RSS 33 projects tagged "Windows"

Download No website Updated 22 Dec 2011 PolarSSL

Screenshot
Pop 165.34
Vit 4.59

PolarSSL is a light-weight cryptographic and SSL/TLS library written in C. PolarSSL makes it easy for developers to include cryptographic and SSL/TLS capabilities in their (embedded) applications with as little hassle as possible. Loose coupling of the components inside the library means that it is easy to separate the parts that are needed, without needing to include the total library. PolarSSL is written with embedded systems in mind and has been ported on a number of architectures, including ARM, PowerPC, MIPS, and Motorola 68000. The source is written to have very loose coupling, enabling easy integration of parts in other software projects. Very loosely coupled cryptographic algorithms for MD2, MD4, MD5, SHA1, SHA-256, SHA-512, AES, Camellia, DES, Triple DES, ARC3, and RSA are included.

Download Website Updated 18 Aug 2008 Cryptographic Implementations Analysis Too...

Screenshot
Pop 37.20
Vit 1.00

The Cryptographic Implementations Analysis Toolkit (CIAT) is a compendium of command line and graphical tools whose aim is to help in the detection and analysis of encrypted byte sequences within files (executable and non-executable). It is particularly helpful in the forensic analysis and reverse engineering of malware using cryptographic code and encrypted payloads.

No download Website Updated 28 Feb 2013 PortableSigner

Screenshot
Pop 66.09
Vit 4.00

PortableSigner is a Java application to sign normal PDF files with a digital signature (X.509). You can verify your signature by opening the PDF file in a standard Adobe Reader without any plugins.

Download Website Updated 04 Jan 2013 Paperkey

Screenshot
Pop 80.68
Vit 5.53

A reasonable way to achieve a long term backup of OpenPGP (GnuPG, PGP, etc) keys is to print them out on paper. Due to metadata and redundancy, OpenPGP secret keys are significantly larger than just the "secret bits". In fact, the secret key contains a complete copy of the public key. Since the public key generally doesn't need to be backed up in this way (most people have many copies of it on various keyservers, Web pages, etc), only extracting the secret parts can be a real advantage. Paperkey extracts just those secret bytes and prints them. To reconstruct, you re-enter those bytes (whether by hand or via OCR), and paperkey can use them to transform your existing public key into a secret key.

No download Website Updated 21 Jun 2007 EasyCrypt

Screenshot
Pop 20.00
Vit 1.42

EasyCrypt is a simple command line program that encrypts and decrypts files using the AES standard and a password given by the user.

Download Website Updated 03 Feb 2009 Nessconnect

Screenshot
Pop 54.44
Vit 5.63

Nessconnect is a GUI, CLI, and API client for Nessus and Nessus compatible servers. With its user interface, it provides local session management, scan templates, report generation through XSLT, charts, and graphs, and vulnerability trending.

No download Website Updated 24 Nov 2005 Indepedent computation of Oracle password ...

Screenshot
Pop 19.75
Vit 1.00

Independent computation of Oracle password hashes provides an implementation of the Oracle password hash algorithm. An Oracle installation is not required for the computation.

No download Website Updated 18 Dec 2007 Burp suite

Screenshot
Pop 35.89
Vit 1.66

Burp suite allows an attacker to combine manual and automated techniques to enumerate, analyse, attack, and exploit Web applications. The various burp tools work together effectively to share information and allow findings identified within one tool to form the basis of an attack using another. Numerous interfaces are implemented between the different tools, designed to facilitate and speed up the process of attacking a Web application. All tools share the same robust framework for handling HTTP requests, authentication, downstream proxies, logging, alerting, and extensibility. Burp suite is extensible via the IBurpExtender interface.

No download Website Updated 09 Mar 2005 Whisper Instant Messenger

Screenshot
Pop 47.15
Vit 1.42

Whisper IM is a secure IM client that provides end-to-end encryption over a XMPP/Jabber network. The encryption system (The Whisper Protocol) is designed for instant messaging, and is IM protocol and platform neutral. It supports all standard instant messaging features, such as messages, one to one chat, and online presence. The user interface is clean and easy to use. It also features multi-user chat (JEP45), context sensitive help, a service discovery tool (JEP30), and internationalization support.

Download Website Updated 11 Apr 2011 ACL2

Screenshot
Pop 74.94
Vit 4.97

ACL2 is a mathematical logic, programming language, and mechanical theorem prover based on the applicative subset of Common Lisp. It is an "industrial-strength" version of the NQTHM or Boyer/Moore theorem prover, and has been used for the formal verification of commercial microprocessors, the Java Virtual Machine, interesting algorithms, and so forth.

Screenshot

Project Spotlight

Dada Mail

A simple, Web-based mailing list manager.

Screenshot

Project Spotlight

coreBOS

A business empowering tool and adaptable software program.