Browse free open source C Security Software and projects below. Use the toggles on the left to filter open source C Security Software by OS, license, language, programming language, and project status.

  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 1
    FreeOTFE

    FreeOTFE

    A free "on-the-fly" transparent disk encryption program for PC & PDAs.

    An upstream source site housing the original files for this mirror is no longer available. With this software, you can create one or more "virtual disks" on your PC/PDA. These disks operate exactly like a normal disk, with the exception that anything written to one of them is transparently, and securely, encrypted before being stored on your computer's hard drive.
    Downloads: 28 This Week
    Last Update:
    See Project
  • 2
    Msieve is a C library implementing a suite of algorithms to factor large integers. It contains an implementation of the SIQS and GNFS algorithms; the latter has helped complete some of the largest public factorizations known
    Leader badge
    Downloads: 66 This Week
    Last Update:
    See Project
  • 3
    BlackBelt Privacy Tor/i2p+WASTE+VidVoIP

    BlackBelt Privacy Tor/i2p+WASTE+VidVoIP

    Browse on Tor/i2p, Anon p2p Chat / FileTx, Conf / Video VoIP

    Open Source - GPLv3 inc images. *** PLEASE NOTE: There are now 2 seperate versions here. *** One is Pre Firefox 57. The other is Post Firefox 57. *** For those providing mirrors, please enable your users to realize this. Vidalia Based, Tor as a Service Solution. MicroSip: enables FREE PC to PC video calling with no account sign-up and no middleman server. WASTE: enables FREE Conference VoIP, chat, file transfer and support. *** AI Powered *** Tor/i2p: enables safer browsing. Tor/i2p Profile: Browse over Tor/i2p on Firefox (Vanilla, ESR), Waterfox (Classic, New), Palemoon , LibreWolf and legacy CyberFox. As with all versions of Tor - do not rely on this for strong anonymity. A usability enhanced Privacy Pack. Use alongside Tor Browser Bundle. An installer, for : Vista 32/64, Win7 32/64, Win8 32/64, Win10 32/64, Win11, Linux (Wine)
    Leader badge
    Downloads: 43 This Week
    Last Update:
    See Project
  • 4
    Foremost is a linux tool for conducting forensic examinations. Although intended for law enforcement purposes, it may be useful to other members of the community. Foremost reads through a file, such as a dd image file or a disk partition and extracts file
    Leader badge
    Downloads: 45 This Week
    Last Update:
    See Project
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 5

    ProxyCrypt

    Encrypted volumes through command line

    ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Encryption and decryption are made on the fly, allowing you to use encrypted volumes like normal ones. Designed for paranoids and advanced users, it is also fast, very lightweight, open source and easy to recompile. See the features below. It works as a "proxy" for the AIM driver or the ImDisk driver. AIM driver is included in the full package. See the documentation for more informations and an example of use: https://sourceforge.net/p/proxycrypt/doc/ Requirements: - Windows 7 or later - Arsenal Image Mounter or ImDisk Virtual Disk Driver - Administrative privileges - 64-bit CPU with SSE3 instructions - About 1 GB of RAM temporarily required for password checking with default settings Hashes of all versions: https://sourceforge.net/p/proxycrypt/doc/Hash
    Downloads: 25 This Week
    Last Update:
    See Project
  • 6
    CartoReso intends to facilitate enterprise computer network mapping.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 7
    Steganography program. Crypture encrypts (1024 bit key) and stores files in Windows bitmap files. Only 6 KB, with no install required. Fills all bits with noise, to slip by standard steganalysis methods. Data header is encrypted and scattered as well.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 8
    The purpose of the tool is to perform fingerprinting of remote TCP/IP stacks based on Ofir Arkin's ICMP fingerprinting research. This tool is a practical implementation of results discovered during 'project X' http://www.sys-security.com/index.php
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    TinyCrypt is a simple secure program for encrypting files. The core encryption code is only 76 lines of C code, based on the well known ARC4-D(768) algorithm.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Photo and Video Editing APIs and SDKs Icon
    Photo and Video Editing APIs and SDKs

