Showing 69 open source projects for "hard"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    Step Certificates

    Step Certificates

    A private certificate authority (X.509 & SSH) & ACME server

    ...For people, in exchange for single sign-on ID tokens. For hosts, in exchange for cloud instance identity documents. Whatever your use case, step-ca is easy to use and hard to misuse.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    EMBA

    EMBA

    The firmware security analyzer

    ...EMBA automatically discovers possible weak spots and vulnerabilities in firmware. Examples are insecure binaries, old and outdated software components, potentially vulnerable scripts, or hard-coded passwords. EMBA is a command line tool with the possibility to generate an easy-to-use web report for further analysis. EMBA assists the penetration testers and product security teams in the identification of weak spots and vulnerabilities in the firmware image. EMBA provides as much information as possible about the firmware, that the tester can decide on focus areas and is responsible for verifying and interpreting the results.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    Personal Management System

    Personal Management System

    Your web application for managing personal data

    It's easier to understand this web application when you think about a CMS (WordPress) or CRM (SugarCRM); the logic behind this system is very similar to those two. My PMS may offer fewer possibilities than those systems above, but it just does what I want it to do. Additionally, writing extensions is not too hard, depending on the logic required. Anyone with development knowledge can pretty much write their own extensions for personal needs. Keep a track of your personal goals. You can use tools to keep track of your goals progress or use the payments submodule to keep an eye of the money amount that you want to collect for something. Add any personal note to the desired category. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    SecretScanner

    SecretScanner

    Find secrets and passwords in container images and file systems

    ...However, sometimes attackers can easily access secrets due to flawed security policies or inadvertent mistakes by developers. Sometimes developers use default secrets or leave hard-coded secrets such as passwords, API keys, encryption keys, SSH keys, tokens, etc. in container images, especially during rapid development and deployment cycles in CI/CD pipeline. Also, sometimes users store passwords in plain text.
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    Eraser

    Eraser

    A security tool to remove sensitive data from your Windows hard drive

    Eraser is a secure data removal tool for Windows. It completely removes sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
    Leader badge
    Downloads: 8,631 This Week
    Last Update:
    See Project
  • 6
    Aviator Predictor

    Aviator Predictor

    Aviator hack: seed-inspection of aviator crash predictor & aviator app

    Our downloadable SHA256 analysis tool powers the Aviator predictor, Aviator predictor app, and aviator crash predictor. Available for desktop, it’s designed for research, fairness verification, and safe demo testing Demo-focused aviator predictor tools — seed-inspection helpers (SHA-512 / SHA-256), AI-assisted summaries, and demo bot templates for aviator crash predictor, Start in demo mode to test safely. Disclaimer: Provided for analytical and testing purposes only. No predictive...
    Leader badge
    Downloads: 3,799 This Week
    Last Update:
    See Project
  • 7
    winPenPack

    winPenPack

    The portable software collection

    winPenPack is a project that aims at collecting the most frequently used and most popular open source applications made portable, so that they can be executed without installation from any USB Flash Drive or Hard Disk. The winPenPack suites offer a wide range of portable applications like office tools, internet tools, multimedia tools, development tools, security applications and other frequently used utilities. Everything you need, completely free, open source and portable!
    Leader badge
    Downloads: 501 This Week
    Last Update:
    See Project
  • 8
    Application Blocker

    Application Blocker

    Application Restrictor Tool For Windows

    ...It can block access to selected programs. It is very effective and easy to use. You can select any program file and add it to the list. The lock is reliable and very hard to break for normal users. The tool does not work at background when using standard block. In password lock mode, the tool uses minimal resources and does not affect system performance. This program can be used to control your child or prevent access to programs on special areas like school computers. You can set an UI password to prevent unauthorized users from blocking and unblocking programs. ...
    Leader badge
    Downloads: 52 This Week
    Last Update:
    See Project
  • 9
    SecureDel

    SecureDel

    Secure File Deletion

    SecureDel is a small utility that does not require installation and can be used directly from a USB drive. The program is very lightweight, very easy to use, very fast, and uses six different deletion algorithms. It does not leave any trace in the system where it acts and performs deletions in such a way that deleted files can no longer be recovered. It generates a report after each deletion to display the processing times. SecureDel 1.2.3 Released. Good Deletion!
    Downloads: 8 This Week
    Last Update:
    See Project
  • 8 Monitoring Tools in One APM. Install in 5 Minutes. Icon
    8 Monitoring Tools in One APM. Install in 5 Minutes.

    Errors, performance, logs, uptime, hosts, anomalies, dashboards, and check-ins. One interface.

