One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
Try Free
AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
Here is a little utility I wrote to facilitate my work when I have to try methods on deciphering coded messages. Well, of course for all those who do not treasure hunts, it may seem slightly unnecessary. So for them, it can also be used to encode a messa
File Crypter is a Simple program, that is able to encrypt your files and decrypt them. A version of File Crypter is included as an example in the xCrypter Library and is called "ncrypter" which is short for "new crypter".
StegSharp is an application built on C# 2.0 that explains the basic principles of steganography. With StegSharp the user can hide and recover text or files from image files. Supported image extensions are: jpeg and bmp.
Discover hidden files you never seen before! NTFS ADS is an forensic/security utility to reveal, list, delete, determine contents, extract and copy hidden files from NTFS Alternate Data Streams.
Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
OW.NET -- 1-Wire API port from Java (and J#) to C#. Use the Dallas 1-Wire and iButton chips with standard C# using a serial adapter (also CF.net) or the TMEX drivers on the Windows platform. No J# distribution installation required.
Kasai is a 100% Java based authentication and authorization framework. It allows you to integrate into your application a granular, complete and manageable permission scheme.
Deobscufates .NET assemblies, primarily by rearranging IL code (basic block reordering) and removing junk.
Designed to be modular, it is built from reusable pieces.
NMAP Configurator is a GUI frontend for NMAP on Windows systems. User must have installed NMAP for this program to work properly. New version fixes the problem of inability to access buttons if display is set to 800x600.
wssecure Application Monitor is a free software that can monitor processes in real time. It will alert automatically whenever a new process is detected and it will again alert if it becomes modified.
Sniper is a powerful keylogger component that can be easily integrated in applications. It is a small,easy-to-use ActiveX control that encapsulates all the complexity for logging keys and exposes a few important properties and methods.
Grained Login is a fine-grained login system for Qt applications. It uses SHA1 hashed passwords to retrieve user rights from a SQLite database. An administration dialog handles the maintenance of the users, the roles, the rights and the password history.
This project is based off of Sam Rape. The final product is a bootable floppy which copies the sam file, compresses it and puts it on a disk. A detailed description can be found at datastronghold.com/archive/t10429.html
Bildsoft releases under GPL License the Blackhorse Algorythm, used by all its software.
Blackhorse provides high-level encryption for any file.
Blackhorse is very quick to encrypt/decrypt data, thanks to a particular technology.
The Inside Security Rescue Toolkit is a multi-purpose disaster recovery and network analysis system. It runs from a credit card-sized CD-ROM for convenient transport or download. It has read-write support for NTFS-partitions, full partition handling supp
A simple, secure and free tool for encryption and signature for Microsoft Windows and Unix. Part of the IDEALX "OpenTrust" suite (IDX-PKI, IMC, IDX-smbldap-tools...), it provides confidentiality and security through X.509-PKCS certificates. Languages:
LightCrypto is C cryptography library. It contains Big Number Library, basic crypto algorithms (3DES, DSA, RSA, ECDSA, etc), Internet Voting Scheme, and many more. Current librarie's binary is less than 1MB and it can even be smaller by user config.
Ever wish you could make a virtual hard drive on your computer? What If I told you, you can! Masterdrive is one of the only Virtual hard Drive creators for Windows and you can get it totally free! Only With NTI's MasterDrive!