Showing 91 open source projects for "telegram source code"

View related business solutions
  • Create a personalized AI chatbot for each team in minutes Icon
    Create a personalized AI chatbot for each team in minutes

    Get better, faster answers for your whole team with an AI chatbot trained on your company documents.

    QueryPal is the lifeline your team needs. Our AI chatbot integrates seamlessly with your communication channels, using advanced language understanding to identify and auto-answer repetitive questions — in seconds.
    Learn More
  • Online Fundraising Platform and Donation Software Icon
    Online Fundraising Platform and Donation Software

    BetterWorld uses cutting-edge technology to make online fundraising easy for nonprofits.

    Our fundraising platform is designed to be incredibly easy to use. Set up an account and start raising funds in minutes! With BetterWorld, design gorgeous online auctions to raise more funds with less effort. Our fundraisers look beautiful on phones, tablets, and desktop computers. Utilize the BetterWorld platform to build elegant online giveaways that engage donors and raise funds. Impress donors and spread awareness for your cause. Sell more tickets to fundraisers with BetterWorld. Quickly design custom-branded pages to showcase your events. Take advantage of quick and convenient crowdfunding to raise funds for good causes. BetterWorld's online fundraising platforms make crowdfunding simple and fun.
    Learn More
  • 1
    This is a C source code scanner based on symbolic logic. It analyses C source code (especially that of the Linux kernel, at which it is aimed) for programming errors and vulnerabilities. The tests are defined by the user.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    mod_gnutls

    mod_gnutls

    mod_gnutls apache module

    mod_gnutls uses the GnuTLS library to provide SSL 3.0, TLS 1.0, TLS 1.1 and 1.2 encryption for Apache HTTPD. It is similar to mod_ssl in purpose, but does not use OpenSSL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    The ASN.1 Compiler

    Go to github.com/vlm/asn1c for the latest version.

    This ASN.1 compiler turns ASN.1 specifications into C code. The asn1c is shipped together with conformant BER/DER/XER/PER codecs. The X.509, GSM TAP3, MEGACO, RRC and LDAP encoding and decoding examples are part of the source code distribution. NOTE: THE asn1c PROJECT HAS LARGELY MOVED TO GITHUB: http://github.com/vlm/asn1c
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4

    STP

    MOVED TO GITHUB. Code here is STALE.

    THE STP CODE HAS MOVED TO GITHUB. THE CODE HERE IS STALE. PLEASE CHECKOUT THE FOLLOWING WEBSITE: http://stp.github.io/
    Downloads: 0 This Week
    Last Update:
    See Project
  • Online database software to empower your business management Icon
    Online database software to empower your business management

    Create your own custom database in a fast and easy way, requiring zero technical knowledge.

    TeamDesk is the leading AI-Powered Low-Code platform for creating powerful and flexible web-based databases with no-coding. From small companies to large enterprises, from specific manufactures to vertical business integration, TeamDesk is scalable enough to grow with your business needs.
    Learn More
  • 5

    PAM search list

    PAM module to search arbitrary file for user

    This PAM service module allows PAM-enabled applications to check if the target user is in some arbitrary plaintext list. Similar to module pam_ftpusers from the FreeBSD Project, and is based on its code.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6

    WhitewallManager

    Whitelist manager

    WhitewallManager is a whitelist manager. It aims to be a web based administration tool for administrators using a default-deny approach to the security of the network they are responsible for. Default-deny is a superior model for network security as compared to default-allow, which is how the security model of most local area networks is modeled. Default-deny disallows all but access granted to resources which you specifically allow. The advantage to this is that any new resources which...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    Post Memory Corruption Memory Analysis

    PMCMA - Post Memory Corruption Memory Analysis

    Pmcma is a tool aimed at automating the most time consuming taskes of exploitation. It for instance determine why an application is triggering a segmentention fault, evaluate if the faulting instruction can be used to write to memory or execute arbitrary code, and list all the function pointers potentially called from a given point in time by an application. Pmcma is a totally new kind of debugger, which allows for easy experimentation with a process in memory by forcing it to fork. The...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Linux-PAM module plus PostgreSQL stored procedures to capture and store encrypted passwords. Intended to facilitate migration of credentials to different authentication systems. Use subversion (see 'Code' tab) to download project source code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Application proxy toolkit which inherits the ideology of TIS fwtk and maintains API backwards compatibility. The design goal is to make it simple yet powerful; no performance hacks allowed in the code and library dependencies are reduced to minimum.
    Downloads: 0 This Week
    Last Update:
    See Project
  • The Easy Way To Build A Referral Program Icon
    The Easy Way To Build A Referral Program

    Referral Factory is the #1 referral software used by SMEs and Marketers.

    Referral Factory offers over 1000 pre-built referral program templates you can use as your own, or you can build your own referral program from scratch. You get unlimited referral campaigns on all plans, and brilliant support from their team of referral marketing experts.
    Learn More
  • 10

    TPM Device Driver

    TPM Device Driver for Linux

    Device driver to enable the TPM chip as described by specifications at http://www.trustedcomputinggroup.org. The TPM chip will enable you to use hardware to securely store and protect your keys and personal data. See also theTrouSers project. This driver is integrated into the mainline Linux Kernel - code downloads on this page are only for historical reasons. Latest Code can be found at: https://github.com/PeterHuewe/linux-tpmdd Patchwork: https://patchwork.ozlabs.org/project/tpmdd/list/
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Software to retrieve password of administrative system users stored in a MySQL database, designed for Nagios to access servers via expect or via SSH when you have not the Public key. Not exclusive to Nagios, but very desirable to sysadmins.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    myencoder is a php extension used for encrypt php source code
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    This program is used as a tool to check for ASCII code and strip it out to a new file to recover documents that got corrupted or find hidden data in viruses that contain text by the virus writer or spies puting comments in images or other files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    LibHTP is a security-aware parser for the HTTP protocol and the related bits and pieces. The source code is hosted at https://github.com/ironbee/libhtp
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    REL (Research and Education Language) is a simple but very powerfull language with a compiler, an interpreter and a verifier.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    A suite of source and binary programs to test the capabilities of code analysis tools. A reference implementation of x86 binary analysis in C# is also included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    It consists of two parts...denial of service attack and kalman filter...source code is written in C...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    fm (file masker) is an easy-to-use command line cryptographic tool that's small, portable across operating systems, quite secure for most purposes, and licensed to you along with its source code under the gpl.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Portscan is a simple TCP port scanner (connect scan, similar to nmap -sC). It is implemented with threads for better speed. Please see the code and review it. Criticism is more than welcome. Helps needed to make it robust.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 20
    For system user to take backup of any confidential file(it may be code/important document)as it may contain content not meant for the others to view or the system may crash.We will be securing the backup of selected files at regular intervals of time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Brute is a brute force hash cracker, it allows the user to specify how many threads he want running simultaneously. It is fast, and modular, all the hash algorithm dependent code lies in a module (a shared library). Modules available: MD5; SHA256; SHA512
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    The Memory Encryption and Transparent Aegis Library (METAL) functions as a shim library, allowing applications to transparently hide memory from rogue applications. It can be used with legacy applications without code modification.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    POLUS, a software maintenance tool capable of iteratively evolving running software into new versions, aims to retain backward binary compatibility, support for multithread software and recover already tainted state of running software with low overhead.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    This software is a set of tools that hides C source code in txt files. Also the software is able to restore the txt files to C source code again. This work is based on the tool c2txt2c by Leevi Martilla. Csteg needs a book file in txt format to hide C so
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Deobscufates .NET assemblies, primarily by rearranging IL code (basic block reordering) and removing junk. Designed to be modular, it is built from reusable pieces.
    Downloads: 0 This Week
    Last Update:
    See Project