Open Source Windows Security Software - Page 76

Security Software for Windows

View 1532 business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    More flexibility. More control.

    Generate interest, access liquidity without selling, and execute trades seamlessly. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 1
    This small tool mounts and umounts automatically selected drives and containers that are created by the tool Drivecrypt. Included is a login for the software configuration. Prerequisitions: Drivecrypt 4 or later. OS: Windows NT, XP, Vista, 2003
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Simple console application generating passwords in quite easy and simple way. Application allows user to copy generated passwords to clipboard.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Dunst

    Dunst

    Lightweight and customizable notification daemon

    Dunst is a lightweight replacement for the notification daemons provided by most desktop environments. It’s very customizable, isn’t dependent on any toolkits, and therefore fits into those window manager-centric setups we all love to customize to perfection. Customize fonts, icons, timeouts, and more. Are you unhappy with the default shortcuts and colors? No worries, you can change these all with a simple configuration file tweak. Change the look or behavior of notifications matching a specified pattern. You could use this to change the color of message notifications from your favorite jabber buddies, or to prevent important work email notifications from disappearing until you manually dismiss them. Specify the monitor that notifications should display on, or have them appear on the monitor with keyboard or mouse focus. Catch an unread notification disappearing from the corner of your eye? Just tap a keyboard shortcut to replay the last notification.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Dynamic Proxy

    Fetches proxies from hidemyass and changes system proxy in real time.

    Programmer name : Daryl Varghese and Kishan Patel Dynamic Proxy/Madleets Proxy v1.0 is a dynamic proxy made for madleets.com. The proxy application fetches the best proxies from hidemyass.com and changes the system proxy configuration in realtime. Features: 1.It work on all windows systems(both32bit and 64bit) 2.It has no dependencies 3. Uses the wininet Api to change system proxy 4. It is less than 700kb 5. Proxy can be changed by either hotkey or userdefined time intervals. 6.Easy and simple GUI **THIS PROJECT IS NO LONGER MAINTAINED**
    Downloads: 0 This Week
    Last Update:
    See Project
  • Add Two Lines of Code. Get Full APM. Icon
    Add Two Lines of Code. Get Full APM.

    AppSignal installs in minutes and auto-configures dashboards, alerts, and error tracking.

    Works out of the box for Rails, Django, Express, Phoenix, and more. Monitoring exceptions and performance in no time.
    Start Free
  • 5
    Dynamically unpacks portable executables by running it in windows. The file is allowed to execute and the process stops when the unpacking has be completed by detecting when a transfer of control has taken place to a modified portion of memory.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    E-Dot (which means Encryption and Decryption Of Texts) is a very small tool for encrypting textfiles. E-Dot doesn't use Keyfiles: A password is enough. This tool is available for Linux and Windows, too.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    E-mail Notifier

    E-mail Notifier

    New e-mail information

    This windows program checks for new e-mail periodically. The program installs as the startup application and shows new e-mail icon in taskbar. The program uses POP3 with SSL ports to connect. External libraries: - AES (adriancs, http://www.codeproject.com/Articles/769741/Csharp-AES-bits-Encryption-Library-with-Salt), - Nini (Brent R. Matzelle, http://nini.sourceforge.net/), - Pop3MailClient (Peter Huber, http://www.codeproject.com/Articles/14304/POP3-Email-Client-NET-2-0). Requirements: - .NET 4.0.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    EAESCrypt

    Extended AES Cryptography

    EAEScrypt is a utility that is designed to protect sensitive data using secure encryption. It uses the Advanced Encryption Standard (AES) as published by the Federal Information Processing Standards Publications (FIPS PUBS) and issued by the National Institute of Standards and Technology (NIST). The official version of AES allows only 128-bit, 192-bit or 256-bit keys, and EAESCrypt is fully compliant with FIPS-197 when using these values. But EAEScrypt can use any key size from 128-bit to 2048-bit. EAESCrypt is a command line utility. The instaler for Windows 7 provides some basic functionality in the context menu for the files in Windows Explorer, to encrypt and decrypt them, as well as to manage the encryption keys. Go to the EAESCrypt Web Site to download the installer and the source code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    ECDLP-solver

    A cross-platform ECDLP solver to be deplyed on MPI clusters

    Long time ago in a galaxy far-far away, a hacker called Rob Harley cracked Certicom ECDLP challenges on a 64bit DEC Alphas 'cluster' running client/server super lean application in low level c&asm; Decades later I decided to commemorate those breakthroughs by doing a little 're-enactment' of sorts; Please check out what came out of my naive plan;
    Downloads: 0 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10
    ECDSA File Signer

