[go: up one dir, main page]

Open Source C Security Software - Page 8

C Security Software

View 5654 business solutions

Browse free open source C Security Software and projects below. Use the toggles on the left to filter open source C Security Software by OS, license, language, programming language, and project status.

  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    Expand a TrueCrypt volume on the fly without reformatting. All kind of volumes (container files, disks and partitions) formatted with the NTFS file system are supported.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2

    The ASN.1 Compiler

    Go to github.com/vlm/asn1c for the latest version.

    This ASN.1 compiler turns ASN.1 specifications into C code. The asn1c is shipped together with conformant BER/DER/XER/PER codecs. The X.509, GSM TAP3, MEGACO, RRC and LDAP encoding and decoding examples are part of the source code distribution. NOTE: THE asn1c PROJECT HAS LARGELY MOVED TO GITHUB: http://github.com/vlm/asn1c
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    Active dictionary attack on WEP keys in WLAN networks.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4
    YAPH - Yet Another Proxy Hunter - intended for validation of any given SOCKS 4/5 or HTTP proxy server for compatibility with TCP tunneling features.
    Downloads: 5 This Week
    Last Update:
    See Project
  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • 5
    hexinject

    hexinject

    Hexadecimal and raw packet injector and sniffer.

    Hexadecimal and raw packet injector and sniffer. Can be easily combined with other tools to provide a powerful cmdline framework for raw network access.
    Leader badge">
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    A Linux port of the OpenBSD/FreeBSD Cryptographic Framework (OCF). This port aims to bring full asynchronous HW/SW crypto acceleration to the Linux kernel, OpenSwan, OpenSSL and applications using DES, 3DES, AES, MD5, SHA, PublicKey, RNGs and more.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    TCP over RDP tunneling tool
    Downloads: 3 This Week
    Last Update:
    See Project
  • 8
    AcousticSoundboard

    AcousticSoundboard

    Free, easy to use, lightweight soundboard for Windows

    Acoustic Soundboard is a free, open source program for Windows which strives to be easy to use and lightweight. The main purpose is to conveniently play audio files to others while allowing the user to hear what is playing and still use their microphone normally. There is no installation required, simply unzip the contents wherever you like. On closing, the soundboard will automatically save the user's last devices, sounds, and hotkeys to a database file. View a demo video here https://www.youtube.com/watch?v=cPdncc-q1oM If you want others to hear your microphone and the sounds you play, you will first need to install a virtual audio cable such as this one: https://vb-audio.com/Cable/ IMPORTANT: Windows may warn you that this program contains a virus because it hooks the keyboard. Your data stays on your computer only. Please see the readme for more information.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 9
    Ncrypt is intended to give you security in an insecure environment. If you are wanting to encrypt files, wishing to hide your activites from prying eyes, and want to "cover your tracks", Ncrypt is for you.
    Downloads: 8 This Week
    Last Update:
    See Project
  • Top Corporate LMS for Training | Best Learning Management Software Icon
    Top Corporate LMS for Training | Best Learning Management Software

    Deliver and Track Online Training and Stay Compliant - with Axis LMS!

    Axis LMS enables you to deliver online and virtual learning and training through a scalable, easy-to-use LMS that is designed to enhance your training, automate your workflows, engage your learners and keep you compliant.
    Learn More
  • 10
    A simple and effective port scanner coded in C. PortScanner\'s simple UI (User Interface) allows users its features with little to no issues.
    Leader badge">
    Downloads: 8 This Week
    Last Update:
    See Project
  • 11
    JPAM is a Java PAM bridge. PAM, or Pluggable Authentication Modules, is a standard security architecture used Unix, Linux and Mac OS X systems. JPAM permists the use of PAM authentication services to Java applications running on those platforms.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 12
    This is a library for easy accessing chip cards /smart cards via a chipcard reader. It currently works under Linux, FreeBSD and Windows. It is tested with Towitoko and Kobil readers.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 13
    zssh (Zmodem SSH) is a program for interactively transferring files to/from a remote machine while using the secure shell (ssh). It is intended to be a convenient alternative to scp, avoiding the need to re-authenticate each time a file is transferred.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 14

    T50

    Very fast network stress tool

    the fatest network packet injector *WARNING*: Don't use versions prior to 5.8. There is a major bugs recently discovered and fixed in this release. *WARNING*: The GitHub account containing the T50 project was deleted permanently. The new repository (with all commits, comments, "merge requests", ...) is already available at GitLab: https://gitlab.com/fredericopissarra/t50 *WARNING*: All older releases, except 5.7.* were DELETED. 5.4.1 and below are Nelson's original source code.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 15
    Unhide is a forensic tool to find processes and TCP/UDP ports hidden by rootkits / LKMs or by another hiding technique. Note 1: Unhide-linux repo has migrated to https://github.com/YJesus/Unhide Please, report bugs or make pull requests on the new repo. Note 2: unhide-windows is no more maintained. Use tools like Gmer http://www.gmer.net/
    Downloads: 4 This Week
    Last Update:
    See Project
  • 16
    Vortex is a near real time IDS and network surveillance engine for TCP stream data. Vortex decouples packet capture, stream reassembly, and real time constraints from analysis. Vortex is used to provide TCP stream data to a separate analyzer program.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 17
    NOTE: dkim-milter has been replaced by OpenDKIM, available at http://opendkim.org/ dkim-milter consists of two parts: A milter-based application (dkim-filter) which plugs in to Sendmail to provide DomainKeys Identified Mail service, and a library (libdkim) which can be used to build DKIM-compliant applications or MTAs.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 18
    winKeyLock utility enables to lock computer access quickly. Disables the Windows keyboard and mouse so a DVD/Movie can be watched by a small child without changing anything! During lock the current screen stays transparent not like during screen server.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 19

    Cosign: Web Single Sign-On

    Open Source Web Single Sign-On

    An open source project originally designed to provide the University of Michigan with a secure single sign-on web authentication system. Cosign is part of the National Science Foundation Middleware Initiative (NMI) EDIT software release.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 20
    A general purpose set of tools, C library and CPAN modules to help DomainKeys developers. The goal is that these tools and library can be easily adopted by all MTAs, LDAs and possibly MUAs. This project is about conforming to the DomainKeys standard,
    Downloads: 7 This Week
    Last Update:
    See Project
  • 21

    Ed448-Goldilocks

    A 448-bit Edwards curve

    This is an implementation of elliptic curve cryptography using the Montgomery and Edwards curves Curve25519, Ed25519, Ed448-Goldilocks and Curve448, using the Decaf / Ristretto encoding.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 22
    TclTrf is an extension library to the script language tcl, as created by John Ousterhout. It extends the language at the C-and Tcl-with ``transformer''-commands to encode and compress data. Based on the stacked channels of the tcl core (ability inter
    Downloads: 7 This Week
    Last Update:
    See Project
  • 23
    An ncurses based password database client that is compatible with KeePass 1.x format databases.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 24
    fswatch is a small, simple utility that detects changes in a filesystem. it watches for a file system integrity. it checks inode, links, uid, gid, mode, size, flags, ctime, checksum (SHA1).
    Downloads: 7 This Week
    Last Update:
    See Project
  • 25
    gnoMint
    An easy CA managing tool for graphical and command line environments.
    Downloads: 4 This Week
    Last Update:
    See Project