Showing 18 open source projects for "encryption asymmetric"

View related business solutions
  • Powerful, all-in-one identity verification, fraud prevention and compliance platform. Icon
    Powerful, all-in-one identity verification, fraud prevention and compliance platform.

    For businesses needing an automated identity verification to defeat fraud while processing customers' data quickly and securely

    iDenfy protects startups, financial institutions, gambling, streaming, ridesharing, and other digital services from identity fraud using a three-layer identity verification process. The process protects businesses from the most threatening forms of identity fraud.
  • Compliance Operations Platform. Built to Scale. Icon
    Compliance Operations Platform. Built to Scale.

    Gain the visibility, efficiency, and consistency you and your team need to stay on top of all your security assurance and compliance work.

    Hyperproof makes building out and managing your information security frameworks easy by automating repetitive compliance operation tasks so your team can focus on the bigger things. The Hyperproof solution also offers powerful collaboration features that make it easy for your team to coordinate efforts, collect evidence, and work directly with auditors in a single interface. Gone are the days of uncertainty around audit preparation and compliance management process. With Hyperproof you get a holistic view of your compliance programs with progress tracking, program health monitoring, and risk management.
  • 1
    Sliver

    Sliver

    Adversary Emulation Framework

    Sliver is an open source cross-platform adversary emulation/red team framework, it can be used by organizations of all sizes to perform security testing. Sliver's implants support C2 over Mutual TLS (mTLS), WireGuard, HTTP(S), and DNS and are dynamically compiled with per-binary asymmetric encryption keys. The server and client support MacOS, Windows, and Linux. Implants are supported on MacOS, Windows, and Linux (and possibly every Golang compiler target but we've not tested them all).
    Downloads: 18 This Week
    Last Update:
    See Project
  • 2
    jasypt-spring-boot

    jasypt-spring-boot

    Jasypt integration for Spring boot

    Jasypt Spring Boot provides Encryption support for property sources in Spring Boot Applications. There are 3 ways to integrate just-spring-boot in your project. And encryptable properties will be enabled across the entire Spring Environment (This means any system property, environment property, command line argument, application.properties, yaml properties, and any other custom property sources can contain encrypted properties) Jasypt uses an StringEncryptor to decrypt properties. For all 3...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    EDGE Toolkit

    EDGE Toolkit

    Cross-platform Integrated Security Suite written in Go

    Multi-purpose cross-platform hybrid cryptography tool for symmetric and asymmetric encryption, cipher-based message authentication code (CMAC/PMAC/GMAC/VMAC), recursive hash digest, hash-based message authentication code (HMAC), HMAC-based key derivation function (HKDF), password-based key derivation function (PBKDF2/Argon2/Scrypt), password-hashing scheme (Bcrypt/Argon2/Makwa), shared key agreement (ECDH/VKO/X25519), digital signature (RSA/ECDSA/EdDSA/GOST/SPHINCS+), X.509 CSRs, CRLs...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 4

    strobe

    STROBE cryptographic protocol framework

    Note: this is alpha-quality software, and isn't ready for production use. STROBE is a lightweight framework for cryptographic protocols. It supports encryption/decryption, hashing, pseudorandom generation and message authentication. It integrates these components in an innovative way that makes secure protocol design relatively simple. With the included elliptic curve code, STROBE additionally supports asymmetric key exchange and digital signature creation and verification.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Optimize every aspect of hiring with Greenhouse Recruiting Icon
    What’s next for many of us is changing. Your company’s ability to hire great talent is as important as ever – so you’ll be ready for whatever’s ahead. Whether you need to scale your team quickly or improve your hiring process, Greenhouse gives you the right technology, know-how and support to take on what’s next.
  • 5
    GMSM Toolkit ☭

    GMSM Toolkit ☭

    Cross-platform GMSM Security Suite written in Go

    GMSM Toolkit v1.2.3 ☭ Multi purpose cross-platform cryptography tool for asymmetric/symmetric encryption, cipher-based message authentication code (CMAC), recursive hash digest, hash-based message authentication code (HMAC) and PBKDF2 function. SM2/SM3/SM4 Chinese National Standard Algoritms: • GM/T 0003-2012 - SM2 Public key algorithm 256-bit. • GM/T 0004-2012 - SM3 Message digest algorithm. 256-bit hash value. • GM/T 0002-2012 - SM4 Symmetric block cipher with 128-bit key...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    CaptfEncoder

    CaptfEncoder

    Captfencoder is a rapid cross platform network security tool suite

    Captfencoder is a rapid cross-platform network security tool suite, providing network security-related code conversion, classical cryptography, cryptography, asymmetric encryption, miscellaneous tools, and aggregating all kinds of online tools. CaptfEncoder V3 develop by Rust, Executable programs are smaller, faster, better performing, and more powerful. CaptfEncoder V3 suport script extension.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Application based on asymmetric cryptography (ECC) allows encrypt and decrypt files and generates digital signatures. Currently implemented algorithms include ECDSA and ECIES.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    QuantumQuaternionCrypto

    To develop Qubit-resistant cryptography based on 4D-hypercomplexity...

    ...requiring the Quaternion (or even 8D-Biquaternion?) number system as a basis of Asymmetric Public-Private Key Digital Encryption to befuddle and overwhelm the highly-anticipated, powerful but fragile technology of Quantum Computation. Major recent Asian analytical advances are budding out in Singapore and India, whose foundations may well be provide a practical, efficient coding approach (adapting beautifully to the visualization and equation facilities of Wolfram/Mathematica) to Strong...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    CryptoLibraryRefImpl

    encapsulates secure crypto algorithms for easy use

    This library exposes security functionality to the programmer, such as random number generation, hashing, salted hashing, message authentication code, symmetric encryption, asymmetric encryption, hybrid encryption, digital signature and in-memory protection. The library is accompanied by a sophisticated reference implementation, that demonstrates how to make use of the CryptoLibrary.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Redefine the way your organization pursues opportunity and manages risk. Icon
    Make the right business decisions with an easy to use solution that provides a comprehensive integrated approach to governance, risk and compliance.
  • 10
    SecureMail

    SecureMail

    Secure Email with VB.NET

    Allow user to send/receive secure email with free web mail account. Source is in VB.NET and encryption use are Symmetric & Asymmetric encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    SecuXabber

    SecuXabber

    A secure Jabber-client for Android using strong encryption

    SecuXabber is a secure Jabber-client for Android that bases on Xabber and uses a strong, asymmetric enryption that works on top of the XMPP protocol. A key pair is generated on application start-up. Users can send their public key to other SecuXabber users via Bluetooth. This ensures the origin of the public key because people do a face-to-face check during key exchange. After the keys are imported by both users, all communication between them is done fully encrpyted using a strong 4096 bit end...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    The aim of this android application is to provide a secure storage for files on the phone. By using asymmetric cryptography the application allow the user and other apps to encrypt the files using a public key so without the need of a encryption password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    ACHAS

    Chat application with asymmetric encryption

    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    The software aims to provide a solution to the problem of secure communication in the mobile environment for all mobile devices. It was produced during a software project and is functional on the Java WTK emulator, however more work is needed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    wlfXchanger is a point-to-point communication software which enable developers to cooperate in a secure way, using an asymmetric encryption system (Public Key Cryptography).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Portable and simple program for text and files encryption (Symmetric, Asymmetric and Steganography)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Secure Java Instant Messenger. Supports asymmetric key encryption of messages. will support multiple protocols (Jabber initially) and multiple UIs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    BP-Tools

    BP-Tools

    Set of useful tools for payment service development

    The BP-Tools set consist from applications supporting EFT testing, benchmarking and transaction service development. BP-Tools suite currently consists of following three components: - BP-CCALC: Cryptographic Calculator - BP-CardEdit: Thales P3 Input/Output file editor - BP-EMVT: EMV Tool - BP-HCMD: Thales HSM Commander
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next