Browse free open source C# Security Software and projects below. Use the toggles on the left to filter open source C# Security Software by OS, license, language, programming language, and project status.

  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    Cryptex
    Cryptex is a fast and simple easy to use open source software for encryption and decryption of files and folders. The software has a proprietary format for password management. Cryptex use AES and TripleDES algorithms.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 2
    KeyCounter is a tool for the tray-bar that helps you to get statistics about the useage of your computers keyboard, mouse and uptime. KeyCounter is not intended to work as a keylogger.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3
    Start Menu Cleaner organizes your links in the Windows Start Menu. It also have many functions to maintain security and performances of your Windows system (services, autorun...).
    Downloads: 4 This Week
    Last Update:
    See Project
  • 4
    Caditor is a portable tabbed text editor featuring encryption, syntax highlighting, autocomplete, line numbering and a functional plugin system.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • 5
    Arcanum Editor
    The Arcanum Editor is a small but powerful tool to encrypt and decrypt messages. The program also comes with it's own format CTXT. This format is based on XML and allows you to save texts with the Advanced Encryption Standard.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    EIDNative Library is a freeware SDK for Belgian Electronic ID Card. EIDNative Library includes native API for: * Microsoft .NET * Native Win32 * Visual Basic 6.0 and VBA * Java (only Windows platform)
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    Debaser is a powerful password generator which has plans to be turned into a password manager.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    FIRECOPS++ is a firewall, connection tracker and packet customizer system for Microsoft Windows developed under the .NET framework.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    KeePassGtk

    Gtk-based Password Manager

    KeePassGtk is a Gtk+-based password manager intended to be fully compatible with KeePass2 file format. It incorporates KeePass2 original code to achieve such compatibility while aiming to provide a look and feel more native to Linux desktop environments based in Gtk+.
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 10

    LockyMonitor

    Windows Service to check if files has been changed by ransomware

    Windwos Service to check if files has been changed by crypto ransomware. It does not prevent from ransomware infection! Don't use it in productive environments to prevent data loss! The Software comes without any warranty. If files has been changed it send a email and shutdown or disconnect the host or stop the server (LanmanServer) service to disconnect all shares on the server. The FileSystemWatcher object raises the events for the files in the monitored target folder. If a file in the monitor folder is changed by a user or programm a false alarm will be raised! It checks the MD5 hash of the monitor files for file changes. c# source is included in the zip file It uses the FileSystemMonitor class. The project is inactive because the software cant prevent against an infection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    LockyMonitorConsole

    Console app to check if files has been changed by crypto ransomware

    Console application to check if files has been changed by crypto ransomware like Locky. It does not prevent from ransomware infection! Don't use it in productive environments to prevent data loss! The Software comes without any warranty. If files has been changed it send a email and shutdown or disable the network interfaces of the host. It runs under the user account and monitor drives which are connected to a server share. Works with remote to local Symlinks on a server share. Can map and monitor drives by using the subst or net use command. Can monitor multiple folders or drives. It communicates with a Windows LockyDisconnectService to disable all physical Network Interfaces (NICs). Use the commandline Parameter: -q to hide the console -i to add the console to windows autorun and install LockyDisconnectService c# source is included in the zip file It uses the FileSystemMonitor class. The Project is inactive because it can't protect against ransomware
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    NETsoak

    .NET Framework easy protection software

    NETSOAK 472 - easy protection for the .NET Framework 4.7.2 applications. Type for help: netsoak472.exe /?
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Simple Encoder/Decoder, written in the .net framework. It is basicly an encryption program which supports serveral encryption methods. It can encode or decode texts in the forms of files or just plain text written directly in the program.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    SimpleHNC

    Very Simple Hash value calculater and Checksum Tool

    You can use this program to calculate your file Hash value, also you can use this to verify the file you had downloaded.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    LockyService

    Windows Service to monitor file events for crypto ransomware

    Windows Service to monitor drive c: for file events with crypto specific file extensions or with big file entropy. It does not prevent from ransomware infection! Don't use it in productive environments to prevent data loss! The Software comes without any warranty. When a alarm is triggerd it send a email and shutdown the host or disable the network interfaces. The alarm can be triggerd if locky extensions were found. Or if files were probably encrypted (big file entropy level). Or if a file event counter exceeds the allowed number of events in a certain periode of Time. Or if the the file extension does not represent a valid file because it has been encrypted. c# source is included in the zip file It uses the FileSystemMonitor class. The Project is inactive because the software cant prevent against an infection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next