Showing 7 open source projects for "obfuscation"

View related business solutions
  • Get full visibility and control over your tasks and projects with Wrike. Icon
    Get full visibility and control over your tasks and projects with Wrike.

    A cloud-based collaboration, work management, and project management software

    Wrike offers world-class features that empower cross-functional, distributed, or growing teams take their projects from the initial request stage all the way to tracking work progress and reporting results.
    Learn More
  • Data management solutions for confident marketing Icon
    Data management solutions for confident marketing

    For companies wanting a complete Data Management solution that is native to Salesforce

    Verify, deduplicate, manipulate, and assign records automatically to keep your CRM data accurate, complete, and ready for business.
    Learn More
  • 1
    Logbook

    Logbook

    An extensible Java library for HTTP request and response logging

    Logbook is an extensible Java library to enable complete request and response logging for different client- and server-side technologies. It satisfies a special need by a) allowing web application developers to log any HTTP traffic that an application receives or sends b) in a way that makes it easy to persist and analyze it later. This can be useful for traditional log analysis, meeting audit requirements or investigating individual historic traffic issues. Logbook is ready to use out of...
    Downloads: 12 This Week
    Last Update:
    See Project
  • 2
    V2Ray

    V2Ray

    Shell script that aims to make installing and managing V2Ray

    This repository offers an interactive, one-command script that installs and manages a V2Ray-based proxy service on common Linux distributions. It automates routine but error-prone steps such as fetching the latest binaries, generating credentials (for example, UUIDs), writing JSON config files, opening firewall ports, and setting up a systemd service for automatic start. The script includes a menu-driven manager to modify ports, protocols, and users, restart the service, or view logs without...
    Downloads: 39 This Week
    Last Update:
    See Project
  • 3
    V2Ray

    V2Ray

    V2Ray is a set of tools for building your own private network

    Project V is a set of tools to help you build your own privacy network over internet. The core of Project V, named V2Ray, is responsible for network protocols and communications. It can work alone, as well as combine with other tools.
    Downloads: 1,431 This Week
    Last Update:
    See Project
  • 4
    Simplify

    Simplify

    Android virtual machine and deobfuscator

    Simplify virtually executes an app to understand its behavior and then tries to optimize the code so that it behaves identically but is easier for a human to understand. Each optimization type is simple and generic, so it doesn't matter what specific type of obfuscation is used. Provides a virtual machine sandbox for executing Dalvik methods. After executing a method, it returns a graph containing all possible register and class values for every execution path. It works even if some values are unknown, such as file and network I/O. For example, any if or switch conditional with an unknown value results in both branches being taken. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Securden Privileged Account Manager Icon
    Securden Privileged Account Manager

    Unified Privileged Access Management

    Discover and manage administrator, service, and web app passwords, keys, and identities. Automate management with approval workflows. Centrally control, audit, monitor, and record all access to critical IT assets.
    Learn More
  • 5
    Miasm

    Miasm

    Reverse engineering framework in Python

    The Miasm intermediate representation is used for multiple task: emulation through its jitter engine, symbolic execution, DSE, program analysis, but the intermediate representation can be a bit hard to read. We will present in this article new tricks Miasm has learned in 2018. Among them, the SSA/Out-of-SSA transformation, expression propagation and high-level operators can be joined to “lift” Miasm IR to a more human-readable language. We use graphviz to illustrate some graphs. Its layout...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    GSnova

    GSnova

    Private proxy solution & network troubleshooting tool

    ...It acts as a multi-protocol client/server proxy that can tunnel traffic over TLS, WebSocket, KCP, QUIC, and SSH. GSnova is optimized for resilience and speed under restrictive network conditions and supports multiple fronting strategies and obfuscation techniques. It's particularly suited for users in highly censored environments and developers building resilient networking tools.
    Downloads: 17 This Week
    Last Update:
    See Project
  • 7
    Yet another Java obfuscation tool. This one has a bit of a different twist, in that it can obfuscate native methods by generating a .h file which #defines the original method names to the obfuscated ones. Built with Apache BCEL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB