Search Results for "message encryption" - Page 3

Showing 109 open source projects for "message encryption"

View related business solutions
  • Business Continuity Solutions | ConnectWise BCDR Icon
    Business Continuity Solutions | ConnectWise BCDR

    Build a foundation for data security and disaster recovery to fit your clients’ needs no matter the budget.

    Whether natural disaster, cyberattack, or plain-old human error, data can disappear in the blink of an eye. ConnectWise BCDR (formerly Recover) delivers reliable and secure backup and disaster recovery backed by powerful automation and a 24/7 NOC to get your clients back to work in minutes, not days.
  • Simplify Purchasing For Your Business Icon
    Simplify Purchasing For Your Business

    Manage what you buy and how you buy it with Order.co, so you have control over your time and money spent.

    Simplify every aspect of buying for your business in Order.co. From sourcing products to scaling purchasing across locations to automating your AP and approvals workstreams, Order.co is the platform of choice for growing businesses.
  • 1

    RSE

    Email Encryption using HYBRID Encryption RSA+AES

    Repository of code for sending and encrypting email using Python v3.4 . Due to RSA algorithm's limits, it uses AES to encrypt the message and subject of the email. It creates a .PEM for every new user login. And then RSA to Encrypt the AES Key. The basic UI has been created with PyQt5. PyCrypto and Crypto libraries have been used. Visual Studio was used as the primary IDE. This code has still some flaws. Any kind of contribution would be greatly appreciated.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    BlackBoxSocket

    My twist to a Java based secure layer for socket communication.

    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    SSH Client Library for .Net

    Client library utilizing the Secure Shell protocol for .Net

    ... Encryption: AES128, 192, and 256, and TripleDES in Counter or CBC mode, Cast128 and Blowfish in CBC mode, and TripleDES in EBC mode Authentication: Password, PublicKey (OpenSSH DSS, RSA, and ECDSA, PuTTy DSS, and RSA) Message Authentication: HMAC using SHA256, 384, and 512, SHA1, RipeMD160, MD5, MD5-96, and SHA1-96.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    CrypSten

    A Hybrid Cryptosystem with Steganography DLL

    A library written in Visual C# for encrypting a text message into an image file, and decrypting an image file to get the text message using Rijndael Algorithm, RSA Algorithm, and LSB Substitution Algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Recruit and Manage your Workforce Icon
    Recruit and Manage your Workforce

    Evolia makes it easier to hire, schedule and track time worked by frontline in medium and large-sized businesses.

    Evolia is a web and mobile platform that connects enterprises with 1000’s of local shift workers and offers free workforce scheduling and time and attendance solutions. Is your business on Evolia?
  • 5
    Telegram

    Telegram

    Telegram Messenger

    ... privacy, we've added Secret Chats, featuring end-to-end encryption to ensure that a message can only be read by its intended recipient. When it comes to Secret Chats, nothing is logged on our servers and you can automatically program the messages to self-destruct from both devices so there is never any record of it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    fai03a6

    fai03a6

    Free Anonymous Internet - Anonymous P2P content sharing network

    Φ system is a new generation Anonymous P2P content sharing network. Now you have chance to anonymously publish any content you want. No one can censor, edit or delete your post ever. To chat with anyone on Φ system is always encrypted by your own keys and no third person can decrypt your message. It is also possible to sell goods on Φ system anonymously, and you’ll receive Φ coin instantly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Text Encryption and Decryption

    Text Encryption and Decryption

    Anoncrypt-Text Encryption and Decryption Website in Java(Struts2)

    Anoncrypt by HTCoders is a web based Text Encryption and Decryption Project using Java Technology following Struts2 Framwork . It Consist of two modules > Password based Encryption (Symmetric Encryption) > Self-Destructible Message Service (Once the message is read , it is destroyed and cant be decrypted again .)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    TEncryptor

    TEncryptor

    Privacy, Security, no one will read your message again with this app

    TEncryptor Open Source app Written in Python3 and PyQt4 Licensed under the MIT License When you encrypt a text file or message The User need to choose 3 things 1- Password 2- The order of the letters 3- Four letter/word with specified order
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Enigma_3

    A substitution-based encryption algorithm for binary data or text

    Enigma3 is a substitution-based encryption algorithm that can be applied to binary or text data and results in far greater security than traditional encryption. An electronic dictionary of words is employed and numeric codes are then assigned to each word within the dictionary. Communications are coded as a set of numeric codes which can then only be translated back into the original message by using the original coded dictionary. This is not an encryption method in the commonly accepted...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
  • 10
    This is a chat system composed of a TCP/IP server daemon and its corresponding java client. You can chat with other peers in clear text or AES password-based encryption on your own computer network. The AES encryption and decryption is based on 128 bit key which is reached by padding the resulting SHA256 from your provided password. Simply put, SHA is a checksum that change when a single bit change. When you send a message with a password field, the resulting password checksum is cut at 128...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    akmos

    Cryptography toolset

    Command line utility for encryption/decryption files, computing message digests
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    Arduino Monitoring by Sensors2Cloud

    Remote Monitoring of Arduino from the Cloud

    LabScript by Sensors2cloud is a browser-based Tool that allow the user to remotely monitor multiple Arduino devices over the internet. LabScript makes it really easy to monitor any number of Arduinos you have over the internet in 5 easy steps: 1) Sign up for a developer account at http://developer.sensors2cloud.com/register/ 2) Download the Arduino sketch from SourceForge 3) Connect an Ethernet Shield to your Arduino 4) Upload the Sketch into your Arduino 5) Follow the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    mqnic - virtual link layer for qemu/kvm

