Open Source Windows Security Software - Page 51

Security Software for Windows

View 1532 business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 1
    A steganography tool. You can hide 2Gb file in multiple images, supported almost all graphic formats. Average capacity ~ 40%. Useful for publishing censored materials in the Internet. Details on the project's website (stegoshare.sf.net).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2

    Substitution Cipher Decryption

    Decrypt messages encrypted with a substitution cipher

    The provided program helps the user with the deciphering of a substitution cipher with the 26 letter alphabet by providing the following features • Dynamic entering of ciphertext. Ciphertext can be modified at any point of the process. • Easy location of corresponding characters in the ciphertext and the substituted text by selection. • Fast frequency analysis for single letters, bigrams, trigrams and quadgrams (more N -grams can be made available by adding a single line of code). • Showing the most common letters (bi-/trigrams) in the ciphertext compared to the most common letters (bi-/trigrams) in the British English language. • Easy assignment and change of the substitution letters. • Auto assignment of the 10 first letters.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Substitution Cipher Toolkit

    Substitution Cipher Toolkit

    Substitution cipher toolkit (en/decryption + automatical cracking)

    This substitution cipher toolkit enables you to en- and decrypt texts with substitution cipher, to gather language statistics of a specific language and to crack encrypted texts both manually and automatically. All functions can be accessed via an easy-to-use graphical user interface.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    The Felix can propagate accross a network without the knowledge of the users and randomly run a program, which can be incorparated. It's ideal for keeping programs running that advanced users would remove and can even optionally play Bach's famous two
    Downloads: 1 This Week
    Last Update:
    See Project
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • 5
    The File Shredder securely shreds files by overwriting them before they are deleted. Every character in the file is overwritten with customised random data, so it is secure, but a little slow. The file is also given a random name.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Travail de maturité: DDOS
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    U-Tranz

    U-Tranz

    UDP based secure file transfer application written in JAVA.

    U-Tranz is a free application developed on the characteristics of UDP allows the transmission of unlimited file size. Most of the applications based on UDP restrict file sharing upto 64kb which makes transmission less efficient on large files. Along with the tremendous increase in file size, certain features like implementation of Government Standard Security Algorithms (AES-256*/RSA-2048 and SHA-512) have been added to this application for secure sharing of huge files across different workstations.This tool programmed in JAVA and requires Java Runtime Environment to use this tool. *Unlimited Strength Java Cryptography Extension Policy Files for the Java SE Runtime Environment 7 required to use this feature.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    USBForce
    USBForce is a tool to protect Windows systems against infections by viruses and worms from flash disks (USB sticks, flash cards and so on).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    USBNinja

    USBNinja

    A tool to whitelist USB devices to prevent data leaks

    Security software to monitor your PC for USB removable media insertion. Provides the ability to whitelist USB drives by burning a serial to them and blocking all un-authorized devices from mounting.
    Downloads: 1 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 10
    USBShield

    USBShield

    USBShield protects your Windows from unauthorized USB devices

    USBShield stands out as a free and open-source option for users seeking security against unauthorized USB access. Unlike many competing paid solutions, it offers extensive usability through its portable format and easy rule syntax, along with essential functionalities like automatic device disabling and thorough event logging. If you're looking for a straightforward yet effective means to safeguard your Windows system from unauthorized USB use, USBShield is a reliable choice.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Ultramarker

    Ultramarker

    Ultramarker assessment criteria, marking and report generation system

    Is a Windows (and Linux) based application that allows educators and assessors to design criteria based assessment rubrics. It specifically allows generic feedback to be defined based upon common errors and individualised feedback. Grading schema can be easily designed to define levels of achievment or compliance to standards . Multiple weighted criteria can be included in the assessment and the same criteria used for multiple sessions. Sessions may be used to assess typically laboratory based work where common criteria are used to assess a number of similar lab sessions. Defined criteria can be used to assess systems or students and a feedback report generated that can contain a number of items including specific feedback comments. A summary of marks for a group can also be generated. See Files for help on installation and additional support files to download. See: https://youtube.com/playlist?list=PLkgslO9jUVjFDXB8HlXjeiWEC6GC2P_Bm Web site: https://ultramarker.wordpress.com
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    The aim of the UndertheCarpet project is to develop a general steganalytic tool that is able to proccess different stego mediums (multiple image formats such as gif, bmp, jpg, etc. but also sound and text files), incluiding many of the state-of-the-art te
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    USRBAC is a kernel patch and userspace daemon that allows role based access control to be mitegated in userspace. The goal is to allow a secure way to impliment RBAC compliant security systems using a daemon in userspace
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    Current tools include, fixblaster, fixswen, and fixsobig.f
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    VenSafe

    VenSafe

    Free, secure, customizable and the best folder locker software!

    [UPDATE! - VenSafe 2.0.1.2) VenSafe, the best of its kind; A Folder/USB locker software by Rahul M. The all-new VenSafe is ready with its simple, smooth and friendly GUI. This version is far more secure comes with all kinds of bugs, bypasses and cheats fixed. The password can no longer be edited by others from outside. Everything's in the Settings. It's impossible to crack through your folder once it's locked. In case you forget you VenSafe password, you can request for a recovery mail or display it on screen after a small process of Security questions. You can setup your recovery mail in the settings and get the VenSafe password. In case of entry of an incorrect password, it gets stored in the logs and the logs are sent to your mail immediately, if opted so in the settings. VenSafe is highly customizable to suit users' needs.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16

    Vigenere Dictionary Attack

    Vigenere brute force / dictionary cracking tool

    This is a tool that uses a combination between a brute force and dictionary attack on a Vigenere cipher. At present, keys are generated using brute force (will soon try passwords generated from a dictionary first). Each key is then used to decode the encoded message input. The output is analysed and then put into a ranking table. Outputs will be ranked on a variety of factors (at present, only number of dictionary words in output are counted). For the future: Better key generation, trying combinations of dictionary words with numbers. If that fails, brute force will be used. For all attempts of the dictionary attack, only keys within the known key length range will be generated. Better ranking system and analysis of possible decoded messages. Note: The version currently released, I made in an evening! It is nowhere near ready for release but is a fun project to think about and I need more ideas for improvements mentioned above. Discuss possible solutions and ideas!
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    Vigenère

    Vigenère

    A powerful tool for cracking the Vigenère cipher

    Vigenère is a program for encrypting and decrypting text using the Vigenère cipher. Built-in cryptanalysis tools make it possible to crack the cipher without needing the key — or even knowing its length.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    Vulnerable Operating Systems

    Vulnerable Operating Systems

    deliberately vulnerable operating systems

    VulnOS are a series of deliberately vulnerable operating systems packed as virtual machines to teach Offensive IT Security and to enhance penetration testing skills. For educational purposes!
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    WFuzz FrontEnd (WFuzz UI) is what we just wrap GUI to the all-time famous wfuzz.py by edge-security.com which got its fame thanks to its multi-threading and flexibility to show desired results based on HTTP response codes/no. of lines/words.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    WLGen is a tool that generates customizable wordlists for bruteforce attacks.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    Web Scanner is a command-line program that is designed to scans web servers to find default and potentially vulnerable web pages. 2.0 - Java, 1.3 - Perl Web scanner supports both HTTP and HTTPS protocols and can be configured to use custom data files.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    Weeny Free Password Manager

    Weeny Free Password Manager

    Manage all your passwords in an encrypted database.

    Weeny Free Password Manager is a free password manager tool to manage all your passwords in an encrypted database. You can put all your passwords in one database, which is locked with one master key or a key file. So you only have to remember one single master password or select the key file to unlock the whole database. The databases are encrypted using secure asymmetric cryptographic algorithm. The secure asymmetric cryptographic algorithm includes: 3DES, Blowfish, Cast128, DES, Ice, Ice2, RC2, RC4, Rijndael, Serpent, Tea, Thin Ice and Twofish.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    WinFail2ban scans log files/event viewer and bans IP that makes too many password failures.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    A Windows application which calculates hashes of files or strings using the most widely spread algorithms
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    WinMd5Checksum

    WinMd5Checksum

    Calculating and comparing MD5 checksums, calculating SHA256 hash

    You can calculating md5 hashsums, comparing files and hashsums in pairs. If you have backups of one file and you have a md5 hashsum, you can compare your backups against this md5 hashsum. Calculating SHA256 hashes too. This repository will no longer updated! Please take a look at this url: https://github.com/tualatin/winmd5checksum
    Downloads: 1 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB