Open Source Windows Security Software - Page 53

Security Software for Windows

View 1532 business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    A graphical tool for creating and checking MD5 and SHA-1 checksums. Comes with a convenient batch mode. Works also from the command-line. Written in Java/Swing as a comfortable tool for your file checks.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Yet Another Cleaner (YAC)

    Yet Another Cleaner (YAC)

    Protects from browser hijacker, malicious plug-ins, malware and more

    Yet Another Cleaner is a all-in-one FREE professional tool to keep your PC safe, clean and fast, removes harmful files from your PC and repairing your operating system. Protects from browser hijacker, malicious plug-ins, malwares and different viruses. It can help you get rid of unwanted browser hijacker like Qvo6, delta and V9 etc... Clear cache/browser history and boost slow computers. Just by ONE CLICK Yet Another Cleaner will take any PC problems away. Key Features: Completely FREE, effective, robust and highly reliable software that increases computing productivity by keeping PCs running smoothly and error-free. An All-In-One virus removal tool. It will keep your PC and browser safe, clean and efficient with just ONE CLICK. Browser hijacker removal. It can help you get rid of unwanted browser hijacker like Qvo6 and delta. Create and Protect your own default homepage Malware removal. It can detects and help you get rid of unwanted toolbar like dealply and webcake. Protects your PC
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
     Abdal Admin Finder

    Abdal Admin Finder

    Find website admin page

    Find website admin page for pentester
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
     Abdal Header Analyzer

    Abdal Header Analyzer

    analyzing site and web server headers

    Abdal Header Analyzer is a software for analyzing site and web server headers. As you know, headers contain information that security experts and hackers use to analyze targets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 5
     Abdal Web Traffic Generator

    Abdal Web Traffic Generator

    create useful statistics and traffic on your site

    This tool will have the ability to create useful statistics and traffic on your site and actually help rank your statistics on sites like Alexa and so on.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
     In-Browser-File-Encrypter

    In-Browser-File-Encrypter

    The source code of the In-Browser-File-Encrypter web app

    The In-Browser File Encrypter is a simple web application that enables you to securely encrypt your files directly in your browser using the AES-256 encryption algorithm in CBC mode. Check it out at: https://codepen.io/Northstrix/pen/xxvXvJL and https://northstrix.github.io/In-Browser-File-Encrypter/V1.0/web-app.html GitHub page: https://github.com/Northstrix/In-Browser-File-Encrypter The download shortcut: https://sourceforge.net/projects/in-browser-file-encrypter/files/V1.0%20%28Improved%20UI%29/V1.0%20%28Improved%20UI%29.zip/download Successfully tested in Google Chrome on Windows 11 and Fedora 40.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
     Loi 25 Quebec Cookie Consent

    Loi 25 Quebec Cookie Consent

    Free WordPress plugin for Quebec's Law 25. Bilingual cookie banner

    The only FREE, open-source WordPress plugin fully compliant with Quebec’s Law 25 (Bill 64). Blocks tracking scripts (Google Analytics, Meta Pixel) until user consent. KEY FEATURES • Automatic Script Blocking: Paste scripts into the “Vault” — they run only after “Accept.” • Google Consent Mode v2: Supports ad_storage & analytics_storage. • Bilingual (FR/EN): Auto-detects WordPress language. • 3 Display Styles: Bar, Popup, or Corner Widget. • Lightweight: Vanilla JS (<10KB), no dependencies. • 100% Free: No premium version, no monthly fees. La seule extension WordPress GRATUITE et open-source entièrement conforme à la Loi 25 (projet de loi 64). Bloque Analytics, Pixel et autres scripts jusqu’au consentement. FONCTIONNALITÉS • Blocage automatique via le “Coffre” (activation après “Accepter”). • Google Consent Mode v2 (ad_storage & analytics_storage). • Bilingue FR/EN (détection automatique). • 3 styles : Barre, Popup ou Widget Coin. • Ultra léger (<10KB), 100% gratuit
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Allows insertion of arbitrary code at the beginning of each function called in a .NET assembly (whether executable or assembly). Also provides code that reads through metadata and dumps information on it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    1654 — encryption system

