[go: up one dir, main page]

Tcl Security Software

View 5628 business solutions

Browse free open source Tcl Security Software and projects below. Use the toggles on the left to filter open source Tcl Security Software by OS, license, language, programming language, and project status.

  • See Everything. Miss Nothing. 30-day free trial Icon
    See Everything. Miss Nothing. 30-day free trial

    Don’t let IT surprises catch you off guard. PRTG keeps an eye on your whole network, so you don’t have to.

    As the IT backbone of your company, you can’t afford to miss a thing. PRTG monitors every device, application, and connection - on-premise and in the cloud. You get clear dashboards, smart alerts, and mobile access, so you’re always in control, wherever you are. No more guesswork or manual checks. PRTG’s powerful automation and easy setup mean you spend less time firefighting and more time moving your business forward. Discover how simple and reliable IT monitoring can be.
    Try PRTG 30-day full access trial
  • The All-in-One Commerce Platform for Businesses - Shopify Icon
    The All-in-One Commerce Platform for Businesses - Shopify

    Shopify offers plans for anyone that wants to sell products online and build an ecommerce store, small to mid-sized businesses as well as enterprise

    Shopify is a leading all-in-one commerce platform that enables businesses to start, build, and grow their online and physical stores. It offers tools to create customized websites, manage inventory, process payments, and sell across multiple channels including online, in-person, wholesale, and global markets. The platform includes integrated marketing tools, analytics, and customer engagement features to help merchants reach and retain customers. Shopify supports thousands of third-party apps and offers developer-friendly APIs for custom solutions. With world-class checkout technology, Shopify powers over 150 million high-intent shoppers worldwide. Its reliable, scalable infrastructure ensures fast performance and seamless operations at any business size.
    Learn More
  • 1
    Network Security Toolkit (NST)

    Network Security Toolkit (NST)

    A network security analysis and monitoring toolkit Linux distribution.

    Network Security Toolkit (NST) is a bootable ISO image (Live USB Flash Drive) based on Fedora 42 providing easy access to best-of-breed Open Source Network Security Applications and should run on most x86_64 systems. The main intent of developing this toolkit was to provide the security professional and network administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in the article: Top 125 Security Tools by INSECURE.ORG are available in the toolkit. An advanced Web User Interface (WUI) is provided for system/network administration, navigation, automation, network monitoring, host geolocation, network analysis and configuration of many network and security applications found within the NST distribution. In the virtual world, NST can be used as a network security analysis, validation and monitoring tool on enterprise virtual servers hosting virtual machines.
    Leader badge">
    Downloads: 316 This Week
    Last Update:
    See Project
  • 2
    hexinject

    hexinject

    Hexadecimal and raw packet injector and sniffer.

    Hexadecimal and raw packet injector and sniffer. Can be easily combined with other tools to provide a powerful cmdline framework for raw network access.
    Leader badge">
    Downloads: 15 This Week
    Last Update:
    See Project
  • 3
    OpenSignature is an open source project for the digital signature of documents. It works with all cards supported by OpenSC and focuses on adding support for cards from accredited Italian CAs. The goal of the project is to provide a first single product
    Downloads: 10 This Week
    Last Update:
    See Project
  • 4

    Portable Text Encryption

    Single Linux or Windows binary for secure text encryption

    Self contained and completely portable binary encrypts text for secure email, messaging, irc use, etc., ideal for USB flash drives. AES-128/192/256 (ecb/cbc), Blowfish (ecb/cbc), DES / TripleDES (ecb/cbc/ofb/cfb), or RC4. Linux and Windows binaries. I don't make cute interfaces, it just works. https://codeberg.org/BloodFeastMan/pte I would also recommend FTC, encrypts both files and text using the same interface as PTE, and a separate encryption and hashing engine I wrote in Crystal, and is much faster than PTE: https://sourceforge.net/projects/ft-crypt/
    Downloads: 13 This Week
    Last Update:
    See Project
  • Cloud data warehouse to power your data-driven innovation Icon
    Cloud data warehouse to power your data-driven innovation

    BigQuery is a serverless and cost-effective enterprise data warehouse that works across clouds and scales with your data.

    BigQuery Studio provides a single, unified interface for all data practitioners of various coding skills to simplify analytics workflows from data ingestion and preparation to data exploration and visualization to ML model creation and use. It also allows you to use simple SQL to access Vertex AI foundational models directly inside BigQuery for text processing tasks, such as sentiment analysis, entity extraction, and many more without having to deal with specialized models.
    Try for free
  • 5

    WinHasher

    Very simple file and text hashing tool for Windows

    Tiny script will find hash digest of files or text by calling on Microsoft's "certutil.exe", using MD4, MD5, SHA1, SHA256, SHA384, or SHA512. Simple and self explanatory. *EDIT 5/3/25, I just realized that there is another project entitled "WinHasher", it appears to kind of do the same thing but uses native code rather than Microsoft's "certutil". If that's what you're looking for, it's here: https://github.com/gpfjeff/winhasher
    Downloads: 11 This Week
    Last Update:
    See Project
  • 6
    Sguil's (pronounced sgweel) main component is an intuitive GUI that receives realtime events from snort/barnyard. It includes other components which facilitate the practice of Network Security Monitoring (NSM) and event driven analysis of IDS alerts.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 7
    A set of tools for manipulating and solving pencil-and-paper style ciphers, cryptograms, and related puzzles.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 8
    TclTrf is an extension library to the script language tcl, as created by John Ousterhout. It extends the language at the C-and Tcl-with ``transformer''-commands to encode and compress data. Based on the stacked channels of the tcl core (ability inter
    Downloads: 4 This Week
    Last Update:
    See Project
  • 9

    FTC

    Symmetric File and Text Encryption

    FTC cascades choice of Aria-256, AES-256, Camellia-256, SM4, or ChaCha20 for file and text encryption, the keystream generation is extremely robust I don't make cute interfaces, it just works.
    Downloads: 3 This Week
    Last Update:
    See Project
  • Create and run cloud-based virtual machines. Icon
    Create and run cloud-based virtual machines.

    Secure and customizable compute service that lets you create and run virtual machines.

    Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
    Try for free
  • 10
    A Secure, Firewall-Friendly Platform for Peer-to-Peer Networking. With a few mouse clicks, request remote access to colleagues' computer desktops, transfer files, sketch & chat, or videoconference. Automatic, authenticated & encrypted tunneling!
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11

    SDigest

    File hashing tool using MD5, SHA1, SHA256, SHA512

    Most file hashing utils involve specifying a file in a dialog, or dragging a file to an input box, SDigest simply resides in the file context menu, and will display a pop-up showing MD5, SHA1, SHA256, and SHA512 message digests of the selected file
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12

    File And Text Encryption (fate)

    No nonsense file and text encryption

    This is a stripped down, no nonsense, no options encryption utility for normal users who just want to secure their files and text and move on. The ciphers used are Aria-256, AES-256, and Blowfish-448 in OFB and CBC mode. The password hashing and salt derivation are robust. I don't make cute interfaces, it just works.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    TkSftp - an X wrapper for the OpenSSH sftp console client
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    RSA Public Key Crypotgraphy for Web Browsers. Use JavaScript to RSA-encrypt data that can only be decrypted on the server, and not by prying eyes. The poor man's SSL...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    BT Auto Locker

    BT Auto Locker

    A Bluetooth-based proximity locking tool for Windows

    Welcome to BT Auto Locker! Begin using the application within seconds—no complex setup necessary. Simply download the portable version and benefit from immediate, automatic Bluetooth-based locking to safeguard your PC. BT Auto Locker is an intelligent utility for Windows that automatically locks your computer whenever a trusted Bluetooth device (such as your phone, headphones, or watch) moves beyond the specified range, ensuring your system remains secure. BT Auto Locker v1.0.4 Release Date: August 1, 2025 -Fixed an issue where the "Check for Updates" feature was non-functional. -Corrected the "Contact Support" email link in the Help menu. Source Code (Github): https://github.com/BT-Auto-Locker/BT-Auto-Locker Official Release (Microsoft Store): https://apps.microsoft.com/detail/9ntznn3dbp2s?hl=en-US
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    An original bruteforce-based encryption/decryption system. BBE was originally conceived to chat with encrypted text on IRC. mIRC and X-Chat support BBE via script addon. BBE can also encrypt MIME encoded files. Blowfish encryption is currently supported.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    The Desktop Environment For Kids is a kid friendly environment for UNIX/Linux, complete with kid oriented desktop themes and desk accesories.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    No Crappy Passwords

    Takes your crappy password and makes it non-crappy

    Hashes, encrypts, and encodes lousy passwords based information from initial hashes, combined with user provided offsets. Creating easy to memorize systems of passwords and offsets, the possibilities are endless, with never a need to file your passwords to disc or entrust them to a password manager.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    ISO 17799 - Code of practice for information security management. Creation of methodology and documentation for audit adapted to ISO. One is made up of an introduction on general aspects of the security of the information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    The PureSecure Plugin Factory Project focus on the production and share of Demarc PureSecure Extensible Service Monitoring (ESM) Plugins . They can be wrote in any language you want. Demarc PureSecure is free for non-commercial use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    OS based on Agent based Security with a new type of split kernel and agents platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Security Officers Management and Analysis Project (SOMAP) is all about defining security management work methods and supplying Security Officers with tools to do their job more efficient and following standards easily.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Fast cryptography extension for Tcl. TclTomCrypt is a sensible binding that brings the features and performance of LibTomCrypt to Tcl.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    ConAlyzer (CONsistency anALYZER) is an experimental tool for finding inconsistencies between log files and file system metadata, implemented in Tcl/Tk. At present it only handles FTP log files produced by the Serv-U FTP server on the Windows platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Crypto.mod is a simple LOADABLE cryptographic module for tcl 8.3+ (possibly older, not tested). The module supports the blowfish, twofish and rijndael ciphers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next