Open Source Haskell Security Software

Haskell Security Software

View 5020 business solutions

Browse free open source Haskell Security Software and projects below. Use the toggles on the left to filter open source Haskell Security Software by OS, license, language, programming language, and project status.

  • Analyze and gain insights into the current state of your data. Icon
    Analyze and gain insights into the current state of your data.

    Built on a modular architecture, OpenDQ scales with your enterprise data management needs.

    Infosolve’s Zero Based Solutions provide clients with comprehensive data solutions that leverage the power of their enterprise data to achieve their business objectives and create strategic opportunities-- without the burdens of cumbersome licensing agreements, complex term contracts and expensive hardware requirements. Infosolve Technologies embodies its Zero Based Solutions in every project with the Zero defect data guarantee, assuring that all results are free from new data errors and inconsistencies.
  • The sales CRM that makes your life easy, so all you have to do is sell. Icon
    Welcome to the simpler way to sell. Pipedrive is CRM software that makes your life easy, for less legwork and more sales. Let us track your sales conversations, eliminate admin tasks, get you more leads and uncover how you win, because your day belongs to you. Join more than 100,000 sales teams around the world that use the CRM rated #1 by SoftwareReviews in 2019. Start your free 14-day trial and get full access – no credit card needed.
  • 1
    FreeArc combines best 7-zip and RAR features: auto-selected LZMA/PPMD/Multimedia compression, 1gb dictionary, exe/dict/delta data filters, updatable solid archives, SFXes, recovery record, AES+Twofish+Serpent encryption, Linux support and much more...
    Leader badge">
    Downloads: 560 This Week
    Last Update:
    See Project
  • 2
    SimpleX

    SimpleX

    The first messaging platform operating without user identifiers

    Other apps have user IDs: Signal, Matrix, Session, Briar, Jami, Cwtch, etc. SimpleX does not, not even random numbers. This radically improves your privacy. The video shows how you connect to your friend via their 1-time QR-code, in person or via a video link. You can also connect by sharing an invitation link. Temporary anonymous pairwise identifiers SimpleX uses temporary anonymous pairwise addresses and credentials for each user contact or group member. It allows to deliver messages without user profile identifiers, providing better meta-data privacy than alternatives. Many communication platforms are vulnerable to MITM attacks by servers or network providers. To prevent it SimpleX apps pass one-time keys out-of-band when you share an address as a link or a QR code. Double-ratchet protocol. OTR messaging with perfect forward secrecy and break-in recovery. NaCL cryptobox in each queue to prevent traffic correlation between message queues if TLS is compromised.
    Downloads: 24 This Week
    Last Update:
    See Project
  • 3
    xdg-ninja

    xdg-ninja

    A shell script which checks your $HOME for unwanted files

    A shell script that checks your $HOME for unwanted files and directories. When xdg-ninja encounters a file or directory it knows about, it will tell you whether it's possible to move it to the appropriate location, and how to do it. The configurations are from the arch wiki page on XDG_BASE_DIR, antidot.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    PortFusion

    PortFusion

    Distributed reverse / forward proxy and tunneling solution for TCP.

    PortFusion is a minimalistic, cross-platform, transport-layer distributed reverse / forward proxy for TCP written in Haskell + LLVM and released under GPLv3. A single package that makes the most of each platform by tapping into their unique capabilities, combining this power with an intuitive interface, beautiful design and Haskell's excellent support for unprecedented levels of concurrency and parallelism. It strives for the smallest source code size (< 500 lines) while delivering maximum throughput with near zero overhead.
    Downloads: 17 This Week
    Last Update:
    See Project
  • Video interviewing software and assessments to help you gain an advantage by hiring the right talent Icon
    Jobma's cloud-based Video Interviewing solution increases your teams productivity, flexibility and creates a great candidate experience which will bring your hiring team and talent closer together by breaking down the barriers of time and location. Using Jobma you can setup Pre-recorded & Live Video Interviews. Our video interviewing increases your recruiter productivity and improves your candidate experience. Jobma offers free ATS Integrations and is available in 14 languages.
  • 5
    Cardano SL

    Cardano SL

    Cryptographic currency implementing Ouroboros PoS protocol

    Cryptographic currency implementing Ouroboros PoS protocol. The cardano-node is the top level for the node and aggregates the other components from other packages: consensus, ledger and networking, with configuration, CLI, logging and monitoring. The node no longer incorporates wallet or explorer functionality. The wallet backend and explorer backend are separate components that run in separate external processes that communicate with the node via local IPC. The new Cardano implementation consists of more granular components.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Linux Notification Center

    Linux Notification Center

    A notification daemon/center for linux

    A haskell-written notification center for users that like a desktop with style. The notification center receives notifications via DBUS (like any notification daemon) and shows them in the upper right corner of the screen. The notification (if not specified in the notification otherwise) will also be shown in the notification center even after the notification disappeared by itself. The notifications can be clicked to make them disappear. Notifications can be replaced by the use of the replaces-id feature of the notification specification. The notification center can (optionally) show user-specified buttons in the bottom that can be in two states (highlighted/not highlighted) and that can run customizable shell commands.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    LiquidHaskell

    LiquidHaskell

    Liquid Types For Haskell

    This is the development site of the LiquidHaskell formal verification tool. If you're a LiquidHaskell user (or just curious), you probably want to go to the documentation website instead. LiquidHaskell (LH) refines Haskell's types with logical predicates that let you enforce important properties at compile time. LH warns you that head is not total as it is missing the case for [] and checks that it is total on NonEmpty lists. The input contract propagates to uses of head which are verified by ensuring the arguments are NonEmpty. LH lets you avoid off-by-one errors that can lead to crashes or buffer overflows. Dependent contracts let you specify, e.g. that dotProduct requires equal-sized vectors. LH checks that functions terminate and so warns about the infinite recursion due to the missing case in fib.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Random Password Generator written in Haskell. It provides easy command-line interface for generating passwords. Options include: number of passwords, random password length, allowed characters.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Soutei is a trust-management system for access control in distributed systems. Soutei policies and credentials are written in a declarative logic-based language. Soutei policies are modular, concise, readable, supporting conditional delegation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Remote Network Monitoring and Management for an IoT World Icon
    Domotz is the premier Remote Network Monitoring and Management platform for IoT. We offer powerful network management software for MSP's, Integrators, Security Professionals, and Business Owners. Domotz enables the complete solution to cost-effectively manage and monitor your customers’ networks with plug and play setup, a friendly UX, and a comprehensive feature set, accessible from any desktop browser or mobile device. Utilize one interface to manage multiple networks at multiple locations anywhere in the World. One person can deploy remote monitoring and management in less than 15 minutes.
  • 10
    This is the extended euclidean algorithm implemented in haskell. It will put every single step of the algorithm in a file and show the actual result and everything in between.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next