Search Results for "256-bit aes bruteforce" - Page 8

Showing 188 open source projects for "256-bit aes bruteforce"

View related business solutions
  • Safety Management Platform | SafetyIQ Icon
    Safety Management Platform | SafetyIQ

    Keep your workers safe, no matter where they are

    SafetyIQ is revolutionizing the way businesses approach safety. As a leading provider of comprehensive workplace safety software, we cater to four key areas: Mobile Worker Safety, EHS (Environment, Health, and Safety), Fatigue Management, and Training. Our platform is designed to safeguard your workers, no matter their location or task, ensuring all-around safety compliance. Unlike most safety software providers that only react to incidents or implement proactive measures, SafetyIQ introduces a third pillar to safety management - predictive analytics. We transform the untapped wealth of safety data within your organization into actionable insights to inform safety strategies, mitigating risks even before they aris
  • PMG Low-Code Automation Platform Icon
    PMG Low-Code Automation Platform

    For companies of all sizes interested in a low-code and digital process automation platform

    PMG is a low-code software platform that allows users to configure automation solutions and business applications to drive digital transformation initiatives. From streamlining business processes through automation, to integrating existing systems and filling in point solution functionality gaps, to delivering a collaborative workspace and unified user experience – PMG’s low-code platform does it all without coding. Business users as well as IT resources are empowered to configure, deploy, and maintain solutions that meet their company’s specific needs.
  • 1
    The software implements an adaptive steganography algorithm called Adaptive Minimum Error Least Significant Bit Replacement(AMELSBR) along with AES 128, 192 and 256 bit cipher for 24-bit bitmap files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    CryptKit is a small, fast cryptographic toolkit for python. It implements Rijndael(AES), SHA 256, Elliptic Curve PKI, Diffie-Hellman key exchange and Nyberg-Ruppel signature/verification. Comprehensive enough to provide a secure socket alternative to SSL
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    A tight python crypto module implementing only the latest and greatest: Rijndael (AES) symmetric cipher in 128, 192 and 256 bits supporting password encryption, SHA 256 and several CSPRNG schemes in pure python.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Encrypt Flash Drive in Windows 10

    One-click to encrypt flash drive, USB drive and hard disk in Windows.

    The flash drive encryption tool is the professional encryption software that encrypts USB drives. It uses the most common encryption algorithms such as AES 256-bit to encrypt flash drive in Windows 10. It encrypts the entire USB drive, the encrypted files will be hidden, and you will only be able to access them if you run the encryption program in the encrypted flash drive and enter the correct password. In addition to the USB drive, this software can also secure other removable storage drives...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Network Performance Monitoring | Statseeker Icon
    Network Performance Monitoring | Statseeker

    Statseeker is a powerful network performance monitoring solution for businesses

    Using just a single server or virtual machine, Statseeker can be up and running within minutes, and discovering your entire network in less than an hour, without any significant effect on your bandwidth availability.
  • 5
    AtariST-HD-Info

    AtariST-HD-Info

    An example Atari ST C program to demonstrate simple GEM/AES /w RCS

    AtariST-HD-Info An example Atari ST C program to demonstrate simple GEM/AES programming using a resource file. Display disk information on Atari 16-bit ST * support and other inquiries can be made on our BBS at: $ telnet 13leader.net 8023 Fork our Git @ https://github.com/pjones1063
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    AtariST-Date-Prompt-Dialog

    AtariST-Date-Prompt-Dialog

    An example Atari ST C program to demonstrate simple GEM/AES

    AtariST-Date-Prompt-Dialog An example Atari ST C program to demonstrate simple GEM/AES programming using a resource file. Displays a date picker dialog window and returns selected date. * support and other inquiries can be made on our BBS at: $ telnet 13leader.net 8023 Fork our Git @ https://github.com/pjones1063
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    Simple Encrypt

    Simple Encrypt combines RSA encryption with AES to encrypt text files.

    RSA (Rivest-Shamir-Adleman) is a public-key encryption algorithm with a typical key size of 1,024 to 4,096 bits. 2 large primes are required to generate the keys. AES (Advanced Encryption Standard) is based on Rijndael, secret-key encryption algorithm using a block cipher with key sizes of 128, 192, or 256 bits. Simple Encrypt will take a text file, generate keys and then encrypt it. The output is the ciphertext and keys. Note: Realistically, I will keep the algorithms simple(r...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Cryptofon

    Cryptofon

    Cryptofon - a safe phone with integrated encryption.

    The Cryptofon is designed to enable safe and secure communication trough a regular PSTN line. It supports narrowband connections (~2400 bit/s and lower).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A pure C AES implementation for 8-bit microcontrollers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Purchasing and invoice automation solution for small to mid market companies. Icon
    Purchasing and invoice automation solution for small to mid market companies.

    Save your team 10s of hours/week with a fully personalized and automated procurement process.

    ProcureDesk is an integrated purchasing and invoicing platform tailored to help small to medium sized businesses streamline their procurement processes. This user-friendly system automates workflows and consolidates purchasing data into a centralized dashboard, allowing companies to control spending and enhance transparency efficiently. Features like automated invoice matching, simple requisition creation, and immediate cash flow insights minimize manual tasks and boost operational efficiency. ProcureDesk is perfect for smaller enterprises leveraging big-business strategies to reduce costs and optimize their purchasing activities. Discover how ProcureDesk can transform your procurement process into a more effective and manageable part of your business.
  • 10
    SecondFactor

    SecondFactor

    Two-Factor Authenticator for Windows.

    Need a two-factor authenticator for your computer? Tired of using your phone to log in to a website on your desktop? Introducing SecondFactor, a One-Time-Password Authenticator for Windows. SecondFactor supports Time-based One Time Passwords, which can be added directly, using a QR Code, or with an OTPAUTH URL. Your Secrets are stored securely for your local account, with the option to protect the program with a password for advanced security. The main window of SecondFactor provides...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    SecondFaqtor

    SecondFaqtor

    Two-Factor Authenticator for Linux.

    Need a two-factor authenticator for your computer? Tired of using your phone to log in to a website on your desktop? Introducing SecondFaqtor, a One-Time-Password Authenticator for Linux. SecondFaqtor supports Time-based One Time Passwords, which can be added directly, using a QR Code, or with an OTPAUTH URL. Your Secrets are stored securely for your local account, with the option to protect the program with a password for advanced security. The main window of SecondFaqtor provides...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    BP-Tools

    BP-Tools

    Set of useful tools for payment service development

    The BP-Tools set consist from applications supporting EFT testing, benchmarking and transaction service development. BP-Tools suite currently consists of following three components: - BP-CCALC: Cryptographic Calculator - BP-CardEdit: Thales P3 Input/Output file editor - BP-EMVT: EMV Tool - BP-HCMD: Thales HSM Commander
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    FilterDriver

    File activities monitor and file access control, file encryption

    A.File and Folder Monitoring Monitor Windows file I/O activities in real time, track the file access and changes, monitor file and folder permission changes, audit who is writing, deleting, moving or reading files, report the user name and process name, get the user name and the ip address when the Windows file server's file is accessed by network user. B.File Access Control and Security Control Control Windows file I/O activities in real time, intercept the file system call, modify...
    Downloads: 0 This Week
    Last Update:
    See Project