Showing 138 open source projects for "delphi security"

View related business solutions
  • Rezku Point of Sale Icon
    Rezku Point of Sale

    Designed for Real-World Restaurant Operations

    Rezku is an all-inclusive ordering platform and management solution for all types of restaurant and bar concepts. You can now get a fully custom branded downloadable smartphone ordering app for your restaurant exclusively from Rezku.
    Learn More
  • Pylon is an All-in-one B2B Support Platform for modern B2B businesses. Icon
    Pylon is an All-in-one B2B Support Platform for modern B2B businesses.

    Pylon is a modern support system that integrates with all B2B channels like Slack and Team.

    We bring together everything a post-sales teams team needs including a ticketing system, B2B omnichannel integrations (Slack Connect, Microsoft Teams), modern chat widget, knowledge base, AI support bot, account management, customer marketing, and more.
    Learn More
  • 1
    Casbin

    Casbin

    An authorization library that supports access control models

    An authorization library that supports access control models like ACL, RBAC, ABAC for Golang, Java, C/C++, Node.js, Javascript, PHP, Laravel, Python, .NET (C#), Delphi, Rust, Ruby, Swift (Objective-C), Lua (OpenResty), Dart (Flutter) and Elixir. In Casbin, an access control model is abstracted into a CONF file based on the PERM metamodel (Policy, Effect, Request, Matchers). So switching or upgrading the authorization mechanism for a project is just as simple as modifying a configuration....
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    jCasbin

    jCasbin

    An authorization library that supports access control models

    An authorization library that supports access control models like ACL, RBAC, ABAC for Golang, Java, C/C++, Node.js, Javascript, PHP, Laravel, Python, .NET (C#), Delphi, Rust, Ruby, Swift (Objective-C), Lua (OpenResty), Dart (Flutter) and Elixir. In Casbin, an access control model is abstracted into a CONF file based on the PERM metamodel (Policy, Effect, Request, Matchers). So switching or upgrading the authorization mechanism for a project is just as simple as modifying a configuration....
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    PHP-Casbin

    PHP-Casbin

    An authorization library that supports access control models

    An authorization library that supports access control models like ACL, RBAC, ABAC for Golang, Java, C/C++, Node.js, Javascript, PHP, Laravel, Python, .NET (C#), Delphi, Rust, Ruby, Swift (Objective-C), Lua (OpenResty), Dart (Flutter) and Elixir. In Casbin, an access control model is abstracted into a CONF file based on the PERM metamodel (Policy, Effect, Request, Matchers). So switching or upgrading the authorization mechanism for a project is just as simple as modifying a configuration....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Capstone

    Capstone

    Capstone disassembly/disassembler framework

    ...Implemented in pure C language, with lightweight bindings for D, Clojure, F#, Common Lisp, Visual Basic, PHP, PowerShell, Emacs, Haskell, Perl, Python, Ruby, C#, NodeJS, Java, GO, C++, OCaml, Lua, Rust, Delphi, Free Pascal & Vala (ready either in main code, or provided externally by the community).
    Downloads: 4 This Week
    Last Update:
    See Project
  • Estimating Software for Heavy Construction Icon
    Estimating Software for Heavy Construction

    Developed specifically for civil construction

    Built by an estimator, SharpeSoft Estimator is a fully comprehensive software that allows for a more efficient and quicker job-winning bids. Ideal for civil, utility, heavy/highway, grading, excavating, paving, and pipeline contractors, SharpeSoft Estimator offers advanced features such as Item Master, Subcontractor Comparison, Materials Comparison, Grouped Items, Trench Profiler, Haul Calculations, What-if Scenarios, Batch Reports, and more.
    Learn More
  • 5
    Screen Protector
    This application was developed to prevent data leaks such as screenshots and video recordings that can be made from systems without user permission. It does not require installation and is designed for portable use. The project is open source. Due to the techniques used to increase security, some security software (antivirus) may perceive it as a threat. Screen Protector Information ve Documents https://beytullahakyuz.gitbook.io/projects/screen-protector
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    winPenPack

    winPenPack

    The portable software collection

    winPenPack is a project that aims at collecting the most frequently used and most popular open source applications made portable, so that they can be executed without installation from any USB Flash Drive or Hard Disk. The winPenPack suites offer a wide range of portable applications like office tools, internet tools, multimedia tools, development tools, security applications and other frequently used utilities. Everything you need, completely free, open source and portable!
    Leader badge
    Downloads: 549 This Week
    Last Update:
    See Project
  • 7
    KeyNote NF (New Features)
    Tabbed notebook with RichText editor, multi-level notes and strong encryption. This project is an evolution of Tranglos Keynote (of Marek Jedlinski), with new features like: - Unicode compliant - Improvement in image management - Improved Find All - Redesigned navigation history mechanism - New file format: compressed - Improved treatment of links, and new internal KNT links, vinculated to markers, not only to caret position - Improved Clipboard Capture / Web Clip - Alarms...
    Leader badge
    Downloads: 55 This Week
    Last Update:
    See Project
  • 8
    aBLhackPsw

    aBLhackPsw

    aBLhackPsw v7.0 - Password recovery tool

    Now with aBLhackPsw v7.0 you can see the password in x32 and x64 programs !!! aBLhackPsw v7.0 run on Wondows 11 !!! aBLhackPsw is a password recovery tool - utility for recovering forgotten or lost password. With this program you can see asterisks ***** password from ***** fields (Outlook Express, Total Commander (FTP) and other programs). There is no illegal password hacking technique involved, it only reads or uncovers hidden password character that are covered by asterisks. This...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    Seed Tag

    Seed Tag

    Hide your SEED phrase in a fake SEED phrase

    use only v5! ru: хотелось железный кошелёк, но у них один недостаток — кто его в держит в руках, того и деньги. Эта программа попытка сделать что-то вроде brainwallet, можно используя три ключа (число, пароль и адрес почты) превратить свою сид-фразу в бессмысленную сид-фразу, которую уже можно записать на железный кошелёк/армейский жетон(dog tag). Настоящего шифрования здесь нет, но от честных людей может помочь. Pack your seed phrase into fake phrase using three keys (some number,...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Effortlessly manage macOS, iOS, iPadOS and tvOS devices across multiple clients and locations. Icon
    Effortlessly manage macOS, iOS, iPadOS and tvOS devices across multiple clients and locations.

    The Most Powerful Apple Device Management Tool for MSPs and IT Teams

    Addigy solutions accelerate Apple adoption in any environment.
    Learn More
  • 10
    PeaZip

    PeaZip

    Free Zip software and Rar extractor

    PeaZip is a free archiver tool. The application provides an unified, natively portable, cross-platform file manager and archive manager GUI for many Open Source technologies like 7-Zip, FreeArc, PAQ, UPX. Create: 7Z, ARC, Brotl, BZip, GZip, PEA, TAR, WIM, XZ, ZPAQ, ZIP, Zstandard files and more Open and extract 200+ file types: ACE, CAB, DEB, ISO, RAR, ZIPX and more Features of PeaZip includes extract, create and convert multiple archives at once, create self-extracting archives...
    Leader badge
    Downloads: 1,528 This Week
    Last Update:
    See Project
  • 11
    Advantages: Three-tier security system: The use of Tor, VPN, and data obfuscation creates a robust barrier for user data protection. This complex combination of technologies makes tracking user activities considerably more challenging. RAM Disk: All user activity is redirected to a RAM disk, ensuring high operational speed and guaranteeing that no data remains after the computer is rebooted. This ensures 100% deletion of all traces of use
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
    Bubbles

    Bubbles

    Bubbles the simple, easy to use HTTP web server, browser controlled

    Bubbles the simple, easy to use HTTP web server that is browser controlled, and capable of serving static files over the internet, either streamed from disk, or direct from RAM without lag. A GUI administration panel is accessed through your web browser (e.g. "http://localhost:1080/admin/" + default password of "admin"), which controls all her settings and vital functions, all in real time. Apart from serving files, she is capable of tracking site visits (site counters), receiving...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Electric Diagram ToolKit for C/C++, .NET

    Electric Diagram ToolKit for C/C++, .NET

    power system configuration and simulation, c/c++ and .NET

    Open Source Code power systems, wiring diagrams, distribution maps, geographic wiring diagram, the power system configuration and simulation, power dispatch, automatic control, C / C ++ and DELPHI and .NET, and web application examples and , 100% VC++ Source Code is Shipped. http://www.ucancode.net E-XD++'s full source code will help you to address all security concerns quickly and easily. It will saves you mo than 90% building time to build a very professional power system software and many OCX controls are also shipped for using with other platforms like C#, Delphi, Java, etc. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A-Radar

    A-Radar

    Remote Connection Manager and Monitor

    A-Radar supports already the following protocols and services: RDP (Remote Desktop/Terminal Server) VNC (Virtual Network Computing) ICA (Citrix Independent Computing Architecture) SSH (Secure Shell) Telnet (TELecommunication NETwork) HTTP/HTTPS (Hypertext Transfer Protocol) FTP (File Transfer Protocol) SFTP (Secure File Transfer Protocol) Raw Socket Connections OFS (Open and monitor Folders) BFS (Backup Folders) RFS (Open and...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    Easy Keytrans

    Easy Keytrans

    Assign strings/functions to function keys and Password Management

    Simple tool to assign strings or functions to function keys and password manager
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    AAMDirect II
    A.A.M Direct (formerly NNTP A.A.M Client) is a type of email system whereby two or more people can communicate privately and/or anonymously with strong encryption . It uses the alt.anonymous.messages news group and does not require a usual email address setup. Messages are sent to the news group directly or through the Tor network. Note: If you have AAMDirect II already installed, just download the AAMDirect.exe and replace the old executable. Rename the old executable first and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    RandoPass

    RandoPass

    Random Password Generator

    Generate random passwords from 8 to 100 characters long. Toggle the use of upper case, lower case, numbers, and various special characters. One-click copy to clipboard.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    This used to be a tool written for an article in The Delphi Magazine by Marcel van Brakel and myself in 2005. It basically attempts to do the same as WinObj, but is written in Delphi.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    .Net Core for Delphi/Lazarus

    .Net Core for Delphi/Lazarus

    The best library to work with the .Net Core from Delphi and Lazarus.

    The .Net Core for Delphi/Lazarus (dotNetCore4Delphi) is a .Net Core Runtime Library for Delphi which helps Delphi/Pascal developers work with .Net Core. It is designed to provide a way to interact with .Net Core applications from Delphi/Pascal. What dotNetCore4Delphi can do: - Access .Net Core Framework Class Library. - Access Third Party .Net Core Libraries. - Access Your .Net Core Libraries. - etc Competitive Advantages: - Cross-platform framework that runs on Windows, Linux and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    .Net Runtime Library for Delphi

    .Net Runtime Library for Delphi

    This is the best library to work with the .Net framework from Delphi.

    The .Net Runtime Library for Delphi (CNClrLibrary) is the best library to work with .Net framework and .Net libraries from Delphi. It is designed to provide a way to interact with applications written in anyone of the .Net languages (such as C#, Visual Basic.Net, Delphi.Net, JScript.Net, etc) from Delphi. CNClrLibrary allows Delphi to use .Net libraries without the need for registry entries, COM registrations, or changes to the .NET libraries. Competitive Advantages: - No extra dll...
    Leader badge
    Downloads: 8 This Week
    Last Update:
    See Project
  • 21
    Simple Encryption Engine encrypt / decrypt / change password for SQLite database for the future use with your Delphi project. [Using SQLite with FireDAC]
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    Delphi Face Detection

    Delphi face detection

    Delphi Face Detection Live Web Camera Delphi Face Recognition: https://sourceforge.net/projects/delphi-face-recognition/ For Live: Face Attendance System, Facial Emotion, Gender Recognition Security Application. Ethnicity/Nationality Recognition(Maybe Soon) Age? Works on IP Camera using RTSP. Runs on Windows XP to Windows 10 Available on MsAcceSS or SQLite Dataface!
    Downloads: 5 This Week
    Last Update:
    See Project
  • 23
    A client-server multithreaded application for bruteforce cracking passwords. The more clients connected, the faster the cracking. Plugin-based. Supports only RAR passwords at the moment and only with encrypted filenames.
    Downloads: 51 This Week
    Last Update:
    See Project
  • 24
    Dont Hijack This

    Dont Hijack This

    DHT is an anti-hacker tool to fix all the damage caused by viruses.

    Dont Hijack This is an anti-hacker tool to fix all the damage caused by malware. It enables the disabled windows components. It completely removes all the bots/viruses/malware infections in 35 seconds. Fixes: registry editing has been disabled by administrator Task Manger has been disabled by your administrator Windows defender is turned off by group policy proxy settings hijack virus (unable to connect proxy server) unable to install antivirus and antivirus killer windows firewall...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB