Showing 8 open source projects for "source code claude code"

View related business solutions
  • Endpoint Protection Software for Businesses | HYPERSECURE Icon
    Endpoint Protection Software for Businesses | HYPERSECURE

    DriveLock protects systems, data, end devices from data loss and misuse.

    The HYPERSECURE endpoint protection platform is a comprehensive suite of products and services enhanced by European third-party solutions. It ensures our customers’ IT security, regulatory compliance, and digital sovereignty.
    Learn More
  • Quality and compliance software for growing life science companies Icon
    Quality and compliance software for growing life science companies

    Unite quality management, product lifecycle, and compliance intelligence to stay continuously audit-ready and accelerate market entry

    Automate gap analysis across FDA, ISO 13485, MDR, and 28+ regulatory standards. Cross-map evidence once, reuse across submissions. Get real-time risk alerts and board-ready dashboards, so you can expand into new markets with confidence
    Learn More
  • 1
    Viral Tool

    Viral Tool

    A smart malware creator to create 26 types of malwares.

    ...In this era of computers, threats have increased more then before & that's why software's like these come in handy. With this software we can create malwares in different formats. We can view & edit the source code of those malwares. Ethical Hackers can use this software in a secure way during pen testing.
    Leader badge
    Downloads: 9 This Week
    Last Update:
    See Project
  • 2
    Endico - Text Encrypt

    Endico - Text Encrypt

    Fastest way to make secure text.

    Help to convert text into secret codes , so that you can mail,chat and transfer text securely to prevent hacking. How to use : Step one - Open Endico 14 Step two - Decide what to do (Text Encode/Text Decode) Step three - If You Selected Text Encode -> Then Type/Copy/Open .txt file to convert. Step four - Copy the converted text into clipboard to chat,mail,print process etc. Step five - If you want to Decode the code the again follow step two. Step six - ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    HiJackThis

    HiJackThis

    A free utility that finds malware and other threats

    ...However, HijackThis does not make value based calls between what is considered good or bad. It is important to exercise caution and avoid making changes to your computer settings, unless you have expert knowledge. Source code is available SourceForge, under Code and also as a zip file under Files.
    Leader badge
    Downloads: 726 This Week
    Last Update:
    See Project
  • 4
    BinaryPix is a Tool to create "Binary-Visual" Code out of ASCII-Text Then it places it on a choosen picture. Then you are able to water-mark your pictures with the "binary-hidden" code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Dynamic Work and Complex Project Management Platform | Quickbase Icon
    Dynamic Work and Complex Project Management Platform | Quickbase

    Quickbase is the leading application platform for dynamic work.

    Our no-code platform lets you easily create, connect, and customize enterprise applications that fix visibility and workflow gaps without replacing a single system.
    Learn More
  • 5
    SFV.net is a sfv (Simple File Verificator) file creator and validator application. All code written by vb.net and requires .net framework for run or compile
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    The FreePKI project aims to create practical, interoperable & free code and services for Certificate and Registration Authorities based on the X.509 standard, including nearly zero-cost ID verification through a PGP-like web of trust scoring system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    The goal of Operation Project X is to crack the 2048-bit RSA private encryption key Microsoft uses to sign Xbox media, by using distributed computing. This key could be used by Xbox owners to run homebrew code on their machines.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 8
    ISO 17799 - Code of practice for information security management. Creation of methodology and documentation for audit adapted to ISO. One is made up of an introduction on general aspects of the security of the information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB