Open Source Windows Security Software - Page 43

Security Software for Windows

View 1532 business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 1
    CryptKit is a small, fast cryptographic toolkit for python. It implements Rijndael(AES), SHA 256, Elliptic Curve PKI, Diffie-Hellman key exchange and Nyberg-Ruppel signature/verification. Comprehensive enough to provide a secure socket alternative to SSL
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    REAPER Forensics
    Rapid Evidence Acquisition Project for Event Reconstruction (REAPER) - Open Source forensic environment for the complete automation of the digital investigation process. At its core is Debian Live and the Open Computer Forensics Architecture (OCFA).
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    ROT-13 Encryption/Decryption Free
    This is a ROT-13 Encryption/Decryption Program made by me. It uses the ROT-13 algorithm to encrypt messages;which is very basic. You can use this app to send encrypted messages to your friends and decode them too.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    An RSA library written in all languages allowing you to easily implement RSA in your software
    Downloads: 2 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    Rose Crypt provides users with a simplistic application that can be used for encrypting files in your computer using a custom passphrase. With its minimal design, Rose Crypt can be used by both advanced and beginner users. Once the encryption process is finished, you can access the newly created file from the location you previously selected.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6

    SHA256-in-C

    SHA-256 Algorithm Implementation in C

    Downloads: 2 This Week
    Last Update:
    See Project
  • 7

    SQLI Hunter v1.2

    An automation tool to scan for an Sql Injection vulnerability.

    SQLI Hunter is an automation tool to scan for an Sql Injection vulnerability in a website. It automates the search of sqli vulnerable links from Google using google dorks! SQLI Hunter can also find admin page of any website by using some predefined admin page lists. Fast and Easy to use ! ================ Coded By MAK ================
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    SYPPS

    SYPPS

    small yet powerful php shell

    SYPPS - small yet powerful php shell is another PHP shell for pentesting
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    Secret File

    Secret File

    File Encryption/Decryption using password

    Secret File is a free and easy to use encryption/decryption app that can encrypt nearly any kind of file format using passwords. Files can be stored as personal or sent over the internet as confidential as the data of files are securely encrypted at the binary level itself and can be decrypted at any time and anywhere. You can also use multi-level protection for more secureness.
    Downloads: 2 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 10
    Secured Sumatra PDF is a modified version of Sumatra PDF aimed to be implemented in specially secured Terminal Server Environments like Citrix.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    Sguil's (pronounced sgweel) main component is an intuitive GUI that receives realtime events from snort/barnyard. It includes other components which facilitate the practice of Network Security Monitoring (NSM) and event driven analysis of IDS alerts.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
    Java-based security platform which provides a multi-user service middleware for distributed systems. Features: service environment, Shell-based interaction, user authentication (password, soft-token, smard-card), policy enforcement, Web services support
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    Super Folder Locker
    Super Folder Locker is a Free Tool to Lock Your Folder So That Nobody
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    TclTrf is an extension library to the script language tcl, as created by John Ousterhout. It extends the language at the C-and Tcl-with ``transformer''-commands to encode and compress data. Based on the stacked channels of the tcl core (ability inter
    Downloads: 2 This Week
    Last Update:
    See Project
  • 15
    This application provides, for everyone, a cryptographic implementaion of the RSA, AES and RC4 algorithms. Steganography is also supported, providing a secure transfert solution. The goal is to make all people access to this nice cryptographic world :)
    Downloads: 2 This Week
    Last Update:
    See Project
  • 16
    An Open Source Key logger Created in Borland Delphi 7. Supports any Operaring System, and safest of it's kind. It's unique and untraceable, use it for anything you can imagine.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 17
    This keylogger will say on the window that it is scanning files but it is actually logging keys (only characters and space, more willl come soon!!! Please enjoy Thylakoid! (supports ALL windows 32-bit versions
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    UFOWardriving

    UFOWardriving

    UFO Wardriving è un software studiato per trovare le password wifi

    UFO Wardriving homepage: www.thc-scripting.it La versione per Windows è possibile trovarla nella homepage o su softonic UFO Wardriving è un software che contiene gli algoritmi di generazione della password dei router: *Alice *DLink *Fastweb *Huawei *Infostrada *Jazztel_ *WLAN_ *Speedtouch *Thomson *INFINITUM *Discus- *Discus-- *BBox *BTHomeHub *Otenet *Sapo *Dmax *Orange *Cyta *Privat *BigPond *Meo *O2Wireless *TeleTu *Tele2 *YaCom *WLAN *WiFi Riesce a trovare la maggior parte delle password di questi router wifi, inoltre ha uno scanner wlan per recuperare ulteriori informazioni dalle reti (mac, ssid, tipo di rete, autenticazione...) Potete tenervi aggiornati e scaricarlo da qua: http://www.thc-scripting.it/05/07/2012/ufo-wardriving-trovare-le-password-dei-router-wifi-con-2-click/
    Downloads: 2 This Week
    Last Update:
    See Project
  • 19
    USB History Dump is a forensic tool used to trace evidence of USB thumb drive activity from the Windows Registry. It can be used to gather information such as the last time the thumb drive or mp3 player was connected as well as the last drive letter.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 20
    Ultimate Advance Visual

    Ultimate Advance Visual

    A free DLL injector to live EXE process

    This UAV can inject your favorite dll to live process, making more advance then usual. Normally for injecting games, also support injecting 2/multiple different "dll" making more powerful.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 21

    Umbrella Project 2012

    Security (Hack) Application

    What is include 1.Web Scanners a) RFI Scanner b) LFI Scanner c) SQLi Scanner d) Log Scanner e) Xss Scanner f) Google Scanner h) Joomla and WordPress Scanner 2.IP Reverse 3. Deface Mass Saver a) Zone-h deface saver b) IMT deface saver 4. MD5 Hash Cracker a) Online MD5 Hash Cracker (49 Sites) b) Manuel MD5 Hash Cracker 5. Admin Finder 6.Exploit Finder 7. Brute Force a) Joomla Brute Force b) WordPress Brute Force c) FTP Brute Force 8.Proxy a) Online proxy grabber b) Auto Clicker with proxy 9. Coding/Decoding a) Base 64 Code/Decode b) Md5 Creator c) Other Pass Creators 10.Other Tools a) Online File virus Scan b) Cloud Flare IP Resolver c) Manuel Script RFI Scanner d) Shell Control and more
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    VPNmonitor is a Java tool for network administrators to monitor VPN and SSL connections. The graphical representation makes it easy to visualize messages between computer nodes. Users can also read messages not of the above types in plain text.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 23
    An extremely versatile neural net. Hopefully.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 24
    Virtual Keyboard for security web systems access
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25

    Visual Figaro

    System safety, dependability and security analysis

    Visual Figaro is an integrated environment to develop component libraries for the dependability modeling tool KB3 used by EDF (http://www.edf.fr/recherche/codes-de-calcul/kb3). KB3 is based on the FIGARO reliability modeling language, suitable for describing CTMC (continuous time Markov chains), DES (discrete event simulation) models, and for automatic generation of fault trees. FIGARO is objet oriented, close to natural language and enables building libraries of reusable components (knowledge bases). Go to "Files" tab to download various Figaro based tools (Visual Figaro, KB3, YAMS), lots of examples and documentation.
    Downloads: 2 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB