Showing 21 open source projects for "zlib-1.2.13"

View related business solutions
  • Gearset | The complete Salesforce DevOps solution Icon
    Gearset | The complete Salesforce DevOps solution

    Salesforce DevOps done right.

    Gearset is the only platform you need for unparalleled deployment success, continuous delivery, automated testing and backups.
    Learn More
  • Reliable Phone Service for Your Home or Business Icon
    Reliable Phone Service for Your Home or Business

    Businesses that want a modern business phone system using their current phones

    Calling made modern. Your business number. Your employees' phones. Our amazing features. A dial menu spoken by our voice actors. Callers press numbers to make purchases, hear MP3s, connect to specific staff, and more. Make and answer calls using your number on multiple phones without the caller ever knowing. Employees hear secret in-house menus, transfer calls, and send voicemails to their email, all from their dialpad. These business features require no new software or hardware. Your dialpad come to life. Porting your business or personal number at the press of a button. Select from our menu of modern voice features for your business or personal line. We'll activate these features on your current phone for you. No work (or learning) required from you. We'll be here to transform your number whenever your desires change.
    Learn More
  • 1
    Portainer.io

    Portainer.io

    Making Docker and Kubernetes management easy

    Portainer Community Edition is a lightweight service delivery platform for containerized applications that can be used to manage Docker, Swarm, Kubernetes and ACI environments. It is designed to be as simple to deploy as it is to use. The application allows you to manage all your orchestrator resources (containers, images, volumes, networks and more) through a ‘smart’ GUI and/or an extensive API. Portainer consists of a single container that can run on any cluster. It can be deployed as a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    XOR Encryptor/Decryptor

    Encrypts and decrypts files using XOR operation.

    Encrypts and decrypts files using XOR operation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Simple program to encrypt text. Programa simple para encriptar texto.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    SilentEye
    SilentEye is a cross-platform application design for an easy use of steganography. It provides a pretty nice interface and an easy integration of new steganography algorithm and cryptography process.
    Leader badge
    Downloads: 256 This Week
    Last Update:
    See Project
  • Resco toolkit for building mobile apps Icon
    Resco toolkit for building mobile apps

    A no-code toolkit for building responsive and resilient mobile business applications for Microsoft Power Platform, Dynamics 365, Dataverse and Salesfo

    Deploying mobile apps with Resco takes days, not months—all without writing a single line of code. Workers can download the Resco app from AppStore, Google Play, or Windows Store, log into your company environment, and instantly use the app you have published on any device.
    Learn More
  • 5

    yeo

    command-line steganography application

    ...this will evolve further, but remain a console / command application. I will be adding some additional supported file types soon (thinking mp3...). includes (default) option to compresses message with zlib before encryption any ideas / suggestions would speed up the process. This software is intended to be run on a system under the user's control (so keyloggers etc. are not considered).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    IP Tables State implements the "state top" feature from IP Filter for IP Tables. "State top" displays the states held by your stateful firewall in a "top"-like manner, in real time. IPTState also has an option to print your state table once and NOTE: Development has moved to github: http://github.com/jaymzh/iptstate
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    Tcp/Ip API Wrapper

    TCP/IP API (SSL Encryption, ZLIB Compression)

    TCP/IP connectivity warpped in an API extended to provide the following major features: SSL Encryption, ZLIB compression, packet oriented mode rather stream oriented mode. Asynchrounous. One liner to declare server or connect to server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Pombo

    Pombo

    Pombo can help you recover your computer in the event it's stolen.

    Pombo works silentely in the background, hidden, and sends tracking information to a webserver of your choice. If your computer is stolen, just log into your webserver to get the lastest file uploaded by Pombo, decrypt and hand it to the police. They will have all they need to catch the thief: IP address, date/time, nearby routers, screenshot, and even a photo of his/her face if you have a webcam ! Pombo protects your privacy: Tracking information is encrypted with rock-solid GnuPG and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    pngacidbath is the one true PNG image brute force compressor. While other tools simply run down a list of "intelligent" compressor algorithms (some known as zlib methods), pngacidbath tries every byte combination to come up with THE smallest file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Attack Surface Management | Criminal IP ASM Icon
    Attack Surface Management | Criminal IP ASM

    For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

    Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
    Learn More
  • 10
    libsnet is a simple, secure, TCP communications library with support for line & block IO, SSL, SASL, ZLIB.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    AnLib is a PHP library of useful functions and classes to help you build and deploy PHP applications swiftly and easily.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    MSLK provides the precompiled Win32 binaries of some excellent porject with a GPL or similar open source license. Here will keep updated.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Was a stream cipher attempt, but has been orphaned.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    PEStudio is a network protocol analysis and security auditing tool for Windows which allows you to apply scripts to winsock calls in order to filter / edit the data that travels to and from your computer, giving you complete control over your network.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 15
    mp3stegz is an application that apply steganographic (steganography) algorithm in mp3 files. mp3stegz will maintain original mp3 file's size and sound quality. The hidden message is compressed(zlib) and encrypted(Rijndael).
    Leader badge
    Downloads: 4 This Week
    Last Update:
    See Project
  • 16
    Multi-platform spam filtering proxy, designed to be used on the client side. Can be launched as faceless server or with a GUI.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    BIS Development Kit protects your web content (texts, images, html etc) from copying and direct downloading. It also protects your Java(tm) applications from reverse engineering and your algorithms and ideas from the plagiarism.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Team MONICA's effort: - general JAVA environment - general JAVA cryptography environment - SSH client/server in JAVA - secure & anonymous communication
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Digital Rights Management example library for C Spot Run.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    A Linux distro based on Linuxcare Bootable Business Card, this is a emergency tool with many uses
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Development of software in support of the Portable Network Graphics (PNG) Digital Signature (dSIG) chunk.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB