21 programs for "x86_64-linux-gnu" with 2 filters applied:

  • Achieve perfect load balancing with a flexible Open Source Load Balancer Icon
    Achieve perfect load balancing with a flexible Open Source Load Balancer

    Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.

    Boost application security and continuity with SKUDONET ADC, our Open Source Load Balancer, that maximizes IT infrastructure flexibility. Additionally, save up to $470 K per incident with AI and SKUDONET solutions, further enhancing your organization’s risk management and cost-efficiency strategies.
  • Automated RMM Tools | RMM Software Icon
    Automated RMM Tools | RMM Software

    Proactively monitor, manage, and support client networks with ConnectWise Automate

    Out-of-the-box scripts. Around-the-clock monitoring. Unmatched automation capabilities. Start doing more with less and exceed service delivery expectations.
  • 1
    BitVisor is a tiny hypervisor initially designed for mediating I/O access from a single guest OS. Its implementation is mature enough to run Windows and Linux, and can be used as a generic platform for various research and development projects.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    PasswordBox

    PasswordBox

    A console-mode program that will keep all your passwords safe

    PasswordBox is a console-mode program that will keep all your passwords safe, in an encrypted database protected by a master password. PasswordBox can also be used to generate secure (random) passwords. This program is written by Mateusz Viste, and uses the AES implementation of Chris Brown to handle all encryption/decryption processes. PasswordBox is available for the following operating systems: DOS, Windows, Linux. Remember, that if you forget your master password, you will have no way...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    EAESCrypt

    Extended AES Cryptography

    EAEScrypt is a utility that is designed to protect sensitive data using secure encryption. It uses the Advanced Encryption Standard (AES) as published by the Federal Information Processing Standards Publications (FIPS PUBS) and issued by the National Institute of Standards and Technology (NIST). The official version of AES allows only 128-bit, 192-bit or 256-bit keys, and EAESCrypt is fully compliant with FIPS-197 when using these values. But EAEScrypt can use any key size from 128-bit to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Bitte neue Website des aktuellen sourceforge Projekts PF_HP beachten! Please see new Website of the current sourceforge project PF_HP! Selbst im vereinfachten zweidimensionalen HP-Modell (hydrophob/polar) ist die Proteinfaltung bereits NP-vollständig. Hier implementieren wir einen brute-force Algorithmus zur Lösung kurzer Eingabesequenzen (0-1-Bitstrings) für die Proteinfaltung. Spende einen Cappuccino: Bitcoin: 1HqrdnfQgi9B4LW8UEvLAwh7X5gXPCoQ5B Litecoin:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cloudflare secures and ensures the reliability of your external-facing resources such as websites, APIs, and applications. Icon
    It protects your internal resources such as behind-the-firewall applications, teams, and devices.
  • 5
    SXMD

    SXMD

    MultiDistribution with Diagnostics, Recovery, Backup, Cleaning.. tools

    The SXMD (" like Security-X MultiDistribution ") use syslinux, grub4dos and others bootloaders to recover a crashed boot or run many GNU / Linux utilities. The first category is "Antivirus" with editors like Antivir, AVG, Comodo, DrWeb, FSecure, Kaspersky, Panda, VBA ... The second is composed by GNU/Linux's Distro: DSL, CorePlus (+Qemu Starter), Slacko, Slax Custom, Slitaz & XPuD ... After, you can find very good Recovery and Partitioning tools : Redo Backup, Parted Magic, MiniTool Partition...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Hide In Picture is a program that allows you to conceal files inside bitmap pictures, using a password. The pictures look like normal images, so people will not suspect there is hidden data in them.
    Downloads: 28 This Week
    Last Update:
    See Project
  • 7

    RC4-32.ASM

    Code to brute force the 32-bit key used to RC4 encrypt .pwl files.

    PROJECT HAS MOVED TO GITHUB: https://github.com/alex-georgiou/rc4-32.asm Code to brute force the 32-bit key used to RC4 encrypt .pwl files. Assembles to a 992 byte .COM file using the Intel Architecture Assembler v1.0 Copyright (c) 1998 augusto at dcc.ufmg.br. http://web.archive.org/web/19981205090800/http://www.dcc.ufmg.br/~augusto/project/iasm.zip
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    This program is used as a tool to check for ASCII code and strip it out to a new file to recover documents that got corrupted or find hidden data in viruses that contain text by the virus writer or spies puting comments in images or other files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    SSHDOS is a DOS port of SSH, SCP, SFTP and Telnet clients. Needs a packet driver (or a PPP driver for dialup connection) only. There are two separate packages for SSH1 and for SSH2.
    Downloads: 18 This Week
    Last Update:
    See Project
  • Precoro helps companies spend smarter Icon
    Precoro helps companies spend smarter

    Fully Automated Process in One Tool: From Purchase Orders to Budget Control and Reporting.

    For minor company expenses, you might utilize a spend management solution or track everything in spreadsheets. For everything more, you'll need Precoro. We help companies achieve procurement excellence and budget efficiency by building transparent, predictable, automated spending workflows.
  • 10
    PGP, short for Pretty Good Privacy, is a public key encryption package; with it, you can secure messages you transmit against unauthorized reading and digitally sign them so that people receiving them can be sure they come from you.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    This project is based off of Sam Rape. The final product is a bootable floppy which copies the sam file, compresses it and puts it on a disk. A detailed description can be found at datastronghold.com/archive/t10429.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    EverCrack cryptanalysis engine. The goal is cryptanalysis of any class of cipher. The focus now is the kernel - cryptanalysis of unilateral monalpha substitution ciphers extremely quickly, and later, cryptanalysis of complex ciphers for the kernel.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 13
    Common Hardware Recovery Solutions by Ukrainian-Russian network
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    dosvstop: dos-TSR program to prevent dos-virus being loaded into memory, could be used with free-dos,
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Password generator. The user can choice the characters, write the results in text file, make pronunceable passwords, choice the number of digits and codes. Visual version made in Java and non-visual version in C. Great performance.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 16
    ObscureEncrypt is a high level security encrypter. It encrypts at three levels, 448 bit Blowfish encryption, Obscurity, high level encryption. Making it almost impossible to decrypt
    Downloads: 2 This Week
    Last Update:
    See Project
  • 17
    Collection of pseudorandom number generators (PRNGs) implemented in QBASIC/QuickBASIC and avilable as DOS executables.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    The DosUtils project is an attempt to provide many small, helpful, free utilities for easier computer administration and programming on a DOS / Win9x system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    This library provides crypthographic functions written in plain Object Pascal, aimed to be portable and easy to use. Currently it contains BlowFish Cipher , MD5 and RipeMD hashes. More is planned.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    This is a project that simulates the German Military Enigma machine during WWII.. It is a project for beginers to learn to program and to meet people. If anyone is interested in helping, please email me @ dustin@rockhill.org
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Originally a software partnership between my best friend and myself, Diverse Developments seeks to write "useful stuff", of a very diverse nature... Current projects include a file encoder, and a double-entry accounts package.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next