Showing 53 open source projects for "obfuscation"

View related business solutions
  • The Apple Device Management and Security Platform Icon
    The Apple Device Management and Security Platform

    For IT teams at organizations that run on Apple

    Achieve harmony across your Apple device fleet with Kandji's unmatched management and security capabilities.
    Learn More
  • Build experiences that drive engagement and increase transactions Icon
    Build experiences that drive engagement and increase transactions

    Connect your users - doctors, gamers, shoppers, or lovers - wherever they are.

    Sendbird's chat, voice, and video APIs power conversations and communities in hundreds of the most innovative apps and products. Sendbird’s feature-rich platform, and pre-fab UI components make developers more productive. We take care of a ton of operational complexity under the hood, so you can power a rich chat service, and life-like voice, and video experiences, and not worry about features, edge cases, reliability, or scale.
    Learn More
  • 1
    Obfuscar

    Obfuscar

    Open source obfuscation tool for .NET assemblies

    Obfuscar is an open-source .NET obfuscator released under MIT license. It provides basic obfuscation features that help secure secrets in a .NET assembly. An obfuscation tool designed for most .NET developers. Hide everything private, while keep everything public. You can achieve such simply via default settings. Hide class/method/property/event names that you don't want to expose. This is irreversible. String contents can be compressed so that end users won't easily learn them. ...
    Downloads: 20 This Week
    Last Update:
    See Project
  • 2
    Greenmask

    Greenmask

    PostgreSQL database anonymization and synthetic data generation tool

    ...The Greenmask utility plays a central role in the Greenmask ecosystem. Our goal is to develop a comprehensive, UI-based solution for managing obfuscation procedures. We recognize the challenges of maintaining obfuscation consistency throughout the software lifecycle. Greenmask is dedicated to providing valuable tools and features that ensure the obfuscation process remains fresh, predictable, and transparent.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3
    ProGuard Maven Plugin

    ProGuard Maven Plugin

    ProGuard Maven plugin that supports modularised ProGuard packages

    A Maven plugin that integrates ProGuard, which is used for code shrinking, obfuscation, and optimization for Java applications.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 4
    Amnezia VPN

    Amnezia VPN

    Amnezia VPN Client (Desktop+Mobile)

    Amnezia is an open-source VPN client, with a key feature that enables you to deploy your own VPN server on your server.
    Downloads: 5,305 This Week
    Last Update:
    See Project
  • Searching for a better way to ship ecommerce? We can help Icon
    Searching for a better way to ship ecommerce? We can help

    ShipHero gives you the tools that give you ecommerce fulfillment super powers.

    ShipHero is built for multi-channel commerce. With a few clicks, you can connect your stores. ShipHero will download new products, as well as sync existing ones. When changes are made to your inventory all connected stores will be updated.
    Learn More
  • 5
    Project X

    Project X

    Originates from XTLS protocol, providing a set of network tools

    Project X is a powerful and extensible network proxy platform designed to provide advanced routing, tunneling, and traffic obfuscation capabilities. Originating from the XTLS protocol ecosystem, it serves as the core engine behind a wide variety of tools used for secure communication and bypassing network restrictions. The project supports multiple protocols such as VLESS, VMess, Shadowsocks, and Trojan, enabling flexible configuration for different networking scenarios.
    Downloads: 40 This Week
    Last Update:
    See Project
  • 6
    Sliver

    Sliver

    Adversary Emulation Framework

    Sliver is an open source cross-platform adversary emulation/red team framework, it can be used by organizations of all sizes to perform security testing. Sliver's implants support C2 over Mutual TLS (mTLS), WireGuard, HTTP(S), and DNS and are dynamically compiled with per-binary asymmetric encryption keys. The server and client support MacOS, Windows, and Linux. Implants are supported on MacOS, Windows, and Linux (and possibly every Golang compiler target but we've not tested them all).
    Downloads: 95 This Week
    Last Update:
    See Project
  • 7
    Freenet Core

    Freenet Core

    Declare your digital independence

    Freenet Core is the backbone of the Freenet Project, a peer-to-peer platform for censorship-resistant, anonymous publishing and communication. It is designed to provide strong privacy by routing requests through multiple nodes using a "darknet" architecture where users connect only to trusted peers. Data is stored in a distributed manner and automatically replicated based on demand. Freenet is optimized for users who want to securely share files, host anonymous websites (known as...
    Downloads: 17 This Week
    Last Update:
    See Project
  • 8
    Hysteria

    Hysteria

    Hysteria is a powerful, lightning fast and censorship resistant proxy

    ...It supports a wide range of use cases including SOCKS5 and HTTP proxying, TCP/UDP forwarding, Linux TProxy for network redirection, and even tunneling via TUN interfaces, making it a flexible choice for developers and network engineers needing robust remote access or traffic obfuscation. Because it’s implemented in Go and MIT-licensed, the project provides cross-platform builds for major operating systems and architectures, letting users deploy servers and clients for both personal and infrastructural purposes.
    Downloads: 20 This Week
    Last Update:
    See Project
  • 9
    Logbook

