Showing 25 open source projects for "drcom-for-linux"

View related business solutions
  • Red Hat Enterprise Linux on Microsoft Azure Icon
    Red Hat Enterprise Linux on Microsoft Azure

    Deploy Red Hat Enterprise Linux on Microsoft Azure for a secure, reliable, and scalable cloud environment, fully integrated with Microsoft services.

    Red Hat Enterprise Linux (RHEL) on Microsoft Azure provides a secure, reliable, and flexible foundation for your cloud infrastructure. Red Hat Enterprise Linux on Microsoft Azure is ideal for enterprises seeking to enhance their cloud environment with seamless integration, consistent performance, and comprehensive support.
    Learn More
  • Deliver secure remote access with OpenVPN. Icon
    Deliver secure remote access with OpenVPN.

    Trusted by nearly 20,000 customers worldwide, and all major cloud providers.

    OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
    Get started — no credit card required.
  • 1
    A client-server multithreaded application for bruteforce cracking passwords. The more clients connected, the faster the cracking. Plugin-based. Supports only RAR passwords at the moment and only with encrypted filenames.
    Leader badge
    Downloads: 131 This Week
    Last Update:
    See Project
  • 2
    A port of TurboPower OnGuard to CLX and Linux platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    WipeOut - Secure Data Erase and Privacy
    WipeOut is secure data deletion method & application. WipeOut method is designed to be fast and secure. WipeOut also has many sub schemes for faster (but not weak) wipe process .
    Downloads: 8 This Week
    Last Update:
    See Project
  • 4
    Foi comprovado que senhas como: datas de nascimento, números de telefone, numero de cartões de crédito... são fáceis de serem descobertas (hackeadas), por isso existe o Password Generator, para gerar senhas que são difíceis de descobrir. O Sistema funciona como um gerador RANDOM, que cria instantaneamente uma série de possibilidades de combinações que o sistema julga ser mais difícil para programas e hackers descobrirem.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • 5
    An Open Source Key logger Created in Borland Delphi 7. Supports any Operaring System, and safest of it's kind. It's unique and untraceable, use it for anything you can imagine.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6
    watches for Regristry-changes of keys like HKLMSoftwareMicrosoftWindowsCurrentVersionRun etc. and pops up if something has changed, logs it, can ask google for the key found. Protects against Trojans and Viruses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Dr. Crypt Encryption Algorithm & Library
    DrCrypt, based on basic xor(exclusive or) encryption which is designed to be fast and reliable. Also DrCrypt supports 3 platform.(Java, .NET, Win32)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Finds Text in Delphi *.Pas files e.g. : button1.caption:='Hello' Replaces Text with a function call button1.caption:=TXT(0) {##Hello##} Generates a function „TXT“ with a String List with all found Texts at the beginning of your source.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Cisco Router Rommon Password Recovery
    Downloads: 0 This Week
    Last Update:
    See Project
  • The #1 Embedded Analytics Solution for SaaS Teams. Icon
    The #1 Embedded Analytics Solution for SaaS Teams.

    Qrvey saves engineering teams time and money with a turnkey multi-tenant solution connecting your data warehouse to your SaaS application.

    Qrvey’s comprehensive embedded analytics software enables you to design more customizable analytics experiences for your end users.
    Try Developer Playground
  • 10
    Moon Secure Antivirus

    Moon Secure Antivirus

    Free - Simple - Scalable

    Moon Secure Antivirus aims to be the best Free Antivirus for Windows under GPL license. It offers multiple scan engines, Net shield, Firewall, On access, on Exec scanner and rootkits preventions plus features from Commercial Antivirus applications. Also visit TWERT, our sister project, allowing scheduled domain and process blocking with Windows, Linux, OSX installers at https://sourceforge.net/projects/twert/
    Leader badge
    Downloads: 231 This Week
    Last Update:
    See Project
  • 11
    VERISIL - Secure Data Deletion Technology And Library ® is perfectly developed and open source secure data removal library. The name of project is Turkish (means "CLEAN DATA"). VERISIL is developed in delphi, compatible with Lazarus & FreePascal.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    watches for Regristry-changes of keys like HKLMSoftwareMicrosoftWindowsCurrentVersionRun etc. and pops up if something has changed, logs it, can ask google for the key found. Protects against Trojans and Viruses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Malzilla

    Malzilla

    Web-malware-hunting tool

    Malzilla is an advanced malware-hunting tool specialized for hunting web-based exploits, decode obfuscated JavaScripts etc.
    Downloads: 40 This Week
    Last Update:
    See Project
  • 14
    mp3stegz is an application that apply steganographic (steganography) algorithm in mp3 files. mp3stegz will maintain original mp3 file's size and sound quality. The hidden message is compressed(zlib) and encrypted(Rijndael).
    Leader badge
    Downloads: 16 This Week
    Last Update:
    See Project
  • 15
    StreamSec Tools 2.1 is collection of cryptographic security related components, classes and routines for the Borland (R) Delphi (TM) development environment. The product includes modular clean room implementations of SSL/TLS, S/MIME and X.509.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    ISP Toolz is providing the SLC Enterprise Security console for snort. Supports Cisco pix, snort and intruvert natively. Building additional support and API for additional device support. This is the open source version of our commercial software. This op
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Common Hardware Recovery Solutions by Ukrainian-Russian network
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    The goal of this project is to design and write comercial quality software and aplications with fully respect to free software (like in "free speach"). The software designed by us will target various fields: from scientific applications to multimedia an
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    “garuda” is an intrusion detection system against wireless threats. It is a progressive proof of concept project to ward off wireless threats such as war-drivers, rogue AP, wifi DoS and MAC spoofing attacks. Please enjoy and we welcome your volunteerism.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 20
    Sandfish is a small encryption/decryption tool written in Delphi/Kylix.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    ECTP - Encrypted Compressed Transfer Protocol This protocol is similar to HTTP but with commands and features like FTP. The main features are security and compression abilities and the consequent use of one perisistant connection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    sechk - SEcurity CHecKer It is a powerful and useful tool to check if you got exploited and rooted, it will use checksum comparation via md5 sum, it exchanges file lists and csums from the sechk server. It\'s gonna work with all posixes and unixes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Signed dynamic HTTP content. Used for recognizing hacked website content from the surfers view.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    The secsuite Security Suite is, as it is called, a security suite. At the moment, only a portscanner with a graphical GUI is implemented. Screenshots of it are not yet avaiable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    IDTrans is developing b2b technologies. The primary aspects of the project are secure transmission libraries, a key server, and a application to demonstrate the use of the libraries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next