    1654 — encryption system

    1024-bit encryption system (functional safe or disk) | С++20

    This release marks the first production-ready publication of 1654, a dependency-free cryptographic vault engine built around a strict vault abstraction and a wide-state cryptographic design. 1654 is not a wrapper around existing crypto libraries. It is a self-contained system whose cryptographic behavior is fully defined within the repository. Key Characteristics Vault-oriented model Encrypted data is treated as a sealed container-safe with explicit operations, not as a password-wrapped file. Dependency-free design The entire cryptographic surface is auditable in-tree. PetoronHash as the cryptographic core All key material derivation, diffusion, and internal transformations are driven by PetoronHash 1024-bit wide internal state The architecture uses a wide internal state to increase diffusion depth and structural safety margins. https://github.com/01alekseev/1654 Petoron | Ivan Alekseev | MIT license
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 10
    Java based Portable hashing application capable of multiple individual file signatures or proprietary group signatures (1 signature for a folder and all its contents). GUI and command line in the same executable. -sha1 -sha256 -sha51 -md5 -crc32
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    2Pix
    2Pix integrates with Windows to allow you to easily encrypt and hide files in bitmap images, a process called steganography (not to be confused with stenography). Data is stored in the low-order bits of each pixel of an image, so the file is completely hidden from view. Version 1.1 now provides plausible deniability because no unencrypted signature is stored in the image header. It should be impossible to prove an image contains a hidden file (if you use a strong password and only use 1 or 2 bits per pixel component). NOTE: This project has been moved to Google Code. http://code.google.com/p/2pix-steganography
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Open Source Anti-Trojan Made From VB.NET 2005(Comes With A Few Signatures). But, There Is No Full System Scan...YOU Have To See For Your Self!(Uncontinued As .EXE)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    As we know, in hign school, you need to login into a client to get to the internet, but the client are always for Windows XP, the Linux and Mac are always ignored by them. Here we will take you a open source client!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A text editor which saves data encrypted with strong cryptography (AES, Blowfish..)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A simple checksum verifier
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    A USLESS KEYLOGGER |MZL

    A USLESS KEYLOGGER |MZL

    A keylogger that save your data with yourself and works

    A keylogger that save your data with yourself and works as backup of every text you write
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    A Very Simple Captcha

    A Very Simple Captcha

    This Plugin provides very simple and powerful captcha for your blog

    This Plugin provides very simple and powerful captcha for your blog with wide variety of logical methods and models. By displaying different logical captcha with random manner may provide high level of security. Users can select wide variety of methods to display the captcha 1. Sorting in increasing or decreasing order 2. Entering biggest or smallest number 3. Selecting Am or Am Not Spammer using combo box 4. Entering the alphabets 5. Addition or Subtraction 6. Selecting Am Not Spammer using check box
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Grained Login is a fine-grained login system for Qt applications. It uses SHA1 hashed passwords to retrieve user rights from a SQLite database. An administration dialog handles the maintenance of the users, the roles, the rights and the password history.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Inguma is a free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembl
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    A security framework for providing AAA functionality for Avalon based applications. The pluggable architecture for underlying datastores and Authentication, Authorization and Auditing Managers provides a flexible, extensible framework.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    A C++/Qt program for use in encrypting and decrypting simple substitution cyphers. These cyphers are often found in newspapers and various puzzle books.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    A set of tools for querying and modifying the ACL's (access control lists) and ACE's (access control entries) of files, services, registry keys, printers, processes, threads, timers, mutexes, tokens, events, and semaphores in Windows 2000 and later
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Pure managed C# implementation of well-known cryptographic hash functions such as SHA-family (SHA0, SHA1, SHA2), MD-family (MD2, MD4, MD5), RIPEMD, Tiger, Haval, Snefru and others. Moved to Github: https://github.com/AndreyRusyaev/acryptohashnet
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    ADAM is the Active Defense Algorithm and Model. It is a formally defined process of determining appropriate active response actions in the event of an attack. This implementation shows that active defense can be a legitimate and responsible security tool
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    ADPasswordNotificator

    Active Directory password expiration notification tool

    Notifies users in the domain of an impending password expiration
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB