[go: up one dir, main page]

Open Source C Security Software - Page 16

C Security Software

View 5656 business solutions

Browse free open source C Security Software and projects below. Use the toggles on the left to filter open source C Security Software by OS, license, language, programming language, and project status.

  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1

    pwmd

    Serves XML element content over a UDS or TLS.

    Pwmd allows a (libpwmd) client to store and retrieve data in an encrypted XML file via an element path. An element path is a TAB delimited string where each element name is a depth of the element tree similar to how a filesystem hierarchy is organized. Each element of the element path may also contain an ACL to limit client access to an element path; beit a client connecting over UDS or TLS. An element may also contain a "target "attribute that resolves to another element path in the XML document similar to a symbolic link in a filesystem. Pwmd also supports multiple connections to the same data file (with locking), obtaining a passphrase when needed via a pinentry program or key file, gpg-agent support as well as smartcards, caching options and more.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    rjudge is a judge system for the Olympiad in Informatics. It can be also used as a problem test tool in the programming contest and daily practice. It provides many security features to ensure the smooth implement of judgement.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    FreeBSD Forensics Bootable ISO
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    Snort_inline is a modified version of Snort. It accepts packets from iptables, instead of libpcap. It uses new rule types to tell iptables if the packet should be dropped or allowed to pass based on the Snort rules.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • 5
    stegotools is a suite of UNIX command-line applications to read/write hidden information from/in files using steganography. It currently fully supports 24bpp bitmap images.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    ttyrpld is a multi-OS kernel-level TTY keylogger and screenlogger with (a)synchronous replay support. It runs on Linux, Solaris, FreeBSD, NetBSD and OpenBSD.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    Udpproxy is very simple but usefull tool for udp traffic forwarding. Can be used if you can't or don't want to mess with kernel level forwarding.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Zeppoo allows you to detect rootkits on i386 and x86_64 architecture under Linux, by using /dev/kmem and /dev/mem. Moreover it can also detect hidden tasks, connections, corrupted symbols, system calls... and so many other things.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    Derived from TrueCrypt 6.3 release, I added some command line options to "TrueCrypt Format.exe" to allow TrueCrypt volumes to be created without using the graphical user interface
    Downloads: 1 This Week
    Last Update:
    See Project
  • Teradata VantageCloud Enterprise is a data analytics platform for performing advanced analytics on AWS, Azure, and Google Cloud. Icon
    Teradata VantageCloud Enterprise is a data analytics platform for performing advanced analytics on AWS, Azure, and Google Cloud.

    Power faster innovation with Teradata VantageCloud

    VantageCloud is the complete cloud analytics and data platform, delivering harmonized data and Trusted AI for all. Built for performance, flexibility, and openness, VantageCloud enables organizations to unify diverse data sources, run complex analytics, and deploy AI models—all within a single, scalable platform.
    Learn More
  • 10
    SSH2 client for MacOS before X, based on BetterTelnet, lsh and GUSI.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Deobscufates .NET assemblies, primarily by rearranging IL code (basic block reordering) and removing junk. Designed to be modular, it is built from reusable pieces.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    This ain't your daddy's crypto! We provide a set of C libs and utilities to perform cypherpunk style crypto functions, using your existing OpenPGP keys. Ring signatures; credentials; mental poker; timelines; zero knowledge proofs. Cool stuff!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Open-source tool for Linux that can be used as part of live information gathering during an incident response to allow for after the fact in depth analysis of the running system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A set of Unixish tools allowing encrypted and compressed backups be done on exchangible media.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A set of tools for querying and modifying the ACL's (access control lists) and ACE's (access control entries) of files, services, registry keys, printers, processes, threads, timers, mutexes, tokens, events, and semaphores in Windows 2000 and later
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    A package of Rijndael, Twofish and Serpent encryption algorithms implemented in x86 assembly. Meant to learn basics of assembly, learn about the algorithms or to be used in a C program.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    AES_in_CBC_mode_for_MCUs

    AES_in_CBC_mode_for_MCUs

    Open-source code that enables you to use AES in CBC mode

    AES_in_CBC_mode_for_microcontrollers is an open-source code that enables you to easily integrate the AES encryption algorithm in CBC mode to your project. Based on the work of https://github.com/zhouyangchao/AES GitHub Page: https://github.com/Northstrix/AES_in_CBC_mode_for_microcontrollers
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    APing2 is an improved (and C rewritten) version of APing. [dev has ceased, we are waiting for the official NPing project to start]
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A console-based wireless scanner for Apple AirPort Wireless Cards on Mac OS X
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    ARI (Automated Recource Identifier) is an multithread DNS query tool. Given a root domain name, a character space (alphabet) and min/max word lengths, ARI queries all possible subdomain names.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    This is a very powerfull criptography project that basicaly can be used to transmit or store secure data and study some cipher, hash and compression algorithms to understands how it works.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    AUM CSPRNG & Stream Cipher

    AUM CSPRNG & Stream Cipher

    A minimal CSPRNG reflecting the Zen of cipher design

    AUM is an extremely fast, small-state, cryptographically secure pseudo-random number generator and stream cipher. AUM exhibits uniform distribution, mixes rapidly, has no detected bias, and comes in three variants: AUM16, with an internal state array of 16+4 32-bit words; AUM32, with an internal state of 32+4 words; and AUM64 with a 64+4-word state. The former permit seeding with a key of up to 512 or 1024 bits, the latter with a 2048-bit key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    just a simple prototype for acfs
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    AUTHd: Admission control daemon is a system aiming to provide authentication and authorisation services to other services. Uses the keynote trust management system. It is accessible via IPC, network (OpenSSL support) and kernel-space.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    AESOP (Advanced Encrypted Stackable Open Proxy) is a powerful application for creating encrypted TCP tunnels.
    Downloads: 0 This Week
    Last Update:
    See Project