Tcl Security Software

View 5532 business solutions

Browse free open source Tcl Security Software and projects below. Use the toggles on the left to filter open source Tcl Security Software by OS, license, language, programming language, and project status.

  • Get Avast Free Antivirus with 24/7 AI-powered online scam detection Icon
    Get Avast Free Antivirus with 24/7 AI-powered online scam detection

    Get protection for today’s online threats. Free.

    Award-winning antivirus protection, as well as protection against online scams, dangerous Wi-Fi connections, hacked accounts, and ransomware. It includes Avast Assistant, your built-in AI partner, which gives you help with suspicious online messages, offers, and more.
    Free Download
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    Network Security Toolkit (NST)

    Network Security Toolkit (NST)

    A network security analysis and monitoring toolkit Linux distribution.

    Network Security Toolkit (NST) is a bootable ISO image (Live USB Flash Drive) based on Fedora 42 providing easy access to best-of-breed Open Source Network Security Applications and should run on most x86_64 systems. The main intent of developing this toolkit was to provide the security professional and network administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in the article: Top 125 Security Tools by INSECURE.ORG are available in the toolkit. An advanced Web User Interface (WUI) is provided for system/network administration, navigation, automation, network monitoring, host geolocation, network analysis and configuration of many network and security applications found within the NST distribution. In the virtual world, NST can be used as a network security analysis, validation and monitoring tool on enterprise virtual servers hosting virtual machines.
    Leader badge
    Downloads: 171 This Week
    Last Update:
    See Project
  • 2
    OpenSignature is an open source project for the digital signature of documents. It works with all cards supported by OpenSC and focuses on adding support for cards from accredited Italian CAs. The goal of the project is to provide a first single product
    Downloads: 9 This Week
    Last Update:
    See Project
  • 3

    FTC

    Symmetric File and Text Encryption

    FTC cascades choice of Aria-256, AES-256, Camellia-256, SM4, or ChaCha20 for file encryption, and AES-256, TripleDES, and Blowfish for text encryption, both receive robust keystream generation. I don't make cute interfaces, it just works.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 4
    hexinject

    hexinject

    Hexadecimal and raw packet injector and sniffer.

    Hexadecimal and raw packet injector and sniffer. Can be easily combined with other tools to provide a powerful cmdline framework for raw network access.
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    Build gen AI apps with an all-in-one modern database: MongoDB Atlas

    MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
    Start Free
  • 5

    Portable Text Encryption

    Single Linux or Windows binary for secure text encryption

    Self contained and completely portable binary encrypts text for secure email, messaging, irc use, etc., ideal for USB flash drives. AES-128/192/256 (ecb/cbc), Blowfish (ecb/cbc), DES / TripleDES (ecb/cbc/ofb/cfb), or RC4. Linux and Windows binaries. I don't make cute interfaces, it just works. https://codeberg.org/BloodFeastMan/pte
    Downloads: 7 This Week
    Last Update:
    See Project
  • 6
    TclTrf is an extension library to the script language tcl, as created by John Ousterhout. It extends the language at the C-and Tcl-with ``transformer''-commands to encode and compress data. Based on the stacked channels of the tcl core (ability inter
    Downloads: 7 This Week
    Last Update:
    See Project
  • 7
    Sguil's (pronounced sgweel) main component is an intuitive GUI that receives realtime events from snort/barnyard. It includes other components which facilitate the practice of Network Security Monitoring (NSM) and event driven analysis of IDS alerts.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 8

    SDigest

    File hashing tool using MD5, SHA1, SHA256, SHA512

    Most file hashing utils involve specifying a file in a dialog, or dragging a file to an input box, SDigest simply resides in the file context menu, and will display a pop-up showing MD5, SHA1, SHA256, and SHA512 message digests of the selected file
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9

    WinHasher

    Very simple file and text hashing tool for Windows

    Tiny script will find hash digest of files or text by calling on Microsoft's "certutil.exe", using MD4, MD5, SHA1, SHA256, SHA384, or SHA512. Simple and self explanatory. *EDIT 5/3/25, I just realized that there is another project entitled "WinHasher", it appears to kind of do the same thing but uses native code rather than Microsoft's "certutil". If that's what you're looking for, it's here: https://github.com/gpfjeff/winhasher
    Downloads: 1 This Week
    Last Update:
    See Project
  • Picsart Enterprise Background Removal API for Stunning eCommerce Visuals Icon
    Picsart Enterprise Background Removal API for Stunning eCommerce Visuals

    Instantly remove the background from your images in just one click.

    With our Remove Background API tool, you can access the transformative capabilities of automation , which will allow you to turn any photo asset into compelling product imagery. With elevated visuals quality on your digital platforms, you can captivate your audience, and therefore achieve higher engagement and sales.
    Learn More
  • 10
    An original bruteforce-based encryption/decryption system. BBE was originally conceived to chat with encrypted text on IRC. mIRC and X-Chat support BBE via script addon. BBE can also encrypt MIME encoded files. Blowfish encryption is currently supported.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    The Desktop Environment For Kids is a kid friendly environment for UNIX/Linux, complete with kid oriented desktop themes and desk accesories.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    File And Text Encryption (fate)

    No nonsense file and text encryption

    This is a stripped down, no nonsense, no options encryption utility for normal users who just want to secure their files and text and move on. The ciphers used are Aria-256, AES-256, and Blowfish-448 in OFB and CBC mode. The password hashing and salt derivation are robust. I don't make cute interfaces, it just works.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    No Crappy Passwords

    Takes your crappy password and makes it non-crappy

    Hashes, encrypts, and encodes lousy passwords based information from initial hashes, combined with user provided offsets. Creating easy to memorize systems of passwords and offsets, the possibilities are endless, with never a need to file your passwords to disc or entrust them to a password manager.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    ISO 17799 - Code of practice for information security management. Creation of methodology and documentation for audit adapted to ISO. One is made up of an introduction on general aspects of the security of the information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A Secure, Firewall-Friendly Platform for Peer-to-Peer Networking. With a few mouse clicks, request remote access to colleagues' computer desktops, transfer files, sketch & chat, or videoconference. Automatic, authenticated & encrypted tunneling!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    The PureSecure Plugin Factory Project focus on the production and share of Demarc PureSecure Extensible Service Monitoring (ESM) Plugins . They can be wrote in any language you want. Demarc PureSecure is free for non-commercial use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    OS based on Agent based Security with a new type of split kernel and agents platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Security Officers Management and Analysis Project (SOMAP) is all about defining security management work methods and supplying Security Officers with tools to do their job more efficient and following standards easily.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A set of tools for manipulating and solving pencil-and-paper style ciphers, cryptograms, and related puzzles.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Fast cryptography extension for Tcl. TclTomCrypt is a sensible binding that brings the features and performance of LibTomCrypt to Tcl.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    TkSftp - an X wrapper for the OpenSSH sftp console client
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    RSA Public Key Crypotgraphy for Web Browsers. Use JavaScript to RSA-encrypt data that can only be decrypted on the server, and not by prying eyes. The poor man's SSL...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    ConAlyzer (CONsistency anALYZER) is an experimental tool for finding inconsistencies between log files and file system metadata, implemented in Tcl/Tk. At present it only handles FTP log files produced by the Serv-U FTP server on the Windows platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Crypto.mod is a simple LOADABLE cryptographic module for tcl 8.3+ (possibly older, not tested). The module supports the blowfish, twofish and rijndael ciphers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    tkpgp is a gui front-end to the Gnu Privacy Guard PGP implementation. It provides a selection-based channel that enables simple and convenient integration with other applications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.