    ECDSA File Signer

    A simple app that enables you to sign the files using ECDSA and SHA512

    A simple app that enables you to sign the files and verify their integrity/authenticity using the ECDSA and SHA-512. I originally developed this app for my university course, but I also decided to post it on GitHub on Sourceforge. This application is made for educational purposes only. Despite having well-functioning cryptographic features, it may not be reliable. This application is provided with no warranty or guarantees of any kind. Use it at your own risk! Made with the help of the ChatGPT and Perplexity. GitHub page: https://github.com/Northstrix/ECDSA-File-Signer
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    A cross platform implementation of ECDSA (elliptic curve digital signature algorithm) interface to the aSuretee Token.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    ECTP - Encrypted Compressed Transfer Protocol This protocol is similar to HTTP but with commands and features like FTP. The main features are security and compression abilities and the consequent use of one perisistant connection.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    ECommands

    ECommands

    Commands made Easy and practical for Unix/Linux

    This software is made with the purpose of making easy the Unix/Linux Server management. Is made completly in Python, making this project as a OS independent. Was tested over Linux and Windows. For documentation go to http://www.life-microsystems.com/index.php/ecommands-documentation
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    HPCP (High Performance Channel Protocol) is a transactional data exchange specification, defining an implementation and usage of HTTPS, XML, SOAP, and LDAP. The EEAT HPCP implementation is written in JAVA.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    EGDW is a random number daemon for Microsoft Windows. It sits in the background and collects randomness, and makes this random data available to cryptographic software. It has an EGD compatible interface, at least as compatible as Windows allows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    ELFTool is an interface to several binary executable file formats such as ELF, PE or Mach-O. ELFTool can be used to interactively manipulate binaries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    ENCAM is an asset management database and configuration backup tool for Cisco network devices. ENCAM pulls configuration data from devices, stores it, reports changes, analyzes configuration defects, generates asset lists and compliance reports.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    ENIGMA 2000

    ENIGMA 2000 is a reliable file encrypter for DOS shell

    ENIGMA 2000 is a symmetric cryptographic algorithm developed in C++ for Windows, to encrypt any file. It is not optimized for speed processing but it is extremly reliable. Tests state that a huge input file just with zeros, will return an output file whose frequency analysis is white noise. It uses six phases to encrypt any file and the phases sequence depends on the password. On phase 5, it uses the Rubik's cube paradigm to encrypt the data. It's extremly reliable and the password varies between 8 and 16 characters. The execution syntax is: coder.exe [file to encode] [password (min 8 char, max 16)] [mode ('c'oder 'd'ecoder)] Enjoy it
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    ENTRUST

    ENTRUST

    Role-based permissions for Laravel 5

    Entrust is a succinct and flexible way to add Role-based Permissions to Laravel 5. The default migration takes advantage of onDelete('cascade') clauses within the pivot tables to remove relations when a parent record is deleted. If for some reason you cannot use cascading deletes in your database, the EntrustRole and EntrustPermission classes, and the HasRole trait include event listeners to manually delete records in relevant pivot tables. In the interest of not accidentally deleting data, the event listeners will not delete pivot data if the model uses soft deleting. However, due to limitations in Laravel's event listeners, there is no way to distinguish between a call to delete() versus a call to forceDelete(). For this reason, before you force delete a model, you must manually delete any of the relationship data (unless your pivot tables uses cascading deletes).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    epacrypt is a tool to encrypt and decrypt plaintext and binary data using different encryption algorithms which can be chosen from a list.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    This purpose of this tool is to manage SOD conflicts within an ERP environment (in our case of SAP). Segregation of Duties (SOD) is an important tool in ensuring that a business is under control from an auditing perspective. Files are available !!!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    ES-E

    ES-E

    Evolved Studios Encryption is a new platform of protection.

    ES-E is a fully downloaded encryption algorithm that you can use for your WebServer or use it for your programs (by grabbing the output off the webpage). Check the Files page for the latest build.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    ESOSI (Employment of Secret-Sharing for Object Security in Intranets) offers a security solution for companies and authorities. It extends the eCryptfs file encryption system by adding Secret-Sharing, smartcard support and a Linux Security Module (LSM).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Utility to avoid unaouthorized program execution. You can select your list of programs and set passwords for execution for each executable. Programs will be executed only if user inserts the right password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    EZ Encryption
    This simple encryption program, allows you to virtually encrypt all documents and even decrypt them back using the secure XOR encryption algorithm. This program is designed for beginners who know little about encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB