Top 15 F* Alternative and Similar Softwares | Nov 2024

F* (pronounced F star) is an ML-like functional programming language aimed at program verification. Its type system includes polymorphism, dependent types, monadic effects, refinement types, and a weakest precondition calculus. Together, these features allow expressing precise and compact specifications for programs, including functional correctness properties. The F* type-checker aims to prove that programs meet their specifications using a combination of SMT solving and manual proofs. Programs written in F* can be translated to OCaml or F# for execution. ...

1. Agda

Agda Agda is a dependently typed functional programming language. It has inductive families, i.e., data types which depend on values, such as the type of vectors of a given length. It also has parametrised modules, mixfix operators, Unicode characters, and an interactive Emacs interface which can assist the programmer in writing......

2. Isabelle

Isabelle Isabelle is a proof assistant for writing and checking mathematical proofs by computer. It allows mathematical formulas to be expressed in a formal language and provides tools for proving those formulas in a logical calculus.......

3. FCorp Image Hijacker

FCorp Image Hijacker Image Hijacker is a small and easy to use application that allows you to run a program via another one to hide it from prying eyes.You can also use this program to "BLOCK Unwanted Programs" ( Updater, Malware, Keylogger, etc ).......

4. WinAuth

WinAuth WinAuth is a portable, open-source Authenticator for Windows that can be used as a 2FA including Bitcoin / crypto-currency websites, any service that requires the Google Authenticator, and games such as World of Warcraft, Diablo III, Guild Wars 2, Rift, ArcheAge. WildStar and Runescape.......

5. VPN.ac

VPN.ac Full features: https://vpn.ac/features Downloads and tutorials: https://vpn.ac/tutorials VPN.ac say:We provide a VPN service, but that is not what makes us a security company. Rather, what makes us a security company is much more than that: it is the fact that we carry out pentesting, do security audits, consulting,......

6. CryptoPhoto

CryptoPhoto CryptoPhoto implements 2-factor authentication using photographic images with bidirectional authentication during user logins. The photos and passcodes which are stored on end-user tokens are known only to the legitimate issuing organization. Because imposters cannot guess the photos it actively prevents victims from being tricked. Because passcodes are one-time used, they're......

7. ScreenWings

ScreenWings * protect up to six screens* very stable and portable application* minimalistic user interface allows easy use......

8. SharkSSL

SharkSSL The SSL/TLS and Certificate tutorial for Windows enables you to fast track your understanding of the SSL/TLS protocol, Certificate Management, and secure communication. The download includes many C source code examples, including a secure WebSocket tutorial. You can either compile the examples "as is" or modify them to suite your......

9. Pocket for Android

Pocket for Android Pocket allows you to safely store all your sensitive data such as bank account details and passwords on your phone. Pocket is also useful for remembering all those bits and pieces of information in one place from frequent flier numbers to contact lens prescriptions.SECURE YOUR INFORMATIONPocket is all about security.......

10. DigiVault

DigiVault DigiVault is a portable, file-based encryption software for WindowsDigiVault helps you create and manage encrypted file containers or repositories for storing confidential files. To encrypt, simply drag and drop files or folders in the repository. To decrypt, just export the files or folders to your chosen storage location.DigiVault comes in......

11. VBLock

VBLock VBLock is a secure, customization alternative to the built-in Windows lock screen. Its exclusive highlights not found in other programs include securely signing in with two-step authentication, a beautiful Aero Glass background, and a simple, clean interface.......

12. Hyper Crypt

Hyper Crypt Hyper Crypt is a multi-purpose cryptographic tool:* file-encryption: AES-256* text-encryption: AES-256, RSA and One-Time Pad* file- and text-hashing: SHA-1, SHA-256, SHA-384, SHA-512, HMAC-SHA-256, HMAC-SHA-384 and HMAC-SHA-512* password/key-generation: symmetric and (RSA 2048 - 8192) asymmetric.......

13. Coq

Coq Coq is a proof assistant, which allows you to write mathematical proofs in a rigorous and formal way, and have them checked for correctness by the computer. It also allows programming with proofs of correctness for the code, and dependent types.......

14. Anonimo VPN

Anonimo VPN Anonimo VPN aims to provide a completely free, high-privacy virtual private network service to anyone and everyone without logging any user information!......

15. CamDesk

CamDesk CamDesk is a free, open source, desktop webcam widget, that was created as home surveillance application. Although others have used it for demonstrations even with CamStudio, and QuickTime Player for screen casting.......