    AppSignal works out of the box for Ruby, Elixir, Node.js, Python, and more. 30-day free trial, no credit card required.
    Start Free
  • 10
    PetoronHash2

    PetoronHash2

    PH2 Permutation-based cryptographic post-quantum hash library with duplex construction (C++20)

    PetoronHash2 (PH2) is a standalone ARX-based sponge construction that combines: A 4096-bit internal permutation core A sponge/duplex architecture with explicit capacity separation An extendable-output function (XOF) Memory-hard (HARD) and burn (BURN) modes A structured tagged absorb scheme A parameterized architecture suitable for hashing, KDF, and stress-oriented derivation PH2 is designed as a wide-state cryptographic primitive with explicit domain separation and configurable output length. https://github.com/01alekseev/PetoronHash2 Petoron | Ivan Alekseev | MIT license
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    DAR - Disk ARchive

    DAR - Disk ARchive

    For full, incremental, compressed and encrypted backups or archives

    DAR is a command-line backup and archiving tool that uses selective compression (not compressing already compressed files), strong encryption, may split an archive in different files of given size and provides on-fly hashing, supports differential backup with or without binary delta, ftp and sftp protocols to remote cloud storage Archive internal's catalog, allows very quick restoration even a single file from a huge, eventually sliced, compressed, encrypted archive eventually located on a remote cloud storage, by only reading/fetching the necessary data to perform the operation. Dar saves *all* UNIX inode types, takes care of hard links, sparse files as well as Extended Attributes (MacOS X file forks, Linux ACL, SELinux tags, user attributes) and some Filesystem Specific Attributes (Linux ext2/3/4, Mac OS X HFS+) more details at: http://dar.linux.free.fr/doc/Features.html
    Leader badge
    Downloads: 474 This Week
    Last Update:
    See Project
  • 12

    Thunderbird Free Scanner

    Thunderbird Anti Virus Online Free Scanner

    ...Included Scan Options Thunder Anti-Virus Free Scanner includes a comprehensive system scan. This option allows you to thoroughly scan your entire system, checking memory, hard drives, and connected devices for a wide range of threats, including malware, viruses, and trojans. You can also opt for a targeted folder scan, ideal when you need a faster analysis. You can select a specific folder or directory for a focused scan. This feature is ideal for users who want to check specific locations without scanning the entire system.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 13
    ExtPassword!

    ExtPassword!

    Recover passwords stored on external drive

    ...can decrypt and extract multiple types of passwords and essential information, including passwords of common Web browsers, passwords of common email software, dialup/VPN passwords, wireless network keys, Windows network credentials, Windows product key, Windows security questions. This tool might be useful if you have a disk with Windows operating system that cannot boot anymore, but most files on this hard drive are still accessible and you need to extract your passwords from it.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 14
    key-elf

    key-elf

    Forensic tool to recover lost BTC private keys.

    A powerful utility to hunt down Bitcoin private keys from deleted wallet.dat files or damaged hard drives. If you accidentally deleted your Bitcoin Core wallet or formatted your disk, this tool can help. It bypasses the file system and scans the raw data directly, looking for the unique "fingerprint" (ASN.1 signature) of Bitcoin private keys to recover them from the digital wreckage.The Graphical User Interface (GUI) is the advanced/premium version.
    Leader badge
    Downloads: 32 This Week
    Last Update:
    See Project
  • 15
    SafeBox

    SafeBox

    The Best file security app.

    A free and Open-Source File Encryption and Decryption app with GUI (Graphical User Interface) and CLI (Command Line Interface) that help you to protect your privacy well using AES (Advanced Encryption System) with your own password and get a single (portable )encrypted file that can share across internet or unsafe places with peace of mind without any data collection or any extra/hidden processes, It also can keep and encrypt the original file name within the file then while decryption (if you ticked the option) it can recover the original file name. I tried hard to help you in your privacy protection and keep this project running and developing. Good Luck :)
    Downloads: 14 This Week
    Last Update:
    See Project
  • 16
    Textcryption

    Textcryption

    Tiny application which allows encrypting basic text.

