Open Source Windows Security Software - Page 37

Security Software for Windows

View 1532 business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    A sudo implementation for Microsoft Windows XP. It transforms an Administrator account to a Limited account environment and provides right-click context menu and command line access for running programs and commands with administrative privileges.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 2
    JDownloader Password Decryptor Portable

    JDownloader Password Decryptor Portable

    Decrypts JDownloader ejs files (works with Beta install too)

    JDownloader Password Decryptor Portable is the SecurityXploded's JDownloader Password Decryptor packaged with a PortableApps.com launcher as a portable app, so you can extract passwords from your JDownloader from this program on your iPod, USB flash drive, portable hard drive, etc. It has all the same features as JDownloader Password Decryptor, plus, it leaves no personal information behind on the machine you run it on, so you can take it with you wherever you go.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 3
    The Inside Security Rescue Toolkit is a multi-purpose disaster recovery and network analysis system. It runs from a credit card-sized CD-ROM for convenient transport or download. It has read-write support for NTFS-partitions, full partition handling supp
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4

    The ASN.1 Compiler

    Go to github.com/vlm/asn1c for the latest version.

    This ASN.1 compiler turns ASN.1 specifications into C code. The asn1c is shipped together with conformant BER/DER/XER/PER codecs. The X.509, GSM TAP3, MEGACO, RRC and LDAP encoding and decoding examples are part of the source code distribution. NOTE: THE asn1c PROJECT HAS LARGELY MOVED TO GITHUB: http://github.com/vlm/asn1c
    Downloads: 1 This Week
    Last Update:
    See Project
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 5
    MailCleaner

    MailCleaner

    Anti Spam SMTP Gateway

    MailCleaner Open Source Edition is now discontinued but will continue under the spamtagger project https://github.com/SpamTagger [antispam] MailCleaner is an anti-spam / anti-virus filter SMTP gateway with user and admin web interfaces, quarantine, multi-domains, multi-templates, multi-languages. Using Bayes, RBLs, Spamassassin, MailScanner, ClamAV. Based on Debian. Enterprise ready. MailCleaner is an anti spam gateway installed between your mail infrastructure and the Internet. It includes a complete GNU/Linux OS and a graphical web interface for user and administrative access. It comes in the form of virtual machine templates.. - fully compatible with any SMTP mail server (Exchange, Zimbra, O365,...)
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Shiela USB Shield

    Shiela USB Shield

    The Powerful Protection for PC Against Viruses from Removable Drives

    Shiela USB Shield is a powerful first line defense against virus from infected removable drives. * It locks autorun.inf and associate executable files in multiple instance * Delete/Freeze the shortcut file or clone file, and restores the original automatically. * It is free and open source. System Requirements 1) Windows 2000 or later 2) 256Mb RAM or higher 3) 1GHz Processor or faster 4) .NET Framework 2.0 or later must be installed
    Downloads: 5 This Week
    Last Update:
    See Project
  • 7
    AnDDoS

    AnDDoS

    Stealth Anonymous Kill-The-Server

    The classic DDoS! Overload the server. It is simple but harmful. Watch out your server.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 8
    A Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack and has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell and a L2CAP packetgenerator.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 9
    CTS Surveyor

    CTS Surveyor

    Foot traffic and facial analytics for your business and home

    Surveyor is a software solution that monitors its environment via camera and gathers demographic information about the public in the surrounding area, providing important statistics such as number of people passing by as well as providing facial analytics to classify the pedestrians based on their age and gender. The statistical data is stored in a local database and is made available via RESTful API’s, and easy integration with other applications can be accomplished via a WebSocket interface that provides live notifications about people in the camera’s field of view At the moment, the solutions is available for Windows only, with Linux version coming soon – please see our User Guide at http://caerustech-solutions.com/demo/User_Guide.pdf Sample Python client: https://github.com/CaerustechSolutions/cts-surveyor-pyclient Contact Us: http://caerustech-solutions.com/contact-us/
    Downloads: 4 This Week
    Last Update:
    See Project
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • 10
    An opensource chrome javascript extension/user-script, that records key strokes in the browser, and sends them to an external listener, cannot be detected by any anti-virus at the moment. Written Completely in javascript and php.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 11
    ClamSentinel Portable

    ClamSentinel Portable

    ClamSentinel Portable is a real-time scanner for ClamWin Portable

    Original author: Andrea Russo and Robert Scroggins ClamSentinel Portable is ClamSentinel, configured and launched according to the PortableApps.com Format. It uses ClamWin's virus database, so ClamWin is required. If you have ClamSentielPortable next to ClamWinPortable, then ClamSentinel will detect ClamWin's database. For example, if ClamSentinelPortable is installed in folder A (/A/ClamSentinelPortable/App,etc) and ClamWinPortable is also in folder A (/A/ClamWinPortable/App,etc), then it will detect it.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 12
    Cryptomni is a program which can encrypt and decrypt files using the one-time pad cipher. If a key is truly random, kept secret, and never reused, this encryption algorithm can be proven to be unbreakable.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 13
    Bootable CD Forensics/Virus Scanning/Recovery/PenTesting platform
    Downloads: 4 This Week
    Last Update:
    See Project
  • 14

    DOSTool

    DOS Attack Tool

    A simple DOS attack tool based on the public resources response time.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 15
    ESignPDF

    ESignPDF

    Sign PDF with Digital Signature Certificate

    Brought to you by parvesh88 System Requirements 1. A Computer running Windows 7 Service Pack 1 or higher 2. Java Runtime Environment (JRE) 8 or higher if JRE is not installed on your Computer, then download and install from here JRE 8 for Windows x86 -> https://www.azul.com/core-post-download/?endpoint=zulu&uuid=55abea0c-2aa5-4316-aafb-e90847f6ee21 JRE 8 for Windows x64 -> https://www.azul.com/core-post-download/?endpoint=zulu&uuid=5a34da4a-1821-4c79-a57c-7fce38d102c2 JRE 8 for Mac OS -> https://www.azul.com/core-post-download/?endpoint=zulu&uuid=f0851b11-f391-43b0-ae80-4a29f9cc8c9f -> Download ESignPDF jar file -> Double click on downloaded file -> Follow displayed instructions -> Get signed PDF You can request to concerned certificate authority for obtaining Digital Signature Certificate ( DSC ) file despite of USB token if you have any query, then mail me at parvesh.garg@outlook.com
    Downloads: 4 This Week
    Last Update:
    See Project
  • 16
    Emojis of Death
    Emojis of Death is a down and dirty browser app, written in HTML. It's HTML, so it will work on anything a web browser can run on. It's purpose is to hide text strings in emojis, which you can then text or email. An encoded emoji can hold quite a bit of text. The receiver will need Emojis of Death as well, to decode the emoji. The file's small size makes it perfect for your phone. Some email and text services don't work with this, so try it.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 17
    File Encrypter

    File Encrypter

    Encrypt your files fast and for free!

    The File Encryptor and Decryptor is a user-friendly GUI application that empowers users to encrypt and decrypt files, providing an added layer of security to sensitive data. With its intuitive interface and robust encryption algorithms, this tool ensures the privacy and confidentiality of your files. Features: File Encryption: Users can easily encrypt individual files or a batch of files by selecting them through the application. Encryption helps protect files from unauthorized access by transforming the contents into a scrambled format using a secure encryption algorithm. File Decryption: Encrypted files can be decrypted effortlessly using the same encryption key that was used for encryption. This feature ensures that authorized users can access and restore the original contents of the files. Strong Encryption Algorithms: The application employs robust encryption algorithms, such as AES (Advanced Encryption Standard), to provide a high level of security for the encryption.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 18
    * This project is dead. Please see <a href="http://www.winpt.org/">Windows Privacy Tools</a> *<br/><br/> GWP is a multilangual package which eases the installation process of GnuPG and WinPT on Windows based systems.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 19
    A lightweight Windows HTA Application useful as your regular google hacking tool on Windows platform.A comprehensive search form bundled with sensitive keywords. It's capable of saving searches on disk and directly modifying keyword files.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 20
    IP Blocker is an incident response tool that automatically updates access control lists on Cisco routers and other devices. Web and command line interfaces are both supported, as is logging, email notification, and automatic expiration of blocks.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 21
    ImageLock
    ImageLock ist ein Programm mit dem man Dateien und Ordner hinter jpg-Bildern verstecken und verschlüsseln kann.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 22
    Infernal Wireless

    Infernal Wireless

    Infernal Wireless Penetration Testing Suite

    Infernal Wireless – Penetration testers tools Infernal Wireless Penetration testing tool is created to aid the penetration testers during wireless assessment. Having looked around we all see a lot of penetration testing suits which can automate the process of penetration testing easier for us during Web or other kind of audits, but I did not find one for wireless hacking, except some commercial tools. So, I thought how about to create a tool which automate many different type of attacks with a click of button and save us some time. We got to admit that some of the attacks can get complex. Well, I decided to create the suite and make use of publicly available tools to achieve it. Followings are features which can be achieved with the tool: WPA2 hacking WEP Hacking WPA2 Enterprise hacking Wireless Social Engineering SSL Strip Evil Access Point Creation Infernal Wireless Report
    Downloads: 4 This Week
    Last Update:
    See Project
  • 23
    Isolated Execution is a software reference implementation of the security through isolation concept. It brings a contained environment where malware can run without affecting the whole system.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 24
    JSmex is a JAVA based SmartCard Explorer with an user friendly GUI. It can read and edit the data on SIM, JavaCard, Geldkarte and Cryptoflex cards. Since version 1.1.0 JSmex can also read electronic passports (MRTDs) in plain or BAC mode.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 25
    L2Acc is a packet sniffer for Lineage 2 (C4) game that uses WinPCap. It tracks the private shop prices and provides market evolution, scans the inventory and calculates its value, recipe budgets, allows recipe search and price estimation.
    Downloads: 4 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB