Showing 36 open source projects for "gnu 8085 programming"

View related business solutions
  • Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight Icon
    Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight

    Lock Down Any Resource, Anywhere, Anytime

    CLEAR by Quantum Knight is a FIPS-140-3 validated encryption SDK engineered for enterprises requiring top-tier security. Offering robust post-quantum cryptography, CLEAR secures files, streaming media, databases, and networks with ease across over 30 modern platforms. Its compact design, smaller than a single smartphone image, ensures maximum efficiency and low energy consumption.
    Learn More
  • The AI workplace management platform Icon
    The AI workplace management platform

    Plan smart spaces, connect teams, manage assets, and get insights with the leading AI-powered operating system for the built world.

    By combining AI workflows, predictive intelligence, and automated insights, OfficeSpace gives leaders a complete view of how their spaces are used and how people work. Facilities, IT, HR, and Real Estate teams use OfficeSpace to optimize space utilization, enhance employee experience, and reduce portfolio costs with precision.
    Learn More
  • 1
    Shadowsocks for Android

    Shadowsocks for Android

    A shadowsocks client for Android

    Shadowsocks for Android is the Android client for the widely-used, high-performance encryption protocol project Shadowsocks. It is a secure socks5 proxy for Android that is designed to protect your internet traffic. Shadowsocks for Android allows you to surf the internet privately and securely at all times through your Android device. It features bleeding-edge techniques with Asynchronous I/O and Event-driven programming. It is completely free and open-source and is available for other...
    Downloads: 55 This Week
    Last Update:
    See Project
  • 2
    GoSearch

    GoSearch

    OSINT tool to find usernames and digital footprints across 300+ sites

    GoSearch is an open source OSINT tool designed to investigate a person's digital footprint by searching for usernames across hundreds of websites. The tool scans more than 300 platforms to determine whether a specific username exists on social networks and other online services. Built with the Go programming language, it aims to provide faster performance compared to similar tools written in other languages. GoSearch was inspired by the well-known Sherlock username search tool, but it...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 3
    shadowsocks-libev

    shadowsocks-libev

    Bug-fix-only libev port of shadowsocks

    Shadowsocks-libev is a lightweight secured SOCKS5 proxy for embedded devices and low-end boxes. Shadowsocks-libev is written in pure C and depends on libev. It's designed to be a lightweight implementation of shadowsocks protocol, in order to keep the resource usage as low as possible. Snap is the recommended way to install the latest binaries. You can build shadowsocks-libev and all its dependencies by script. The latest shadowsocks-libev has provided a redir mode. You can configure your...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 4
    Wapiti

    Wapiti

    Wapiti is a web-application vulnerability scanner

    Wapiti is a vulnerability scanner for web applications. It currently search vulnerabilities like XSS, SQL and XPath injections, file inclusions, command execution, XXE injections, CRLF injections, Server Side Request Forgery, Open Redirects... It use the Python 3 programming language.
    Leader badge
    Downloads: 129 This Week
    Last Update:
    See Project
  • Failed Payment Recovery for Subscription Businesses Icon
    Failed Payment Recovery for Subscription Businesses

    For subscription companies searching for a failed payment recovery solution to grow revenue, and retain customers.

    FlexPay’s innovative platform uses multiple technologies to achieve the highest number of retained customers, resulting in reduced involuntary churn, longer life span after recovery, and higher revenue. Leading brands like LegalZoom, Hooked on Phonics, and ClinicSense trust FlexPay to recover failed payments, reduce churn, and increase customer lifetime value.
    Learn More
  • 5
    LibHideIP - An IP-hiding library

    LibHideIP - An IP-hiding library

    A library for hiding the local IP address from applications.

    LibHideIP is a library that on-the-fly (by preloading) prevents programs from knowing your IP address. This makes them unable to know and reveal your location, thus helping keep the user's privacy. There is NO NEED to rebuild your software, because LibHideIP is a pre-loadable library, meaning you just need to RUN the software with LibHideIP loaded. LibHideIP is also a development library. See the project homepage https://libhideip.sourceforge.io and the project Wiki in the menu above.
    Downloads: 17 This Week
    Last Update:
    See Project
  • 6
    KeyKiller-Cuda

    KeyKiller-Cuda

    Solving the Satoshi Puzzle

    KeyKiller is a GPU-accelerated version of the KeyKiller project, designed to achieve extreme performance in solving Satoshi Nakamoto's puzzles using modern NVIDIA GPUs. KeyKiller CUDA pushes the limits of cryptographic key search performance by leveraging CUDA, thread-beam parallelism, and batch EC operations. The command-line version is open-source and free to use. For the paid advanced graphics version, please visit: https://gitlab.com/8891689/KeyKiller-Cuda/
    Downloads: 12 This Week
    Last Update:
    See Project
  • 7
    LibSecRm - Secure Removal Library

    LibSecRm - Secure Removal Library

    A library for secure deleting data on-the-fly

    LibSecRm (LIBrary for SECure ReMoval) is a set of replacements for these standard C functions which cause data removing from files. The data is first securely wiped on-the-fly, to protect the user's privacy, then the original functions are called. There is NO NEED to rebuild your software, because LibSecRm is a pre-loadable library, meaning you just need to RUN the software with LibSecRm loaded. LibSecRm is also a development library. The following wiping methods are supported:...
    Downloads: 14 This Week
    Last Update:
    See Project
  • 8
    LibNetBlock - A Network Blocking Library

    LibNetBlock - A Network Blocking Library

    A library for blocking access to network on-the-fly

    LibNetBlock is a library that on-the-fly (by preloading) prevents a program under its control to use the network, to help to keep the user's privacy, prevent data leakage and virus spreading. You can think of LibNetBlock as a simple layer-7 (L7) firewall that simply blocks the network access for the program it controls. There is NO NEED to rebuild your software, because LibNetBlock is a pre-loadable library, meaning you just need to RUN the software with LibNetBlock loaded. LibNetBlock is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Offensive Reverse Shell

    Offensive Reverse Shell

    Collection of reverse shells for red team operations

    The Offensive Reverse Shell Cheat Sheet is a compilation of reverse shell payloads useful for red team operations and penetration testing. It provides ready-to-use code snippets in various programming languages, facilitating the establishment of reverse shells during security assessments.​
    Downloads: 4 This Week
    Last Update:
    See Project
  • Simplify Purchasing For Your Business Icon
    Simplify Purchasing For Your Business

    Manage what you buy and how you buy it with Order.co, so you have control over your time and money spent.

    Simplify every aspect of buying for your business in Order.co. From sourcing products to scaling purchasing across locations to automating your AP and approvals workstreams, Order.co is the platform of choice for growing businesses.
    Learn More
  • 10
    Shadowsocks for Windows

    Shadowsocks for Windows

    A secure socks5 proxy for Windows

    Shadowsocks for Windows is a free and open source, high-performance secured socks5 proxy designed to protect your internet traffic. It allows you to surf the web privately and securely, and offers a number of useful features such as HTTP proxy support, system proxy configuration, server auto switching and plugin support. Shadowsocks is incredibly fast, as it utilizes bleeding edge techniques with Asynchronous I/O and event-driven programming. It also has a flexible industry-level...
    Downloads: 114 This Week
    Last Update:
    See Project
  • 11
    Parrot Project

    Parrot Project

    Security, Development and Privacy Defense, all in one place.

    Parrot is a cloud friendly operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonimity and cryptography. Based on Debian and developed by Frozenbox network.
    Leader badge
    Downloads: 191 This Week
    Last Update:
    See Project
  • 12
    Ether linux

    Ether linux

    Linux for Penetration testing and Programming

    Ether Linux is a lightweight penetration testing distro and proffesional security
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    obfusc

    toolchain for obfuscated compilation

    This is a C compiler, assembler, linker and virtual machine for computing based on encrypted working and obfuscated compilation and execution. The idea is that the platform machine `works encrypted' for the user and unencrypted for the operator, running a machine code instruction set in user mode that is provably safe against computational attacks, for code that is generated by a compiler that has introduced random variations into the code at each recompilation so that the attacker has no...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    AnCH Framework

    AnCH Framework

    Another C++ Hack

    This project has been migrated to GitHub : https://github.com/vlachenal/anch-framework AnCH framework aims to provide utility classes for some common programming features. Features are implemented to be used as simply as possible. This framework was initially a way to test new C++ specifications (C++11) and to test C++ design patterns and tricks. Only POSIX systems are supported for now. Others could be supported later. (Partial) Doxygen documentation can be found on project home page.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Crypt

    Crypt

    Crypt encryption and decryption is based on ASCII Table Shift.

    Crypt is the developed based on the ASCII Table shift and it can customized based on the user requirements, right from the shifting order and the level of encryption or decryption. It can be integrated to any of the programming language with the custom build of the source code. It can secure from text file to binary code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    Not Another MAC Address Generator

    Generates using (OUI) Verified MAC Addresses

    NAMAG (Not Another MAC Address Generator) Generates using (OUI) Verified MAC Addresses using oui.csv - OUI = Organizationally unique identifier from Standards.IEEE.org: http://standards.ieee.org/develop/regauth/oui/oui.txt Can save with multiply styles HEX: 00:00:00:00:00:00 HEX: 00-00-00-00-00-00 HEX: 000000000000 In order to run NAMAG you must have the VB6.0 Runtime files which can be downloaded from Microsoft's website: http://www.microsoft.com/en-us/download/details.aspx?id=24417
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    ISC - The ISAAC Stream Cipher

    ISC - The ISAAC Stream Cipher

    ISC lets you encrypt & decrypt text and files of any type up to 4GB

    ISAAC is a cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It was developed by Bob Jenkins from 1993-1996 and placed in the Public Domain. ISAAC is fast - especially when optimised - and portable to most architectures in nearly all programming and scripting languages. After more than 20 years of existence ISAAC has not been broken, and the little program you have here allows you to use it to encrypt and decrypt text of arbitrary length, files of any...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    The JWA library aims to provide a conversion from C to Delphi of as many headers as possible from the PSDK etc. The JWSCL (security library) is an advanced object-oriented framework for programming with the Windows security features (ACL, Tokens, etc.)
    Downloads: 14 This Week
    Last Update:
    See Project
  • 19
    This is a C source code scanner based on symbolic logic. It analyses C source code (especially that of the Linux kernel, at which it is aimed) for programming errors and vulnerabilities. The tests are defined by the user.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    HcryptoJ (Historical cryptology in Java) is a Java based programming library for implementing and analyzing historical ciphers. HcryptoJ is designed to support research and teaching in historical cryptography and computer science. Licensed under GPL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    rjudge is a judge system for the Olympiad in Informatics. It can be also used as a problem test tool in the programming contest and daily practice. It provides many security features to ensure the smooth implement of judgement.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    A "programming language" that can generate random strings. Useful for creating password, but has many other uses (it can generate IP addresses, fully random but pronounceable words, ..., anything that a string can represent). Written in C#
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Erinaceus is an esoteric two dimensional programming language which uses bitmaps as sourcecode. It is turing complete and able to modify itself. It has been created with the goal to create a language that can be hidden in pictures easily.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    AES.g is a port of the Advanced Encryption Standard (or Rijndael) to the GPU using a mix of C++ and Cg programming languages. It is portable and built as a class-based program, using OpenGL or DirectX libraries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Panoptis plans to create a network security tool (N-IDS) to detect and block DoS and DDoS attacks. The programming language is C++, and the input is being provided by routers.
    Downloads: 5 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB