[go: up one dir, main page]

Open Source Assembly Security Software - Page 3

Assembly Security Software

View 5618 business solutions

Browse free open source Assembly Security Software and projects below. Use the toggles on the left to filter open source Assembly Security Software by OS, license, language, programming language, and project status.

  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • La version gratuite d'Auth0 s'enrichit ! Icon
    La version gratuite d'Auth0 s'enrichit !

    Gratuit pour 25 000 utilisateurs avec intégration Okta illimitée : concentrez-vous sur le développement de vos applications.

    Vous l'avez demandé, nous l'avons fait ! Les versions gratuite et payante d'Auth0 incluent des options qui vous permettent de développer, déployer et faire évoluer vos applications en toute sécurité. Utilisez Auth0 dès maintenant pour découvrir tous ses avantages.
    Essayez Auth0 gratuitement
  • 1
    K is a C++ library featuring Genetic Programming, cryptography, 64 bits arithmetic, cross-platform macros and unicode conversion routines. It compiles on NewtonOS, Mac < X, Unix and Windows and it makes little use of C++ templates.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    The purpose of this project is to provide a biometric security solution by using voice print, fingerprint and/or facial recognition along with a password and/or smart card support using AES to protect data. Please read forums for if interested.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Komoku implements an intrusion detection system using embedded system. Unlike other integrity tools, as tripwire, it does not rely on the operating system. The IDS is actually implemented in an INtel EBSA-285 board.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    ORDO vers.1.0

    AES-128, Linux, OpenBSD, Assembly-Language

    Small cryptographic command line tool for LINUX and OpenBSD (x86) completely in 32-Bit Assembly Language. ORDO encrypt/decrypt files (max. size 2 GB) with AES-128-Algorithm (Rijndael) in CBC-Mode (Cipher-Block-Chaining). No libs are included, only system-calls are used. ORDO is under BSD License.
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-based, Comprehensive Service Management for Businesses and IT Providers Icon
    AI-based, Comprehensive Service Management for Businesses and IT Providers

    Modular solutions for change management, asset management and more

    ChangeGear provides IT staff with the functions required to manage everything from ticketing to incident, change and asset management and more. ChangeGear includes a virtual agent, self-service portals and AI-based features to support analyst and end user productivity.
    Learn More
  • 5
    PE Scanner
    PE Scanner is a software for catching / modifying / analysis of portable executable (patform: Windows XP & above). Also, all PEiD's plugins are compatible to be load and run.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    This is the repository of my (PP) personal tools, scripts, programs, specifications and writings. I'm giving most of my smaller work to the world to use it, for free.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Powerful 512bit pseudo random encryption, optimized for the x86-64 architecture. Coded in x86-64 assembly language, this has the potential to be one of the most powerful and fastest file encryption engines to date.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Post Memory Corruption Memory Analysis

    PMCMA - Post Memory Corruption Memory Analysis

    Pmcma is a tool aimed at automating the most time consuming taskes of exploitation. It for instance determine why an application is triggering a segmentention fault, evaluate if the faulting instruction can be used to write to memory or execute arbitrary code, and list all the function pointers potentially called from a given point in time by an application. Pmcma is a totally new kind of debugger, which allows for easy experimentation with a process in memory by forcing it to fork. The exact replicas of the process created in memory can then be intrumented while keeping the properties (eg: state of variables, ASLR, permissions...) of the original process. Pmcma is an easily extensible framework available under the Apache 2.0 license. Read more at https://moabi.com/research/jbrossard/index.html#pmcma
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    This project is intended to demonstrate that current popular approaches to software security (e.g. DAC, VMA randomization, etc) are not sufficient and that other approaches should be considered more seriously (e.g. MAC, design by contract).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Download the most trusted enterprise browser Icon
    Download the most trusted enterprise browser

    Chrome Enterprise brings enterprise controls and easy integrations to the browser users already know and love.

    Chrome Enterprise is ideal for businesses of all sizes, IT professionals, and organizations looking for a secure, scalable, and easily managed browser solution that supports remote work, data protection, and streamlined enterprise operations.
    Learn More
  • 10
    This is the worlds first and probably only FLOSS project aimed to create a lowbudget, based on availble technology, cruise missile. No this is not a Joke, its for real. Why? Since no one has tried to do this before and certainly not under the GPL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    This project aims to develop a prototype system that explores how we should re-invision computer system design based on changes in how people get the software that they run, as well as advances in static analysis of software.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    RC4-32.ASM

    Code to brute force the 32-bit key used to RC4 encrypt .pwl files.

    PROJECT HAS MOVED TO GITHUB: https://github.com/alex-georgiou/rc4-32.asm Code to brute force the 32-bit key used to RC4 encrypt .pwl files. Assembles to a 992 byte .COM file using the Intel Architecture Assembler v1.0 Copyright (c) 1998 augusto at dcc.ufmg.br. http://web.archive.org/web/19981205090800/http://www.dcc.ufmg.br/~augusto/project/iasm.zip
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    GPL hash functions with various ouput sizes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    SSOOS- Security and Stability Oriented Operating System
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Lightweight file deleter.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    SNET (Several Network Explore Tool) allows you to safely browse, discover and exploit vulnerabilities in your network, replicating the kinds of access an intruder can achieve, and proving actual paths of attacks that must be eliminated.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    The goal of the Stik's Security Module project is to provide a vehicle for implementation of a label based security policy complimentary to the existing Linux security model. The module is implemented by hooking the Linux 2.4.x system call table.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Tecnotel is a project that seeks security and comodity to the end-user, controlling your house through the telephone line, internet or remote-controller. The software available controls the electronic-equipment and others.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    The Felix can propagate accross a network without the knowledge of the users and randomly run a program, which can be incorparated. It's ideal for keeping programs running that advanced users would remove and can even optionally play Bach's famous two
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    The Hackers Lab is aimed to provide hackers, system audits, system and server and network administrators with applications to secure their own servers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    The Nexus Operating System is a planned, realtime multimedia operating system compliant with POSIX standards. Nexus is intended not to become the next fad; it is the OS all developers can develop for without losing market standing in other OS's.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    A hardware supported hypervisor originally built for malware analysis. Features: Linux VM introspection, minimal detectability, small (~150KB), simple, and well documented. Can be used for other purposes. Support for Intel-VT & Windows coming soon.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Innovative prototype of network applications such as TCP fuzzers that can be used for many purposes such as network and application security assessments and more. Adapt it freely to fit your needs or to simply understand how TCP works in .NET.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Wargame Hackademic est un ensemble de composants à ajouter sur un liveCD linux, devenant un wargame; à partir d'un compte classique, vous devez, par divers objectifs et techniques d'exploitation, trouver les failles du cd pour accéder au mode 'su'
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    The WOLKs are stable and development kernels, containing many useful patches from many projects. Goal: Stability, Scalability, Performance and most important: Security.
    Downloads: 0 This Week
    Last Update:
    See Project