Showing 14 open source projects for "stable"

View related business solutions
  • SpotOn is an integrated software and payment solution for restaurants, retail, and enterprise businesses Icon
    Our cloud-based technology is used by 63% of major league sports teams to create better fan experiences while driving double-digit growth in average guest check size and sales. Solutions include self-serve kiosks, handheld POS, mobile and online ordering, kitchen displays, suite management, enterprise reporting, and both retail and food & beverage point-of-sale.
  • Get More Customers For Your Auto Repair Shop Icon
    Get More Customers For Your Auto Repair Shop

    Drive the Right Business to Your Auto Repair Shop with KUKUI.

    Kukui's All-in-One Success Platform is a robust integrated marketing software solution that helps businesses in the automotive repair industry to grow their brand and take it to the next level. Kukui offers tools for conversion rate optimization, POS integration, email marketing and retention as well as revenue tracking.
  • 1
    Network Security Toolkit (NST)

    Network Security Toolkit (NST)

    A network security analysis and monitoring toolkit Linux distribution.

    Network Security Toolkit (NST) is a bootable ISO image (Live USB Flash Drive) based on Fedora 38 providing easy access to best-of-breed Open Source Network Security Applications and should run on most x86_64 systems. The main intent of developing this toolkit was to provide the security professional and network administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in the article: Top 125 Security Tools by INSECURE.ORG are available...
    Leader badge
    Downloads: 299 This Week
    Last Update:
    See Project
  • 2

    Portable Text Encryption

    Single Linux or Windows binary for secure text encryption

    Self contained and completely portable binary encrypts text for secure email, messaging, irc use, etc., ideal for USB flash drives. AES-128/192/256 (ecb/cbc), Blowfish (ecb/cbc), DES / TripleDES (ecb/cbc/ofb/cfb), or RC4. Linux and Windows binaries.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 3

    WinHasher

    Very simple file and text hashing tool for Windows

    Tiny script will find hash digest of files or text using MD4, MD5, SHA1, SHA256, SHA384, or SHA512. Simple and self explanatory.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4

    File And Text Encryption (fate)

    No nonsense file and text encryption

    This is a stripped down, no nonsense, no options encryption utility for normal users who just want to secure their files and text and move on. The ciphers used are Aria, Camellia, (all in 256 bit key mode) and ChaCha20. Modes are CBC, OFB, CFB, and CTR, except for ChaCha20 which is a stream cipher. The password hashing and salt derivation are robust.
    Downloads: 2 This Week
    Last Update:
    See Project
  • DriveStrike: Remote Wipe | Data Breach Protection Icon
    DriveStrike: Remote Wipe | Data Breach Protection

    . From Fortune 500 to small businesses with remote workers, every industry can gain from premium endpoint security.

    DriveStrike protects devices and data in the event of loss, theft, or use in remote locations. Remotely locate, lock, and wipe devices you manage to prevent data compromise. DriveStrike prevents data breaches to ensure confidentiality, compliance, and a competitive edge.
  • 5

    FTC

    Symmetric File and Text Encryption

    FTC cascades choice of Aria-256, AES-256, Camellia-256, SM4, or ChaCha20 for file encryption, and AES-256, TripleDES, and Blowfish for text encryption, both receive robust keystream generation
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6

    No Crappy Passwords

    Takes your crappy password and makes it non-crappy

    Hashes, encrypts, and encodes lousy passwords based information from initial hashes, combined with user provided offsets. Creating easy to memorize systems of passwords and offsets, the possibilities are endless, with never a need to file your passwords to disc or entrust them to a password manager.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7

    SDigest

    File hashing tool using Adler32, CRC32, MD5, SHA1, SHA256, SHA512

    Most file hashing utils involve specifying a file in a dialog, or dragging a file to an input box, SDigest simply resides in the file context menu, and will display a pop-up showing Adler32, CRC32, MD5, SHA1, SHA256, and SHA512 message digests of the selected file
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    zhcrypt

    Tiny front end to hcrypt.exe from project page Hcrypto

    Zhcrypt is simply a tiny front end to hcrypt.exe, one of the utilities found within the Hcrypto suite found on Sourceforge. Hcrypt.exe is a Windows command line utility that will encrypt and decrypt files offering a variety of common and uncommon algorithms, including AES-128, AES-192, AES-256, Blowfish, CAST-128, CAST-256, DES, TripleDES, DESX, GOST, DEA, KASUMI, MARS, MISTY1, Noekeon, RC2, RC5, RC6, SAFER-SK, SEED, Serpent, Skipjack, Square, TEA, Twofish, and XTEA
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    hexinject

    hexinject

    Hexadecimal and raw packet injector and sniffer.

    Hexadecimal and raw packet injector and sniffer. Can be easily combined with other tools to provide a powerful cmdline framework for raw network access.
    Leader badge
    Downloads: 18 This Week
    Last Update:
    See Project
  • Compliance Operations Platform. Built to Scale. Icon
    Compliance Operations Platform. Built to Scale.

    Gain the visibility, efficiency, and consistency you and your team need to stay on top of all your security assurance and compliance work.

    Hyperproof makes building out and managing your information security frameworks easy by automating repetitive compliance operation tasks so your team can focus on the bigger things. The Hyperproof solution also offers powerful collaboration features that make it easy for your team to coordinate efforts, collect evidence, and work directly with auditors in a single interface. Gone are the days of uncertainty around audit preparation and compliance management process. With Hyperproof you get a holistic view of your compliance programs with progress tracking, program health monitoring, and risk management.
  • 10
    TclTrf is an extension library to the script language tcl, as created by John Ousterhout. It extends the language at the C-and Tcl-with ``transformer''-commands to encode and compress data. Based on the stacked channels of the tcl core (ability inter
    Downloads: 4 This Week
    Last Update:
    See Project
  • 11
    Crypto.mod is a simple LOADABLE cryptographic module for tcl 8.3+ (possibly older, not tested). The module supports the blowfish, twofish and rijndael ciphers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    RSA Public Key Crypotgraphy for Web Browsers. Use JavaScript to RSA-encrypt data that can only be decrypted on the server, and not by prying eyes. The poor man's SSL...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The PureSecure Plugin Factory Project focus on the production and share of Demarc PureSecure Extensible Service Monitoring (ESM) Plugins . They can be wrote in any language you want. Demarc PureSecure is free for non-commercial use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A Secure, Firewall-Friendly Platform for Peer-to-Peer Networking. With a few mouse clicks, request remote access to colleagues' computer desktops, transfer files, sketch & chat, or videoconference. Automatic, authenticated & encrypted tunneling!
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next