    Logbook

    An extensible Java library for HTTP request and response logging

    Logbook is an extensible Java library to enable complete request and response logging for different client- and server-side technologies. It satisfies a special need by a) allowing web application developers to log any HTTP traffic that an application receives or sends b) in a way that makes it easy to persist and analyze it later. This can be useful for traditional log analysis, meeting audit requirements or investigating individual historic traffic issues. Logbook is ready to use out of...
    Downloads: 12 This Week
    Last Update:
    See Project
  • All-in-One Inspection Software Icon
    All-in-One Inspection Software

    flowdit is a connected worker platform tailored for industry needs in commissioning, quality, maintenance, and EHS management.

    Optimize Frontline Operations: Elevate Equipment Uptime, Operational Excellence, and Safety with Connected Teams and Data, Including Issue Capture and Corrective Action.
    Learn More
  • 10
    V2Ray

    V2Ray

    Shell script that aims to make installing and managing V2Ray

    This repository offers an interactive, one-command script that installs and manages a V2Ray-based proxy service on common Linux distributions. It automates routine but error-prone steps such as fetching the latest binaries, generating credentials (for example, UUIDs), writing JSON config files, opening firewall ports, and setting up a systemd service for automatic start. The script includes a menu-driven manager to modify ports, protocols, and users, restart the service, or view logs without...
    Downloads: 39 This Week
    Last Update:
    See Project
  • 11
    crawler

    crawler

    Collection of JS reverse engineering examples for web scraping study

    crawler is a collection of web scraping and JavaScript reverse engineering examples designed for learning how modern websites protect their data and how those protections can be analyzed. It contains many case studies that demonstrate how to analyze and replicate request parameters, cookies, and encryption logic used by real websites. Each directory in the project focuses on a specific target service or scenario, showing how browser network requests and JavaScript code can be studied to...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    JavaScript Obfuscator

    JavaScript Obfuscator

    A powerful obfuscator for JavaScript and Node.js

    JavaScript Obfuscator is a Node.js library and CLI that transforms readable JavaScript into hardened, difficult-to-reverse code. It applies techniques such as identifier mangling, string array extraction/encoding, control-flow flattening, dead-code injection, and numeric literal transformations to disguise intent. Advanced options include self-defending code, domain locking, debug/console protection, and property key transformation, allowing you to tailor defenses to your threat model. The...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 13
    Alovoa

    Alovoa

    Free and open-source dating platform that respects your privacy

    This platform does not require you to pay any kind of fee, you can use all functions without limitations. We rely solely on your generous donations to keep this platform running. We believe in transparency, not obfuscation. Each line of code and each library used is free and open source, allowing everyone to see and improve on the platform if they so choose. We do not sell your information to third parties, we will always keep this promise. Furthermore, sensitive data is encrypted and secure even if there is a violation of data security. Ads slow down the browser, are intrusive, annoying, and can potentially inject malware into your device. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    PowerHub

    PowerHub

    A post exploitation tool based on a web application

    PowerHub is a PowerShell-based automation framework designed to centralize and orchestrate common administrative tasks across Windows environments. It exposes a modular command set for inventorying systems, managing services, deploying packages, and executing remote commands with consistent logging and error handling. The project places emphasis on discoverability and reuse: scripts are organized into reusable modules and functions with clear parameter contracts so teams can compose...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Optimus id transformation

    Optimus id transformation

    Id obfuscation based on Knuth's multiplicative hashing method for PHP

    With this library, you can transform your internal IDs to obfuscated integers based on Knuth's integer hash. It is similar to Hashids but will generate integers instead of random strings. It is also super fast. If you will be running your code on a 32-bit system or will be working with large prime numbers it is suggested that you install the GMP extension.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 16

    laravel-encoder

    The Laravel Encoder package provides a robust and secure way to encode

    The Laravel Encoder package provides a robust and secure way to encode and decode IDs & Strings using customizable Base encoding mechanisms (Base62). With support for variable-length encoding, mappers for added security, and seamless integration with Laravel, this package is ideal for obfuscating sensitive data or creating URL-safe identifiers.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    Naeon

    Naeon

    The safest way to store private data in untrusted (cloud) environments

    Naeon is a data encryption and sharding method designed to secure data in potentially untrusted off-site storage locations. It uses AES-256 encryption with a randomly generated passphrase, followed by obfuscation techniques to make the encrypted file unidentifiable. The data is then sharded into one private chunk containing the encryption key and part of the data, and multiple public chunks. Each chunk is renamed using its SHA-512 hash, and all chunks are timestamped equally. A filename conversion table is created to restore the concatenation order during a restore. ...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 18

    Simple Secure Vault Password Manager

    A simple password manager

    A secure, encrypted password vault application built with Rust and egui. ## Features - **Strong Encryption**: Uses AES-GCM-SIV for data encryption and Argon2 for password hashing - **Secure Storage**: All passwords and sensitive data are encrypted before storage in SQLite database - **Auto-clear Clipboard**: Automatically clears copied passwords from clipboard after configurable time - **Automatic Backups**: Scheduled daily backups to prevent data loss - **Modern GUI**: Clean,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Petoron-P2P-Messenger

    Petoron-P2P-Messenger

    minimalistic, secure and autonomous P2P messenger

    Petoron P2P Messenger (P-P2P-M) Architecture: Pure P2P - no servers, no databases Key storage: Keys generated in memory, never stored, erased after use Metadata: Only IP and port exist during the session - everything else is encrypted & obfuscated Encryption: PQS v1.2 - PBKDF2-HMAC-SHA256 (200k), BLAKE2s-MAC, custom stream cipher + fake padding Authentication: BLAKE2s-MAC (16 bytes) - instant failure on any data change Packet obfuscation: --stealth mode - padding, hidden structures Connection: Direct peer-to-peer only Anonymity: No accounts, logins, or phone numbers Third-party access: Impossible without physical access to both peers during session History: No storage — all in RAM, wiped on close Message size: Limited only by RAM & MTU — no artificial limits External dependencies: None DPI/blocking resistance: Harder to detect, can be masked Autonomy: Fully offline until peers connect 26.01.26 Add pqs_chat_tor.py github.com/01alekseev/Petoron-P2P-Messenger
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Mixin

    Mixin

    Mixin is a trait/mixin and bytecode weaving framework for Java

    ...Additional documentation for individual features and annotations can be found in the extensive Javadoc. For additional help use the channel #mixin on the Sponge Discord Server. For handling obfuscation tasks, Mixin provides an Annotation Processor which works at compile time to generate obfuscation mappings for your toolchain to apply. If using Gradle 5 or later, annotation processors are no longer automatically loaded from compile configurations and must be specified explicitly via annotationProcessor configurations.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 21
    BeaEngine 5

    BeaEngine 5

    BeaEngine disasm project

    BeaEngine is a C library designed to decode instructions from 16-bit, 32-bit and 64-bit intel architectures. It includes standard instructions set and instructions set from FPU, MMX, SSE, SSE2, SSE3, SSSE3, SSE4.1, SSE4.2, VMX, CLMUL, AES, MPX, AVX, AVX2, AVX512 (VEX & EVEX prefixes), CET, BMI1, BMI2, SGX, UINTR, KL, TDX and AMX extensions. If you want to analyze malicious codes and more generally obfuscated codes, BeaEngine sends back a complex structure that describes precisely the...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    V2Ray

    V2Ray

    V2Ray is a set of tools for building your own private network

    Project V is a set of tools to help you build your own privacy network over internet. The core of Project V, named V2Ray, is responsible for network protocols and communications. It can work alone, as well as combine with other tools.
    Downloads: 1,431 This Week
    Last Update:
    See Project
  • 23
    V2Ray Core

    V2Ray Core

    A platform for building proxies to bypass network restrictions

    V2Ray is the core of the Project V platform—a set of network tools for building custom proxy/VPN setups. It supports multiple protocols (VMess, SOCKS, Shadowsocks, HTTP, etc.), advanced routing, dynamic inbound/outbound connections, and is focused on privacy and bypassing censorship.
    Downloads: 106 This Week
    Last Update:
    See Project
  • 24
    Hikari

    Hikari

    LLVM Obfuscator

    ...Verifiable on his Keybase. Security is not now, and will never be based purely on Obscurity. The "Security Companies" might say so to sell more of their products. But no, binary obfuscation won't magically fix all your exploits and bugs, (If not introducing more). Designing an Obfuscator is hard, and keeping the source open definitely leaks the pattern to crackers which could potentially make the crackers' life easier if they have the right skillset. While every reasonable attempt has been made in Hikari to reduce such patterns from appearing, however, with overkill weapons like symbolic execution, binary obfuscation can still be defeated much easier, even so-called VM-based obfuscation. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 25
    Streisand

    Streisand

    Streisand sets up a new server running your choice

    ...With just a cloud provider account and basic Unix command-line knowledge, Streisand can provision a server and configure multiple VPN and proxy protocols almost automatically. This includes OpenVPN, WireGuard, Shadowsocks, OpenConnect, and Tor bridges, often with optional add-ons like obfuscation or stunnel to resist throttling and detection. The result is a private website that hosts client software downloads and setup instructions for easy access. Streisand supports major cloud providers like AWS, Azure, Google Cloud, Linode, DigitalOcean, and Rackspace, while also offering installation options for advanced users with their own servers.
    Downloads: 481 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next
MongoDB Logo MongoDB