Showing 14 open source projects for "tinyxml-2"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • 1
    Seed Tag

    Seed Tag

    Hide your SEED phrase in a fake SEED phrase

    ..., password and email) Warning! this is not tested for security. I made this for myself, when i wanted to make the cheapiest iron crypto wallet from a dog tag. This program is a simple way to protect my seed phrase if others see my dog tag howto: 0 unplug internet connection!!! and use temporary os system 1 paste seed phrase as string into memo 2 enter three keys 3 pack it 4 copy packed seed as string 5 paste packed seed into memo 6 unpack it 7 compare unpacked seed wtih original seed 8 profit
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    TurboPower LockBox

    TurboPower LockBox 2 & 3 Cryptographic Library for Delphi

    LockBox 3 is a Delphi library for cryptography. Currently supported Delphi XE6. It provides support for AES, DES, 3DES, Blowfish, Twofish, SHA, MD5, a variety of chaining modes, RSA digital signature and verific...
    Downloads: 12 This Week
    Last Update:
    See Project
  • 4
    Portable Folder Locker

    Portable Folder Locker

    Quick protect your folder

    Hook Folder Locker is a small tool to lock your folder quickly. Its a portable software easy to use, just 1 file only. Protected by password. How to use: 1. Browse the folder 2. Click Lock 3. Choose your password for the folder How to unlock 1. Browse the folder 2. Click Unlock 3. Enter the password.
    Leader badge
    Downloads: 50 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5

    Umbrella Project 2012

    Security (Hack) Application

    What is include 1.Web Scanners a) RFI Scanner b) LFI Scanner c) SQLi Scanner d) Log Scanner e) Xss Scanner f) Google Scanner h) Joomla and WordPress Scanner 2.IP Reverse 3. Deface Mass Saver a) Zone-h deface saver b) IMT deface saver 4. MD5 Hash Cracker a) Online MD5 Hash Cracker (49 Sites) b) Manuel MD5 Hash Cracker 5. Admin Finder 6.Exploit Finder 7. Brute Force a) Joomla Brute Force b) WordPress Brute Force c) FTP Brute Force 8.Proxy a) Online proxy...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Enigma CS (Coding Software) 2

    Enigma CS (Coding Software) 2

    Powerful and easy-to-use encryption with a multimedia key architecture

    Fully featured, yet easy-to-use encryption software, complete with a multimedia based key architecture.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Open Source Security Suite Verschlüssselung mit Blowfish/Twofish/ AES. Datenlöschung mit Guttmann (Default)/Pseudorandom Data/US DoD 5220-22.M Methode
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    An uninstaller / detector foor Browser Toolbars for Internet Explorer and FireFox
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    DrSign, MD5 Ve SHA1 Algoritmaları Gibi Basit Bir Bilgi Özeti Algoritmasıdır. Test Amaçlı Tasarlanmıştır Ve Alpha Seviyesindedir...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    Cryptography programm for encrypt/decrypt your files.This is use a Microsoft Crypto API.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    “garuda” is an intrusion detection system against wireless threats. It is a progressive proof of concept project to ward off wireless threats such as war-drivers, rogue AP, wifi DoS and MAC spoofing attacks. Please enjoy and we welcome your volunteerism.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The KnightGina project is intended to do a free source replacement for MS Gina, using Object Pascal language (initially in Delphi enviromnent)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Signed dynamic HTTP content. Used for recognizing hacked website content from the surfers view.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Raptora is a tool to generate statistics of the traffic usage of a Axcent Raptor Firewall. It uses a database to store the gained informations from the logfiles and then it generates graphical statistics and a report.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next