    Trusted by 150 million+ creators and businesses globally

    Unlock Picsart's full editing suite by embedding our Editor SDK directly into your platform. Offer your users the power of a full design suite without leaving your site.
    Learn More
  • 10
    Common Hardware Recovery Solutions by Ukrainian-Russian network
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    This project is dedicated to creating encryption programs, along with their decryption counterparts. The encryptor will encrypt any file (that I've tested) and decrypt a file.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    Wraith is an open source IRC bot written in C++. It has been in development since late 2003. It is based on Eggdrop 1.6.12 but has since evolved into something much different at its core.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13

    coldfusion

    An RFID Access control system for the raspberry pi

    ColdFusion ========== ColdFusion is a Raspberry pi RFID access control system. It uses [wiringPi](http://wiringpi.com/) to control the Piface that toggle's the electronic lock in the door. It then compares the UID given from the Scanner to the ones in the data directory, If a match is found it will open the doors lock. Be sure to read the WIKI https://sourceforge.net/p/coldfusion/wiki/Setup/
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    Fwall is a professional firewall software for Linux (Newt interface). The software has been adopted by private and governmental companies in Brazil. Fwall can be used with clients, servers, and (mainly) gateway machines.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Hardware-ID is a small Linux module providing a program by program assignment of certain hardware specific values. Useful for preparing master hard drives, hardware independend backup/restore and some exotic hardware.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    It consists of two parts...denial of service attack and kalman filter...source code is written in C...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    The LTC Encryption program is designed to implement the cryptographic functions contained in the libtomcrypt.a library. It works similar to PGP, but does not use the OpenPGP standards.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Raiden block cipher: An extremely lightweight and fast block cipher, developed using genetic programming, with the intention to be an alternative to TEA. This cipher is as fast as TEA, and without many of its known weaknesses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    SHA PadLock computes SHA-1 or SHA-256 file checksums using VIA Nano's processors hardware PHE engine. Currently it can only be run on VIA Nano processors (in Samsung NC20 netbook for example) under Windows. It was build using VIA PadLock SDK.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    A small program that allows the user to delete files in a secure manner.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Innovative prototype of network applications such as TCP fuzzers that can be used for many purposes such as network and application security assessments and more. Adapt it freely to fit your needs or to simply understand how TCP works in .NET.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    USB History Dump is a forensic tool used to trace evidence of USB thumb drive activity from the Windows Registry. It can be used to gather information such as the last time the thumb drive or mp3 player was connected as well as the last drive letter.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Zip file alternative protection mechanism for passing zip files across public networks or to bypass scanning mechanisms of the contents.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    chaOS41

    A cryptocurrency like Bitcoin improved upon with reality binding.

    There is a reason this project holds no code. chaOS41 is a cryptocurrency with reality binding. A given value of money was paid for a surface area the size of a flower pot. It was out of proportion. The chaoOS41 currency corrects that. It binds its value to reality. Its unit value is a ratio between money and land area.. When that ratio normalizes, the currency becomes available to the public. 1 more developer is wanted. For that you need inside access, which means the access protocol is made public now. It is also the open-source cryptographic protocol. Type in a formatted string as "beacon" and a number. Repeat. When the identical string is produced, prepare. When the identical string repeats, a name is added. This signals that the next line of text you type, is registered. Hint: include a URL.End of protocol. Valid beacon digits are 250, 1024, 2048, 4096, 8192, 16384, 32768 and up.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    A simple demonstrative command line tool which can do both file encryption and decryption . It is based on OpenSSL and can support AES / DES / 3DES / BLOWFISH / RC4 cipher algorithms with ECB / CBC / CFB / OFB chaining modes (ECB only for RC4).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.