    Low latency, high bandwidth IP for virtual machines

    ... to provide low latency, high bandwidth IP support for virtual data centers while simplifying the provisioning of hosted IP. Because the Message Queue NIC appears as a standard IP device on the target machine the integration of MQNIC and traditional IP routing is completely managed by the standard IP routing tools and infrastructure. Transport security is handled by the MQ server which supports multiple levels of encryption and authentication.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    AleHu

    AleHu

    Encrypting, anonymous, unlimited size message transfer system

    AleHu is an open source encrypted message transfer system that encompasses both server (PHP) and client software (Java). Give it a shot: You can try out AleHu by simply running the client using the preconfigured AleHu test server! For further details and instructions on how to quickly install and run AleHu, have a look at the documentation in the Wiki section.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    cdmessenger

    cdmessenger

    Advanced Instant Office Messenger Software by CDMesseger

    ... all the chat messages with 256 bit SSL encryption. CDMessenger produces chat transcripts which you can both review and archive. Your employees can chat with each other, with a group such as a department or a project team, or with the entire organization. Download CDMessenger today and provide your employees with a new communication channel that is known to improve office productivity and efficiency.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    SES Super-Encypherment Scrambler

    SES Super-Encypherment Scrambler

    SES brings back the uncrackable onetime pad, with a digital twist.

    SES brings back the uncrackable onetime pad, with a digital twist. It is well known that a random key of message-length is the only provably unbreakable cipher. SES uses cryptographic strength pseudo-random keys of message-length for its many encipherments, in addition to offering true one-time pad capability for the intrepid. SES is built on ISAAC, Bob Jenkins' unbroken CSPRNG, a fast and simple stream cipher placed in the Public Domain in 1996. SES now gives you the ability...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    The MOTET Cipher & SE Scrambler

    The MOTET Cipher & SE Scrambler

    A tiny, fast encryption tool in C

    MOTET is a tiny, fast super-encipherment application written in C, featuring the new CSPRNG/stream ciphers MOTE and BEDBUG in each of their three variants, as well as the "gold standard" among ciphers, ISAAC. MOTET brings multiple levels of encryption, including a ciphertext-hash, a Vigenere mixing function, a choice of Caesar MOD or Caesar MIX ciphering on the primary key-stream, plus a deeply scrambled "outer shell" as a final super-encryption stage. A unique nonce IV guarantees that each...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Crystal_IRC

    Encrypt IRC Communications with OTP and AES

    Project based on Open Source cshivers project hosted on: https://github.com/cshivers/IrcClient-csharp With Crystal_IRC you can transparently chat securely with others, thanks to One Time Pad for messages and AES for key exchange. The key for One Time Pad encryption is generated for each message and is encrypted with AES. The "passphrase" for AES key encryption is "coded" in "Master.txt" file which is included in the zip file. You can send encrypted channel messages or private messages...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    E-mail Notifier

    E-mail Notifier

    New e-mail information

    This windows program checks for new e-mail periodically. The program installs as the startup application and shows new e-mail icon in taskbar. The program uses POP3 with SSL ports to connect. External libraries: - AES (adriancs, http://www.codeproject.com/Articles/769741/Csharp-AES-bits-Encryption-Library-with-Salt), - Nini (Brent R. Matzelle, http://nini.sourceforge.net/), - Pop3MailClient (Peter Huber, http://www.codeproject.com/Articles/14304/POP3-Email-Client-NET-2-0...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    ISC - The ISAAC Stream Cipher

    ISC - The ISAAC Stream Cipher

    ISC lets you encrypt & decrypt text and files of any type up to 4GB

    ..., on a key-phrase of any complexity. ISC is a symmetric key encryption system, which means that both the sender and recipient of a message must possess the key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    XOR encrypt v2.0

    XOR encrypt v2.0

    Encrypt Your Text documents with XOR encryption

    This software provides an easy graphical way to encrypt your text documents from source code , text files ,scripts even jpeg files .It is a enhanced version of my earlier project https://sourceforge.net/p/xorencrypt which used win32 GUI . This is a demonstration of working of XOR encryption which was used by Germans in World War II (http://en.wikipedia.org/wiki/Lorenz_cipher) . Besides from XOR'ing the message with password after every encryption the key changes pseudorandomly...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    Bigram Table Generator

    Bigram Table Generator

    A program to generate random reciprocal bigram tables

    A command-line program to encrypt/decrypt a message using a random reciprocal bigram table and write a bigram table to a text file. Executing the program without any command-line arguments starts bigram in message encryption/decryption mode. The program prompts for a password or passphrase and a message to encrypt/ decrypt. After the message is entered the ciphertext is displayed. Executing the program with command-line arguments causes bigram to generate a random bigram table to print...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Cloudture

    Cloudture is encryption using xor and one-time pads

    How does CLOUDTURE work? Cloudture is basically just a wrapper around the xor bitwise operator, in C this is the circumflex ^. It makes working with xor safer and fun. Why CLOUDTURE? The news has made us aware that the intelligence services are storing huge amounts of data. The question is, how can we make good use of this huge storage capacity? I suggest to use the real, possibly subliminal, message as the key to encode your "secret" messages, with the full expectation...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    TextShade

    TextShade

    Strong text encryption app with web-based decryptor.

    Have information that’s for your eyes only? Add some more peace of mind. Want to send a message to someone securely? It's never been easier.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    EnigmaGPG Community

    EnigmaGPG Community

    Sending encrypted data through internet web applications.

    ... such as social networks, blogs, forums, etc. Very easy in three steps: Send Messages: 1 - Write a messages 2 - With the right mouse button, select enigma cipher 3 - Send the encrypted message Recieve Messages: 1 - Select the message 2 - With the right mouse button, select enigma decrypt Support Tickets: https://sourceforge.net/p/enigmagpg/tickets/
    Downloads: 0 This Week
    Last Update:
    See Project