RSS 255 projects tagged "Windows"

Download Website Updated 11 Apr 2011 ACL2

Screenshot
Pop 74.30
Vit 4.97

ACL2 is a mathematical logic, programming language, and mechanical theorem prover based on the applicative subset of Common Lisp. It is an "industrial-strength" version of the NQTHM or Boyer/Moore theorem prover, and has been used for the formal verification of commercial microprocessors, the Java Virtual Machine, interesting algorithms, and so forth.

No download Website Updated 15 Nov 2010 AGPF KeyRec

Screenshot
Pop 22.58
Vit 35.38

AGPF KeyRec is powerful software to recover the default WPA passphrases of the specified models of Telecom Italia's AGPF routers.

Download Website Updated 24 Feb 2013 ANNFiD

Screenshot
Pop 41.81
Vit 1.04

ANNFiD is an experimental forensic tool that identifies file types using neural networks. A GUI tool is used to train the network for new file types. It is intended to be used to determine the nature of corrupted files.

No download Website Updated 21 Aug 2008 Akeni Instant Messaging Server Pro

Screenshot
Pop 88.79
Vit 3.33

Akeni Instant Messaging Server Pro is a client/server instant messaging platform that allows companies to host their own secured private IM system. The client has an user interface similar to AIM, ICQ, or MSN Messenger. It supports all the standard IM features such as chat, group conference, presence management, file transfer, offline messages, and emergency alert/notification. Extra features include contact management and optional tabbed chat sessions. The server has advanced administration tools for managing user accounts, client-side logging capabilities, and peer-to-peer file transfers. It can be set up on a private network without connecting to the Internet, and can easily be set up for use inside and outside of the company firewall.

Download Website Updated 14 Apr 2004 Akeni Jabber Client

Screenshot
Pop 37.79
Vit 1.48

Akeni Messenger Jabber Edition is a cross-platform client for Jabber compliant servers. It features an XML-based messaging protocol, private chatting, conference mode, broadcast messages to groups of people, message log, a typing indicator, a full-featured rich-text editor, emoticons, and powerful online presence management.

No download Website Updated 07 May 2001 Alamin GSM SMS Gateway

Screenshot
Pop 209.43
Vit 2.73

The Alamin GSM SMS Gateway is a group of daemons that allows you to send/receive SMS messages from any GSM device that supports AT+ commands (GSM modems or GSM mobile phones) or supported by Gnokii. A client program allows you to send messages from any IP client. An SMTP interface is provided to allow MTAs to send SMS directly to the GSM network. IMP (Incoming Message Processor) modules allows you to extend functionality to implement banking, network administration, bd querys, etc. from a GSM mobile phone.

Download Website Updated 12 Jul 2009 BeeCrypt

Screenshot
Pop 214.16
Vit 6.62

BeeCrypt is an ongoing project to provide strong and fast cryptography in the form of a toolkit usable by commercial and open source projects. Included in the library are entropy sources, random generators, block ciphers, hash functions, message authentication codes, multiprecision integer routines, and public key primitives.

Download Website Updated 03 Mar 2013 Botan

Screenshot
Pop 442.28
Vit 42.57

Botan is a crypto library written in C++. It provides a variety of cryptographic algorithms, including common ones such as AES, MD5, SHA, HMAC, RSA, Diffie-Hellman, DSA, and ECDSA, as well as many others that are more obscure or specialized. It also offers SSL/TLS (client and server), X.509v3 certificates and CRLs, and PKCS #10 certificate requests. A message processing system that uses a filter/pipeline metaphor allows for many common cryptographic tasks to be completed with just a few lines of code. Assembly and SIMD optimizations for common CPUs offers speedups for critical algorithms like AES and SHA-1.

Download Website Updated 17 Sep 2003 Bugs Dynamic Cryptography

Screenshot
Pop 17.23
Vit 1.00

Bugs Dynamic Cryptography is a private key cryptography algorithm. The package includes a C Library and many sample applications, including ones for file encryption, secure chatting, and login applications. The algorithm handles stream and block encryption, unlimited Keylength, and a strong key generator. Documentation and a developer HOWTO are included.

Download No website Updated 21 Apr 2009 Bukowski Framework

Screenshot
Pop 17.41
Vit 1.41

Bukowski Framework is intended to demonstrate that current popular approaches to software security (e.g. DAC, VMA randomization, anti-virus, NIDS, etc.) are not sufficient and that other approaches should be considered more seriously (e.g. MAC, design by contract, mutual authentication/authorization, etc.).

Screenshot

Project Spotlight

Codimension

A Python IDE.

Screenshot

Project Spotlight

kcov

A code coverage tester.