/IP or UDP data transfer between two systems.
    Leader badge
    Downloads: 9 This Week
    Last Update:
    See Project
  • 15
    OpenVPN GUI is a graphical frontend for OpenVPN running on Windows XP / Vista / 7 / 8. It creates an icon in the notification area from which you can control OpenVPN to start/stop your VPN tunnels, view the log and do other useful things. NOTE: the official project page is now hosted on GitHub: https://github.com/OpenVPN/openvpn-gui/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Kypeless

    Kypeless

    Fully decentralised secure p2p communication program

    Kypeless encapsulates strong symmetric and asymmetric cryptography so you can get the benefits of secure communication following some simple steps. Right now, Kypeless is unstable pre-alpha software, published only for testing purposes. Kypeless allows you to exchange instant messages, long not-so-instant messages and files, but a lot more features are planned to be implemented later.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    lecithine

    FUSE File system powered by secret sharing scheme

    Lecithine is a FUSE (file system in user space) using a secret sharing scheme. You can use Lecithine as regular file system. When writing to disk, data will be devided into randomly chosen pieces (secret shares) and stored into different places. Upon reading, the shares are merged together such that in turn the plaintext results. From a cryptographers point of view, there is no symmetric or private key ever needed to produce a ciphertext. This is how secret sharing schemes are designed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    BEDBUG CSPRNG & Stream Cipher

    BEDBUG CSPRNG & Stream Cipher

    A family of FLEA-inspired CSPRNGs and Stream Ciphers

    ...-bit key. The BEDBUG generator itself is a mere 5 lines of code: Three rotations; two pseudo-random lookups. The default BEDBUG configuration alternates the rotation constants unpredictably. These four sets of three values differ between BEDBUG128, BEDBUG256 and BEDBUG512 and were selected, tuned and tested in each case for optimal avalanche, which is never less than 16.5 bits. BEDBUG has passed stringent industry-standard tests for randomness, including NIST and DIEHARD.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    MOTE CSPRNG & Stream Cipher

    MOTE CSPRNG & Stream Cipher

    A family of small-state CSPRNGs and Stream Ciphers

    MOTE is a fast, small-state, cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. MOTE exhibits uniform distribution, mixes extremely rapidly, has no detected bias, and comes in three variants: MOTE8, with an internal state array of 8+4 32-bit words; MOTE16, with an internal state of 16+4 words; and MOTE32 with a 32+4-word state. The former permit seeding with a key of up to 256 or 512 bits, the latter with a 1024-bit key. Reduced to essentials, MOTE is only...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    CRYpter

    CRYpter

    An encrypter/decrypter written on the weekends

    A simple encrypter/decrypter written in C with a graphical user interface written in Python. This tool was written to help forums' users to have their credits for the files they uploaded by putting their usernames from each forum they are active. *This encypting software generates a symetric key based in the password. The lenght of the key is variable. The rule for the length is: (Num_Of_Chars_In_Passwrd)^2 bytes .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    Opengate

    A network user authentication system for mobile and public terminals

    A Network User Authentication System for Public and Mobile Terminals - It is an authentication gateway (captive portal type) for open network. It is applicable to wireless lan(WLAN), wired lan, and public terminals. See Home Page for detail. MAIN DEVELOPMENT SITE IS MOVED FROM here TO "https://osdn.jp/projects/opengate/".
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    WiKID Two-Factor Authentication System

    WiKID Two-Factor Authentication System

    Two-factor authentication system

    The WiKID Strong Authentication System is a public-key based two-factor authentication system. It is a flexible, extensible, and secure alternative to tokens, certs and passwords. Application & API support exists for Java, ASP, PHP, Ruby, OpenVPN, TACACS+, etc. Read our eGuide on how to setup your network with two-factor authentication: http://www.wikidsystems.com/learn-more/two-factor-authentication-white-papers
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    SecureQEMU is an open source emulation-based software protection scheme providing protection from reverse code engineering (RCE) and software exploitation using encrypted code execution and page-granularity code signing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Use of Michael Rabin's Information Dispersal Algorithm to provide secure, dispersed storage in a networked environment. For full download, please get both Math-FastGF2 and Crypt-IDA releases under the files link. See project wiki for more information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    DEEEP

    DEEEP

    Detector of Integer Vulnerabilities in Software Portability

    DEEEP is a open source static analysis tool to detect, in C programs, integer vulnerabilities caused by the bad adaption of aplications from ILP32 to LP64. It uses the tools Lint and Splint, and runs over Open Solaris and Linux operating systems. This tool semantically analyses source code. More precisely, it does type checking, data-flow analysis, and it automatically correlates the results of these two types of analysis. Type checking is used for finding bugs on the way integers...
    Downloads: 0 This Week
    Last Update:
    See Project