Open Source Delphi/Kylix Security Software for Linux

Delphi/Kylix Security Software for Linux

View 683 business solutions

Browse free open source Delphi/Kylix Security Software for Linux and projects below. Use the toggles on the left to filter open source Delphi/Kylix Security Software for Linux by OS, license, language, programming language, and project status.

  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • 1
    mp3stegz is an application that apply steganographic (steganography) algorithm in mp3 files. mp3stegz will maintain original mp3 file's size and sound quality. The hidden message is compressed(zlib) and encrypted(Rijndael).
    Leader badge
    Downloads: 37 This Week
    Last Update:
    See Project
  • 2
    Malzilla

    Malzilla

    Web-malware-hunting tool

    Malzilla is an advanced malware-hunting tool specialized for hunting web-based exploits, decode obfuscated JavaScripts etc.
    Downloads: 32 This Week
    Last Update:
    See Project
  • 3
    A client-server multithreaded application for bruteforce cracking passwords. The more clients connected, the faster the cracking. Plugin-based. Supports only RAR passwords at the moment and only with encrypted filenames.
    Downloads: 76 This Week
    Last Update:
    See Project
  • 4
    StreamSec Tools 2.1 is collection of cryptographic security related components, classes and routines for the Borland (R) Delphi (TM) development environment. The product includes modular clean room implementations of SSL/TLS, S/MIME and X.509.
    Downloads: 6 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    WipeOut - Secure Data Erase and Privacy
    WipeOut is secure data deletion method & application. WipeOut method is designed to be fast and secure. WipeOut also has many sub schemes for faster (but not weak) wipe process .
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6
    Common Hardware Recovery Solutions by Ukrainian-Russian network
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    An Open Source Key logger Created in Borland Delphi 7. Supports any Operaring System, and safest of it's kind. It's unique and untraceable, use it for anything you can imagine.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 8
    Dr. Crypt Encryption Algorithm & Library
    DrCrypt, based on basic xor(exclusive or) encryption which is designed to be fast and reliable. Also DrCrypt supports 3 platform.(Java, .NET, Win32)
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    Seed Tag

    Seed Tag

    Hide your SEED phrase in a fake SEED phrase

    use only v5! ru: хотелось железный кошелёк, но у них один недостаток — кто его в держит в руках, того и деньги. Эта программа попытка сделать что-то вроде brainwallet, можно используя три ключа (число, пароль и адрес почты) превратить свою сид-фразу в бессмысленную сид-фразу, которую уже можно записать на железный кошелёк/армейский жетон(dog tag). Настоящего шифрования здесь нет, но от честных людей может помочь. Pack your seed phrase into a bad phrase using three keys (some number, password and email) Warning! this is not tested for security. I made this for myself, when i wanted to make the cheapiest iron crypto wallet from a dog tag. This program is a simple way to protect my seed phrase if others see my dog tag howto: 0 unplug internet connection!!! and use temporary os system 1 paste seed phrase as string into memo 2 enter three keys 3 pack it 4 copy packed seed as string 5 paste packed seed into memo 6 unpack it 7 compare unpacked seed wtih original seed 8 profit
    Downloads: 1 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    The goal of this project is to design and write comercial quality software and aplications with fully respect to free software (like in "free speach"). The software designed by us will target various fields: from scientific applications to multimedia an
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    watches for Regristry-changes of keys like HKLMSoftwareMicrosoftWindowsCurrentVersionRun etc. and pops up if something has changed, logs it, can ask google for the key found. Protects against Trojans and Viruses.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    Cisco Router Rommon Password Recovery
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    ECTP - Encrypted Compressed Transfer Protocol This protocol is similar to HTTP but with commands and features like FTP. The main features are security and compression abilities and the consequent use of one perisistant connection.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    IDTrans is developing b2b technologies. The primary aspects of the project are secure transmission libraries, a key server, and a application to demonstrate the use of the libraries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Foi comprovado que senhas como: datas de nascimento, números de telefone, numero de cartões de crédito... são fáceis de serem descobertas (hackeadas), por isso existe o Password Generator, para gerar senhas que são difíceis de descobrir. O Sistema funciona como um gerador RANDOM, que cria instantaneamente uma série de possibilidades de combinações que o sistema julga ser mais difícil para programas e hackers descobrirem.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    watches for Regristry-changes of keys like HKLMSoftwareMicrosoftWindowsCurrentVersionRun etc. and pops up if something has changed, logs it, can ask google for the key found. Protects against Trojans and Viruses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    ISP Toolz is providing the SLC Enterprise Security console for snort. Supports Cisco pix, snort and intruvert natively. Building additional support and API for additional device support. This is the open source version of our commercial software. This op
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Sandfish is a small encryption/decryption tool written in Delphi/Kylix.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Signed dynamic HTTP content. Used for recognizing hacked website content from the surfers view.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Terrier is a RBAC framework, business oriented and with focus on manageability and access control. Integrating all company tecnhnologies (java, ruby, delphi and others). The owner of a system can manage and delegate manageability to the systems, reducing
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Finds Text in Delphi *.Pas files e.g. : button1.caption:='Hello' Replaces Text with a function call button1.caption:=TXT(0) {##Hello##} Generates a function „TXT“ with a String List with all found Texts at the beginning of your source.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    A port of TurboPower OnGuard to CLX and Linux platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    “garuda” is an intrusion detection system against wireless threats. It is a progressive proof of concept project to ward off wireless threats such as war-drivers, rogue AP, wifi DoS and MAC spoofing attacks. Please enjoy and we welcome your volunteerism.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    sechk - SEcurity CHecKer It is a powerful and useful tool to check if you got exploited and rooted, it will use checksum comparation via md5 sum, it exchanges file lists and csums from the sechk server. It\'s gonna work with all posixes and unixes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    The secsuite Security Suite is, as it is called, a security suite. At the moment, only a portscanner with a graphical GUI is implemented. Screenshots of it are not yet avaiable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next