Open Source Assembly Security Software for Linux

Assembly Security Software for Linux

View 692 business solutions

Browse free open source Assembly Security Software for Linux and projects below. Use the toggles on the left to filter open source Assembly Security Software for Linux by OS, license, language, programming language, and project status.

  • Run applications fast and securely in a fully managed environment Icon
    Run applications fast and securely in a fully managed environment

    Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.

    Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
    Try for free
  • The Leading All-In-One Vacation Rental Software for Property Managers Icon
    The Leading All-In-One Vacation Rental Software for Property Managers

    Hostaway helps you grow your property management business by automating and streamlining every aspect of your business

    The dashboard and mobile app allows users to manage their marketing, sales, accounting, reporting, payment and communication needs all in one place. As premium partners of channels such as VRBO, Booking.com, Airbnb, Homeaway and Expedia, with the ability to manage advanced setups, no other platform gives you the type of control and peace of mind that a Hostaway user has. The software is designed with teams in mind - it's easy to train staff and keep them happy while improving business at the same time! Hostaway also provides a booking engine, wordpress website and both marketing and sales tools for managing your valuable direct bookings.
    Learn More
  • 1
    BerserkArch

    BerserkArch

    A bleeding-edge, security-centric Arch-based Linux distribution.

    BerserkArch is a security-focused, performance-tuned Linux operating system (OS) based on Arch Linux, designed for developers, hackers, and technical users. A bleeding-edge, security-centric Arch-based Linux distribution crafted for hackers, developers, and nerds alike. Following the Arch Linux philosophy, it is designed to be highly customizable, allowing users to build their environment with only the components they need, rather than having a lot of pre-installed software like some other security distributions (e.g., Kali Linux). As an Arch-based distribution, it benefits from the rolling release model, providing users with the latest software versions and kernel updates. BerserkArch is a dist "designed to make you powerful" for specific use cases like reverse-engineering binaries and automating exploits, rather than being an easy-to-use distribution for general beginners.
    Leader badge
    Downloads: 89 This Week
    Last Update:
    See Project
  • 2
    BitVisor is a tiny hypervisor initially designed for mediating I/O access from a single guest OS. Its implementation is mature enough to run Windows and Linux, and can be used as a generic platform for various research and development projects.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 3
    Libecc is an Elliptic Curve Cryptography C++ library for fixed size keys in order to achieve a maximum speed. The goal of this project is to become the first free Open Source library providing the means to generate safe elliptic curves.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    Software for a van eck phreaking device. Please use to test security only. <a href="http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci550525,00.html">Here</a>'s an explanation if you don't know what van eck phreaking is.
    Downloads: 1 This Week
    Last Update:
    See Project
  • ATF Compliance Made Simple. Guaranteed. Icon
    ATF Compliance Made Simple. Guaranteed.

    For Federal Firearms Licensees (FFLs)

    Since 2010, FastBound Firearms Compliance Software has processed hundreds of millions of serial numbers for thousands of Federal Firearms Licensees (FFLs). FastBound comes with an attorney-backed ATF compliance guarantee. You won't find this anywhere else. FastBound Plans start at $8/mo with no contracts, upgrade, downgrade or cancel any time. Try FastBound free for 14 days and see for yourself why FastBound is the leader in Firearms Compliance Software. FastBound transforms any computer, tablet, or even the buyer’s smartphone into a compliant 4473 with digital signature support with no transaction fees or special hardware requirements. FastBound offers a robust API and syncs effortlessly with a growing list of point of sale (POS), enterprise resource planning (ERP), and other software packages. Only FastBound gives you the peace of mind to prosper backed by a guaranteed legal defense related to the use of our software. Nobody else offers this!
    Learn More
  • 5
    Unicornscan is an asynchronous TCP and UDP port scanner developed by the late Jack C. Louis.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    An original bruteforce-based encryption/decryption system. BBE was originally conceived to chat with encrypted text on IRC. mIRC and X-Chat support BBE via script addon. BBE can also encrypt MIME encoded files. Blowfish encryption is currently supported.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Derived from TrueCrypt 6.3 release, I added some command line options to "TrueCrypt Format.exe" to allow TrueCrypt volumes to be created without using the graphical user interface
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Cryptography Tools

    Classic & Modern Cryptography tools

    Cryptography Tools is a project to develop demonstration tools on classic (currently Caesar and Playfair) & modern crypto-systems, including private & public key encryptions, digital signatures, cryptographic hashes and authenticated encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Bouncer en localhost o lan, que permite capturar el trafico hacia un determinado canal de irc, cifrandolo con Rijndael, Serpent o Twofish. Y mostrando una salida por el canal en base64. Ideal para paranoicos.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Captain Compliance - Data Privacy and Compliance Software Icon
    Captain Compliance - Data Privacy and Compliance Software

    Privacy Compliance Software - Avoid Fines and Prevent Lawsuits

    Captain Compliance handles your data privacy requirements so you can be privacy compliant. No more compliance stress, stop stressing over regulatory risks – just privacy protection managed by experts. Our user-friendly platform backed by privacy professionals simplifies the process of navigating regulations, giving your customers transparent choices, and building essential trust for your organization.
    Learn More
  • 10
    This project aims to pool together as many kernel projects as possible, ironing out conflicts where possible, so that experimental kernel projects can get greater exposure, safely, and so that those projects can be tested under much more varied conditions
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    GTCop Professional Security Appliance aims to provide a powerful tool for satellite communications, with enhanced QoS and bandwidth controls. As derived from IPCop Firewall, it is a stable, secure, easy to configure and maintain GNU/Linux firewall box.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Powerful 512bit pseudo random encryption, optimized for the x86-64 architecture. Coded in x86-64 assembly language, this has the potential to be one of the most powerful and fastest file encryption engines to date.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    Post Memory Corruption Memory Analysis

    PMCMA - Post Memory Corruption Memory Analysis

    Pmcma is a tool aimed at automating the most time consuming taskes of exploitation. It for instance determine why an application is triggering a segmentention fault, evaluate if the faulting instruction can be used to write to memory or execute arbitrary code, and list all the function pointers potentially called from a given point in time by an application. Pmcma is a totally new kind of debugger, which allows for easy experimentation with a process in memory by forcing it to fork. The exact replicas of the process created in memory can then be intrumented while keeping the properties (eg: state of variables, ASLR, permissions...) of the original process. Pmcma is an easily extensible framework available under the Apache 2.0 license. Read more at https://moabi.com/research/jbrossard/index.html#pmcma
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    This project is intended to demonstrate that current popular approaches to software security (e.g. DAC, VMA randomization, etc) are not sufficient and that other approaches should be considered more seriously (e.g. MAC, design by contract).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A hardware supported hypervisor originally built for malware analysis. Features: Linux VM introspection, minimal detectability, small (~150KB), simple, and well documented. Can be used for other purposes. Support for Intel-VT & Windows coming soon.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This program try to crack any md5 hash , but not using one cpu, using the power of distributed computing to get better results in less time
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Strength in numbers. Existing products we're involved in include port to Linux of Tony Forbes' MFAC for brute-force factorization of MM61 for relatively small factors, and further development and improvement of Tim Charron's ECMnet distributed computing f
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next