Suggested Categories:

VIN Decoders
VIN decoders are software tools that interpret Vehicle Identification Numbers to extract detailed information about a vehicle. They decode standardized VIN data to reveal details such as manufacturer, model, year, engine type, trim level, and country of origin. These tools are widely used by automotive dealers, insurers, fleet managers, and marketplaces to verify vehicle identity and specifications. VIN decoders also help detect discrepancies, support compliance checks, and streamline vehicle data enrichment. By turning VINs into structured vehicle insights, they improve accuracy and efficiency across automotive workflows.
Locksmith Software
Locksmith software assists locksmith companies with the process of managing customers, inventory, schedules, billing, sales and all business operations.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.

8 Products for "hex decoder" with 2 filters applied:

  • 1
    FileAlyzer
    ...FileAlyzer makes the additional information in these streams visible through a list of streams associated with the current file, and a basic hex viewer. Sometimes, malware attaches itself as a custom stream to legit files, and can be identified here. Android apps are actually zip archives that include the app code and many resources and configuration files. FileAlyzer will display a few app properties.
  • 2
    X-Ways Forensics
    ...X-Ways Forensics is fully portable and runs off a USB stick on any given Windows system without installation if you want. Downloads and installs within seconds (just a few MB in size, not GB). X-Ways Forensics is based on the WinHex hex and disk editor and part of an efficient workflow model.
    Starting Price: $18,589
  • 3
    ClamAV

    ClamAV

    ClamAV

    ...It provides many utilities for users, including a flexible and scalable multi-threaded daemon, a command-line scanner, and an advanced tool for automatic database updates. Built-in support for various archive formats, including ZIP, RAR, Dmg, Tar, GZIP, BZIP2, OLE2, Cabinet, CHM, BinHex, SIS, and others.
  • 4
    Actix Analyzer
    Enables per-session and per-OTT service type analysis for finding the cause of service performance problems affecting OTT services such as Facebook, Youtube and Whatsapp; and understanding when and where network features were available and used. Provides full IP layer decode and session analysis for building tailored KPIs. Enables validation of the indoor network and its interaction with the macro network. Geo-references RF measurements and events and visualizes venue layout. Generates KPI reports to evaluate the readiness of the in-building network ahead of launch. The world’s leading chipset and handset manufacturers use Actix Analyzer to validate the performance of new devices against a reference device. ...
  • 5
    DeCYFIR

    DeCYFIR

    CYFIRMA

    ...We correlate data against your industry, geography and technology to give you remediation recommendations, prioritized for swift actions. Quality cyber intelligence requires deep technology to decode signals from a multitude of sources. By converting discovery to useful insights, the Threat Visibility and Intelligence module is the essential cybersecurity ammunition to keep any organization’s security posture robust. The threat visibility and Intelligence module is a powerful platform where data is collected, analyzed, correlated against key attributes and presented in a format where both security practitioners and business leaders can take decisive actions.
  • 6
    XRY

    XRY

    MSAB

    XRY by MSAB is a mobile-device forensics extraction solution that enables investigators to securely and efficiently access, extract, and preserve digital evidence from smartphones, tablets, and other mobile devices. It supports a wide and growing range of devices, unlock and bypass features (including passcode bypass and chip-level support for difficult devices), full decoding of app data (such as WhatsApp, Facebook, Instagram, Viber), browser history (Safari, Chrome, Opera), and location/timeline correlation across sources. It is built with full chain-of-custody and evidential integrity in mind, including a secure XRY forensic file format with encryption and auditing, while offering access both at the frontline (scene) and in the lab. ...
  • 7
    Arpio

    Arpio

    Arpio

    ...With Arpio, you’re prepped with a recovery environment your adversaries can’t touch, ready to switch on like a backup generator. No automation to write, and no AWS docs to decode. You can have DR in place today. Automatic replication, change detection, and real-time alerts. This is your DR on autopilot. Recover quickly from outages. Recover safely from ransomware. Unlike traditional DR tools, Arpio recognizes and replicates everything your cloud workloads need to run.
    Starting Price: $12,000 per year
  • 8
    NexVision

    NexVision

    NexVision Lab

    ...NexVision's AI/ML-powered engine continuously collects, analyzes, and sorts big data from publicly available databases and the deep web, supporting multiple languages and equipped with natural language processing and steganography-decoding capabilities to detect hidden information used by advanced threat actors. The user-friendly dashboard allows for setting keyword alerts, conducting investigations, and analyzing results while maintaining user anonymity. NexVision enables organizations to proactively safeguard their assets and maintain a secure online environment.
    Starting Price: Free
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB