Open Source C# Security Software - Page 5

C# Security Software

View 5811 business solutions

Browse free open source C# Security Software and projects below. Use the toggles on the left to filter open source C# Security Software by OS, license, language, programming language, and project status.

  • The AI workplace management platform Icon
    The AI workplace management platform

    Plan smart spaces, connect teams, manage assets, and get insights with the leading AI-powered operating system for the built world.

    By combining AI workflows, predictive intelligence, and automated insights, OfficeSpace gives leaders a complete view of how their spaces are used and how people work. Facilities, IT, HR, and Real Estate teams use OfficeSpace to optimize space utilization, enhance employee experience, and reduce portfolio costs with precision.
    Learn More
  • Iris Powered By Generali - Iris puts your customer in control of their identity. Icon
    Iris Powered By Generali - Iris puts your customer in control of their identity.

    Increase customer and employee retention by offering Onwatch identity protection today.

    Iris Identity Protection API sends identity monitoring and alerts data into your existing digital environment – an ideal solution for businesses that are looking to offer their customers identity protection services without having to build a new product or app from scratch.
    Learn More
  • 1
    Electronic Shelf Label Management System

    Electronic Shelf Label Management System

    DIY Electronic Shelf Label Management System

    This ESL management system incorporates the electronic shelf labels and the ESL management software. The ESL management software enables you to manage your electronic shelf labels. It accomplishes this by maintaining a database with the credentials of each ESL and the last image that was sent to it. When you choose the image to be displayed on the ESL and hit the "Send Image To ESL" button, the software encrypts that image, sends it to the specified ESL over Wi-Fi using the UDP protocol, and then saves it to the database. An electronic shelf label is a device that displays relevant product information, they're usually attached to the front edge of retail shelving. A typical ESL consists of a display and a simple microcontroller that controls the display. *V2.0 now supports ESP32 CYD You can learn more on: Github: github.com/Northstrix/Electronic-Shelf-Label-Management-System Instructables: https://www.instructables.com/DIY-Electronic-Shelf-Label-Management-System-V20/
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2

    SQLI Hunter v1.2

    An automation tool to scan for an Sql Injection vulnerability.

    SQLI Hunter is an automation tool to scan for an Sql Injection vulnerability in a website. It automates the search of sqli vulnerable links from Google using google dorks! SQLI Hunter can also find admin page of any website by using some predefined admin page lists. Fast and Easy to use ! ================ Coded By MAK ================
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    VersionInfo

    VersionInfo

    Generate file version information

    This command-line utility produces a report of file information including version information where available. The reports can be useful for release information, manifests, and integrity verification.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    Sussen is a tool that checks for vulnerabilities and configuration issues on computer systems. It is based on the Open Vulnerability and Assessment Language.
    Downloads: 3 This Week
    Last Update:
    See Project
  • Rezku Point of Sale Icon
    Rezku Point of Sale

    Designed for Real-World Restaurant Operations

    Rezku is an all-inclusive ordering platform and management solution for all types of restaurant and bar concepts. You can now get a fully custom branded downloadable smartphone ordering app for your restaurant exclusively from Rezku.
    Learn More
  • 5
    IIS7 Geoblock Module
    A geoblock module created by Triple IT. It can be added to the IIS7 pipeline (now also on IIS 8.5). It uses the IPv4 address to determine the geographic location of the request by using maxminds geo IP file and takes action accordingly. Next to the module, 2 tools are included. 1 to quickly lookup the country for a specific IP address and 1 to help you automate the update of the MaxMind data file. An extensive manual is available to install and use the module.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
     Abdal SSH BruteForce

    Abdal SSH BruteForce

    powerful SSH BruteForce tool

    Abdal SSH BruteForce tool is a powerful software with zero error rate to test the intrusion of servers that work with ssh protocol, this tool supports proxy for attacks and can transfer all your traffic in the hacking process to the proxy Slowly
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    DoS As You Are

    DoS As You Are

    Another one of em' DoS Tools!

    Just a little project I've made last summer.Nothing too serious.If you want to help be my guest.It's written in .NET(C#) so you can de-compile it using IL-Spy.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    EIDNative Library is a freeware SDK for Belgian Electronic ID Card. EIDNative Library includes native API for: * Microsoft .NET * Native Win32 * Visual Basic 6.0 and VBA * Java (only Windows platform)
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    OpanAV builds an alternative to commercial antivirus for Windows, it is based on the existing ClamAV. *OpenAV after being developed in secret for years changed its name in 2021 to MultiAntivirus and home to https://sourceforge.net/p/multiantivirus/
    Downloads: 2 This Week
    Last Update:
    See Project
  • Field Service+ for MS Dynamics 365 & Salesforce Icon
    Field Service+ for MS Dynamics 365 & Salesforce

    Empower your field service with mobility and reliability

    Resco’s mobile solution streamlines your field service operations with offline work, fast data sync, and powerful tools for frontline workers, all natively integrated into Dynamics 365 and Salesforce.
    Learn More
  • 10
    platform independent solution to encrypt files on a portable Device. Files will be encrypted with TripleDES and hold in an XML-File. No local Installation needed.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    A quick and easy to use SHA1 calculator for Windows, using C# & .net. (very) Similiar in style to winMD5Sum; supports filenames passed on the command line & files drag+dropped on!
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
     Abdal Admin Finder

    Abdal Admin Finder

    Find website admin page

    Find website admin page for pentester
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    Encryptron

