Open Source Assembly Command Line Tools for Windows

Assembly Command Line Tools for Windows

View 1893 business solutions

Browse free open source Assembly Command Line Tools for Windows and projects below. Use the toggles on the left to filter open source Assembly Command Line Tools for Windows by OS, license, language, programming language, and project status.

  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    Capslock

    Capslock

    Tool to remap Caps Lock key behavior on Windows systems

    Capslock is a command-line tool for analyzing the capabilities of Go packages to reveal what privileged operations their code and dependencies can perform. Rather than detecting vulnerabilities, Capslock focuses on identifying capabilities — permissions implied by calls to sensitive or privileged standard library functions, such as file system access, networking, or process control. By following transitive call graphs, it classifies which security-sensitive operations each package can reach, giving developers visibility into what their dependencies are capable of doing. This helps apply the Principle of Least Privilege to Go software, guiding audits, supply chain reviews, and trust assessments. Capslock aims to make security posture analysis more proactive by surfacing capability-based risk signals before malicious or overly powerful code is introduced into production.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 2
    ImpLib SDK

    ImpLib SDK

    ImpLib SDK produces custom Import libraries for Windows DLL

    ImpLib SDK combines free programming tools for authoring custom import libraries for Windows DLL (32 and 64 bit). The SDK supports advanced features, like cdecl2stdcall conversion, importing by ordinal, removing original thunk, storing symbols from different DLL files in a single import library. The ImpLib SDK is also useful to overcome any legal restrictions when redistributing the import libraries for certain DLL files, like the Microsoft® C++ runtime. The import libraries for the CRT or STL are part of the Windows SDK. Even though the SDK is available for free, redistributing these files is not allowed according to the current license agreements. An alternative is to generate these import libraries using the ImpLib SDK, as it doesn't restrict redistribution. The ImpLib SDK is free even for commercial use and redistribution of any kind, as long as all copyrights are preserved. Guide: https://implib.sourceforge.io/EN.HTM GitHub repo: https://github.com/vkamenar/implib-sdk
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    m6811dis

    m6811dis

    M6811 Code-Seeking Disassembler

    The M6811 Code-Seeking Disassembler is a command-line tool that lets you enter known starting vectors for a given code image for the 6811 micro. It will disassemble the code and follow through branches to assist in the separation of code and data. Its companion Fuzzy Function Analyzer uses DNA Sequence Alignment Algorithms to locate similar code in multiple binaries, facilitating reverse-engineering. Originally written to analyze code from GM automotive engine controllers, but is useful anywhere a 6811 micro is being used. Version 1.0 was written in Borland Pascal in April 1996, and updated to v1.2 in June 1999. It was later rewritten to C++ in July 1999 through Jan 2000. While it's been freely available since its creation, it's being released here as an open-source project so the world can better use it as it sees fit. Version 2.0 is completely reworked in 2014 to compile and run with GCC and STL to make it fully portable and accessible to all computer platforms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Tiny command line tool for speed optimized single file encryption/decryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • Previous
  • You're on page 1
  • Next