    ...I think it is a very strong way to encrypt, specially if the text has more than 1 KB. The application reads encrypted bytes from disk, and writes encyrpted bytes to disk, so it never is saved in the hard disk decrypted. JDK-17 compatibility
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    ProxyCrypt

    Encrypted volumes through command line

    ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Encryption and decryption are made on the fly, allowing you to use encrypted volumes like normal ones. Designed for paranoids and advanced users, it is also fast, very lightweight, open source and easy to recompile. See the features below. It works as a "proxy" for the AIM driver or the ImDisk driver. AIM driver is included in the full package.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 18
    NDW - Network Data Wiping Hard Disks HDD

    NDW - Network Data Wiping Hard Disks HDD

    Wipe erase data from hdds on the network, unlimited hard disks

    ...Once all the hard drives are wiped, data related to each hard disk is stored in the central server’s database. Read WIKI Automated unattended network based data erasure wiping Comprehensive Reporting Web GUI reporting Generates certificate of data erasure Barcodes Labels Graphs Pie / Bar / Line Charts Hard Disks bad sectors & health reporting Hard Disk SMART Data collection Database Driven Distributed System Hard Disk Drives health reports Part Open Source * Friendly GUI Graphical User Interface Mass Hard Disk Drive Destruction Data Wiping HDD Data Eraser Storage Array Data Wipe
    Downloads: 10 This Week
    Last Update:
    See Project
  • 19

    MkPasswd-Chrome_Extension

    Password Generator which creates passwords they can't brute force

    MkPasswd will create easy to remember passwords with a combination of 48 Billion Trillion easily remembered possibilities (or more!!). So stop using passwords that are hard for you to remember and easy for a computer to brute force guess. Start using SMART passwords today!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Project Bangladesh

    Project Bangladesh

    Let's clear this topic

    I don't make these stuffs Myself And I don't Take any Credits . Credits are mentioned in posts. Actually I collect lot of modules from different channels, github, pling, XDA and many more source. Finding them manually is hard so I do it for you . Here you can find many stuffs like mods , thermals , modules , wallpaper zip and etc. So please stay with me . ***Near future I will publish my own projects here ( ROMs , kernels etc ) And again thank you ☺️
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Polarity Browser

    Polarity Browser

    A fast, secure, stable web browser powered by Chromium and Trident.

    ...Polarity also comes with a built in adblocker and privacy tools such as proxy/VPN support and header masking to prevent further tracking online. If you appreciate all the hard work that we put into creating and developing Polarity, please consider giving a small donation at: https://polaritybrowser.netlify.com/donate
    Downloads: 45 This Week
    Last Update:
    See Project
  • 22
    Hikari

    Hikari

    LLVM Obfuscator

    ...The "Security Companies" might say so to sell more of their products. But no, binary obfuscation won't magically fix all your exploits and bugs, (If not introducing more). Designing an Obfuscator is hard, and keeping the source open definitely leaks the pattern to crackers which could potentially make the crackers' life easier if they have the right skillset. While every reasonable attempt has been made in Hikari to reduce such patterns from appearing, however, with overkill weapons like symbolic execution, binary obfuscation can still be defeated much easier, even so-called VM-based obfuscation. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 23
    Pharos

    Pharos

    RTOS for Secure, Safe and Real-Time Systems

    Pharos is a free open-source RTOS for secure, safe and real-time systems with the following characteristics: - Memory and enhanced time partitioning (TSP) - Native support for sporadic, periodic and aperiodic threads - Fixed-priority preemptive scheduler - Execution time protection (threads are prevented from executing for more time than they are configured to) - Small size (full image has ~100 to 300KiB text, ~30KiB data) - Hard real-time determinism - Fast critical sections - Prioritized nested interrupts - inter-partition communication with filters to protect unwanted access - Multicore support (RMP) - Supports ARM9, Cortex-A/R/M and Aarch64, RISC-V64 (64 bits) - The complete TestSuite (see below information) is run successfully for each platform in each release - Tested: more than 170 KLOC of requirement-based tests, executed for each board at each release - Up-to-date User Manual also available See our wiki page for more information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    ISP UNLOCKER

    ISP UNLOCKER

    Unlock Your ISP and access all your restricted websites

    Main Functions Links to official domain names only Users can visit linked sites or enter there on sites Easy and user-friendly interface All data is encrypted over the network Non-installer runs from CD HDD or USB Pen Auto updates System requirements Windows 7 SP1 (x86 and x64) Windows 8 (x86 and x64) Windows 8.1 (x86 and x64) Windows 10 (x86 and x64) .NET Framework 4.6.1 Requires Administrator Privileges Processor Intel or AMD x86 or 64 bit 1 GHz or faster processor 1GB of RAM At least 100 megabytes (MB) available space on the hard disk An active internet connection We have set a few website restrictions within the app for security reasons and to stop browser-based Bruteforce attacks all banks and payment gateways are restricted and will not load from within the app
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25
    SSH MITM

    SSH MITM

    SSH man-in-the-middle tool

    ...NOTE: Only run the modified sshd_mitm in a VM or container! Ad-hoc edits were made to the OpenSSH sources in critical regions, with no regard to their security implications. Its not hard to imagine these edits introduce serious vulnerabilities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next
MongoDB Logo MongoDB