JSummer is a tool to compute and check MD5, MD4, MD2, SHA-160, SHA-256, SHA-384, SHA-512, RIPEMD128, RIPEMD160, WHIRLPOOL, TIGER, HAVAL message digest consisting of a Console-Version and GUI. Implemented in Java.
The Mav.Crypt tool will be upgraded to many different encryption methods. At the Moment, the only method is ROT13, but we are developing some other technics and a new Algorithm. More Infos shortly at the Project Web Page.
The Secure Java Code Filter (SJCF) provides an ICAP-based filter mechanism for mobile Java code and the signatures applied to it. Administrators can define a centralized policy determining which applications and signatures respectively are allowed.
DioNiSio is a DNS scanner written in ANSI C that only depends on sockets library and libc. It implements 3 scan methods (dictionary, massive reverse lookup and recursive zone transfers). Targeted to portability, rational resources usage, and easy use.
A Cryptography php module very easy to use, could be used to protect databases, files, ad hash codes in every server that support php. Nowdays the most used hash algoritms are weak and there are many huge database with the hash code and the relative pass
Legalfinger is a bunch of Java-based software including a set of portable software installed inside an USB finger to protect any digital content copied onto the USB finger.
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
This application aims to be a simple, small and portable enrypter which encrypts any number of files of any size quickly but securely. It also preserves file extensions which are encrypted with the file and handles ANY file type.
A client for the passcracking.com online database ob MD5 and SHA1 Hashes.
It allows to generate MD5 and SHA1-Hashes from passwords and querying the database to get the password for a given hash.
Searches for Win32 executables that do not have an executable extension (e.g. exe, com, dll). Can also optionally display all Win32 executables encountered.
A distributed and dynamically threaded password cracker. Completely cross-platform using Qt 4.3. Utilizes 1 server and N clients to distribute password cracking across N machines, each of which can utilize N CPUs.
This is a library for easy accessing chip cards /smart cards via a chipcard reader. It currently works under Linux, FreeBSD and Windows. It is tested with Towitoko and Kobil readers.
Gateway Anti-Virus allows applications across the enterprise to check files for viruses by providing a SOAP-based virus scanning web service. The system uses clamav for virus definitions and detection.
jHomeNet is a home automation client/server application written in Java used to monitor and control sensors and devices around your house. The application uses of a number of existing communication technologies including Dallas Semi's 1-Wire and X-10.
Minarke Is Not A Real Kriegsmarine Enigma
But it will allow you to communicate with one. Command line enigma machine emulator. Full M4 compatability, can be used to decode WWII U-boat messages, or send your own.
The goal of this project is to create an expandable secure content store along the lines described by JSR 283 supporting an access model, which incorporates both discretionary and mandatory access controls.
Use prime numbers and pseudorandom number generators to create pseudorandom permutations to "shuffle" bits of given data (passwords, logins, PINs, files, directories). It is designed to be very secure (I hope so).
psmd listens on an interface and writes the syslog messages that it sees to disk along with a hash. In addition, it can forward system messages to another system as though the messages came from the original device.
soCurious is a firefox extension for capturing HTML form data and storing it, when a password field has been found.
Storage can be a local file or transmission of the data over HTTP or SMTP.
TACS (Trust Ant Colony System) is a Trust model for P2P, Ad-hoc and Wireless Sensor networks (also valid for multi-agent systems) based on the bio-inspired algorithm ACS (Ant Colony System).