    Encryptron

    An encryption software using C# 4.0

    First of all, let us understand the need for an encryption software. Just think of you sending a message of extreme confidentiality, someone else fetches it and goes through it. A breach in the security! We can’t allow that to happen. So, virtually every data send over a network is encrypted now-a-days. Let’s look at this now: Vdmbnld!`f`ho !Sdutsohof!whrhunsr!`oe!bnedsr-!une`x!H&l!fnhof!un!rinv!xnt!`o!houdsdruhof!unqhb!ui`u!hr-!inv!un!qsdq`sd!`o!dobsxquhno!rnguv`sd!trhof!B”!5/1!`oe!Vhoenvr!Gnslr/ Qsdsdpthrhudr!; 0/!Lhbsnrngu!Whrt`m!Rutehn/!) This is absolute fuzzy mess! That’s ‘encryption’ according to my software. Now feed this data back in the software you get usual form the plain English language. Put the same software at both terminals it may help in encoding and deciphering simultaneously
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    Secret Sharp is a wizard based GUI for the Shamir Secret Sharing Algorithm provided by the crypto++ API. Secret Sharp replicates the functionality that 'ssss' provides on unix.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15

    Sequencer For KeePass 2

    Password Generation Plugin for KeePass 2.29

    Generates word list password with some options. Tested with version up to 2.29 for now Project has been moved to https://github.com/fireout/keepasssequencer
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    Verigio - Geo Firewall

    Verigio - Geo Firewall

    Blocking and monitoring of network traffic based on geography.

    Geo Firewall performs blocking of network traffic based on geography (geo IP), allows to add custom subnets, allows exceptions on ports for incoming traffic for specific geography, keeps visual and persistent logs, shows statistics, automatically updates geographical database.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 17
    Absinthe is an automated SQL injection utility capable of both blind and verbose SQL injections.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    BinaryCrypt

    BinaryCrypt

    Binary Conversion Calculator

    With BinaryCrypt, you can convert between regular text, binary, hexadecimal, octal decimal and decimal. You can convert only decimal (as of right now) to any base up to base 64. You can also save your converted text to a file or open a converted text file to decrypt the message, and perform basic arithmetic in binary. The git repo for the C# code is located at: https://github.com/m1r4g3/BinaryCrypt-.Net
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19

    CryptKeeper

    Encryption/Decryption Application

    Basic text file encryption & decryption. Can encrypt text files with or without formatting. CryptKeeper is the upgraded version of EnCREEPtor.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Fiesta

    Fiesta

    Easy Antivirus

    Fast antivirus software
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21

    LockyMonitor

    Windows Service to check if files has been changed by ransomware

    Windwos Service to check if files has been changed by crypto ransomware. It does not prevent from ransomware infection! Don't use it in productive environments to prevent data loss! The Software comes without any warranty. If files has been changed it send a email and shutdown or disconnect the host or stop the server (LanmanServer) service to disconnect all shares on the server. The FileSystemWatcher object raises the events for the files in the monitored target folder. If a file in the monitor folder is changed by a user or programm a false alarm will be raised! It checks the MD5 hash of the monitor files for file changes. c# source is included in the zip file It uses the FileSystemMonitor class. The project is inactive because the software cant prevent against an infection.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22

    LockyMonitorConsole

    Console app to check if files has been changed by crypto ransomware

    Console application to check if files has been changed by crypto ransomware like Locky. It does not prevent from ransomware infection! Don't use it in productive environments to prevent data loss! The Software comes without any warranty. If files has been changed it send a email and shutdown or disable the network interfaces of the host. It runs under the user account and monitor drives which are connected to a server share. Works with remote to local Symlinks on a server share. Can map and monitor drives by using the subst or net use command. Can monitor multiple folders or drives. It communicates with a Windows LockyDisconnectService to disable all physical Network Interfaces (NICs). Use the commandline Parameter: -q to hide the console -i to add the console to windows autorun and install LockyDisconnectService c# source is included in the zip file It uses the FileSystemMonitor class. The Project is inactive because it can't protect against ransomware
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    With the Log Parser one can scan logs, whitelist out legitimate, non-corrupt entries (usually file paths), and apply a standard format to a log generated by any antivirus or malware-removal program. This makes for easier reading of the meat in any log.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    Manual Virus Removal Tool

    Manual Virus Removal Tool

    MVRT is a small utility to unhide all files and help in virus deletion

    Manual Virus Removal Tool 1.01-beta Platform: Windows ============ Information: ============ 1- This is NOT an Anti-Virus so don't assume it to be one. 2- If you don't know anything about file types specially (.exe/.bat/.vbs etc) then this application is useless for you. =========================== What this application does? =========================== You select a folder, click 'Unhide All' and MVRT unhides all the files and folders (even super hidden ones) inside the chosen folder. Then you can either go to that folder in the Windows Explorer and delete the .exe,.bat,.cmd,.vbs files or shortcuts you suspect to be viruses. Or you may choose the file in MVRT itself and click 'Delete File' to delete it. You can also check basic information about files like attributes and file size by choosing a file from tree and clicking "File Info". ==================================
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    Pasword generator RORG

    Pasword generator RORG

    Securely generate passwords using UTF16 and Random.org

    This application offers the ability to generate passwords using atmospheric noise withthe service random.org or fully local key creation. The application generates random characters from the entire UTF-16 range and converts them into one long string. INSTALATION: No installation is needed. Simply extract the folder PR-RORG.zip and use it. The application keeps its settings (including the API key) in its folder located within C: Program Files. Frequently asked questions (FAQs) in file FAQ.txt
    Downloads: 1 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB