Showing 76 open source projects for "hmac"

View related business solutions
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    Paseto

    Paseto

    Platform-Agnostic Security Tokens

    Paseto (Platform-Agnostic Security Tokens) is an open-source security token format designed as a more secure alternative to JWT (JSON Web Tokens). Unlike JWT, Paseto eliminates common cryptographic pitfalls by avoiding weak algorithms. It is designed to be secure by default, with built-in cryptographic best practices, making it ideal for applications requiring robust authentication and token management.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Cloudflare Worker JWT

    Cloudflare Worker JWT

    Lightweight JWT implementation with no dependencies for Cloudflare

    cloudflare-worker-jwt is a JavaScript library for handling JSON Web Tokens (JWTs) inside Cloudflare Workers. It enables authentication, token validation, and signature verification for serverless applications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Java JWT

    Java JWT

    Java implementation of JSON Web Token (JWT)

    ...The library implements JWT Verification and Signing using several algorithms. The Algorithm defines how a token is signed and verified. It can be instantiated with the raw value of the secret in the case of HMAC algorithms, or the key pairs or KeyProvider in the case of RSA and ECDSA algorithms. Once created, the instance is reusable for token signing and verification operations. When using RSA or ECDSA algorithms and you just need to sign JWTs you can avoid specifying a Public Key by passing a null value. The same can be done with the Private Key when you just need to verify JWTs.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 4

    Largest Generic Hash and HMAC Program

    57 Hash Functions In One Program, plus each with HMAC or KMAC

    ...Currently 57 hash algorithms like sha1 sha224 sha256 sha384 sha512 and variants, sha3 and shake, all SHA3 finalists and blake3, md2 md4 md5 md6, rmd128 rmd160 rmd256 rmd320, whirl gost lash160 lash256 lash384 lash512 tiger2 and RFC 2104 HMAC and KMAC support are included, plus SHA3 extensions kmac128, kmac256, kmacxof128, kmacxof256 for message.
    Leader badge
    Downloads: 1 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 5
    SMTP Tunnel Proxy

    SMTP Tunnel Proxy

    A high-speed covert tunnel that disguises TCP traffic as SMTP email

    ...It implements a SOCKS5 proxy interface on the client that wraps outbound traffic into an SMTP-like handshake (EHLO, STARTTLS, AUTH) and encrypted payload, making the session appear to DPI systems as a normal email exchange. The tool supports modern TLS encryption (STARTTLS) with HMAC-SHA256 authentication, per-user secrets, IP whitelisting, and multiplexed connections over a single tunnel. With a simple installer and systemd service setup, users can quickly deploy it on a Linux VPS as a tunneled access point, then connect from Windows, macOS, or Linux clients using auto-generated client packages. The project is useful for environments where standard VPNs or proxies are blocked, offering a combination of performance and stealth.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    Got

    Got

    Human-friendly and powerful HTTP request library for Node.js

    ...Got will make no further changes to the request before it is sent. This is especially useful in conjunction with got.extend() when you want to create an API client that, for example, uses HMAC-signing. You can override the request function by returning a ClientRequest-like instance or a IncomingMessage-like instance. This is very useful when creating a custom cache mechanism. The response object will typically be a Node.js HTTP response stream, however, if returned from the cache it will be a response-like object which behaves in the same way.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    Kong

    Kong

    The Cloud-Native API Gateway

    Kong is a next generation cloud-native API platform for multi-cloud and hybrid organizations. When building for the web, mobile, or Internet of Things, you’ll need a common functionality to run your software, and Kong is that solution. Kong acts as a gateway, connecting microservices requests and APIs natively while also providing load balancing, logging, monitoring, authentication, rate-limiting, and so much more through plugins. Kong is highly extensible as well as platform agnostic,...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 8
    EDGE Toolkit

    EDGE Toolkit

    Cross-platform Integrated Security Suite written in Go

    Multi-purpose cross-platform hybrid cryptography tool for symmetric and asymmetric encryption, cipher-based message authentication code (CMAC/PMAC/GMAC/VMAC), recursive hash digest, hash-based message authentication code (HMAC), HMAC-based key derivation function (HKDF), password-based key derivation function (PBKDF2/Argon2/Scrypt), password-hashing scheme (Bcrypt/Argon2/Makwa), shared key agreement (ECDH/VKO/X25519), digital signature (RSA/ECDSA/EdDSA/GOST/SPHINCS+), X.509 CSRs, CRLs and Certificates, and TCP instant server with TLS 1.3 and TLCP encryption layers for small or embedded systems.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9

    bashtotp

    hmac sha1 hotp and totp impementation in bash

    bash cli totp and hotp util
    Downloads: 0 This Week
    Last Update:
    See Project
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 10
    Plum Cave Twofish

    Plum Cave Twofish

    A version of Plum Cave that uses the ChaCha20 and Twofish ciphers

    A version of Plum Cave that employs the "ChaCha20 + Twofish-256 CBC + HMAC-SHA3-512" authenticated encryption scheme for data encryption and ML-KEM-1024 for quantum-resistant key exchange.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Plum Cave

    Plum Cave

    A cloud backup solution that employs advanced cryptography

    A cloud backup solution that employs the "ChaCha20 + Serpent-256 CBC + HMAC-SHA3-512" authenticated encryption scheme for data encryption and ML-KEM-1024 for quantum-resistant key exchange. Check it out at https://plum-cave.netlify.app/ GitHub page: https://github.com/Northstrix/plum-cave
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Midbar ESP32 CYD

    Midbar ESP32 CYD

    A version of Midbar data vault tweaked specifically for the ESP32 CYD.

    Midbar ESP32 CYD is a version Midbar data vault tweaked specifically for the ESP32 Cheap Yellow Display. The tutorial is available at: https://www.instructables.com/Midbar-ESP32-CYD/ GitHub: https://github.com/Northstrix/Midbar-ESP32-CYD
    Downloads: 4 This Week
    Last Update:
    See Project
  • 13
    Bootleg-Password-Vault

    Bootleg-Password-Vault

    A password vault with client-side encryption and nice-looking UI

    A password vault with client-side encryption and nice-looking UI built with React. The app is hosted at https://northstrix.github.io/Bootleg-Password-Vault/ The source code can also be found at: https://github.com/Northstrix/Bootleg-Password-Vault https://codeberg.org/Northstrix/Bootleg-Password-Vault The related article is available at: https://medium.com/@Northstrix/adbd8dad0442
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Lakhash

    Lakhash

    An experimental cloud storage service featuring client-side encryption

    An experimental cloud storage service built with Next.js, featuring client-side file encryption, a dedicated password vault, advanced integrity verification functionality, and a convenient UI. Lakhash is also equipped with the password vault. Check it out at https://lakhash.netlify.app GitHub repository: https://github.com/Northstrix/Lakhash Codeberg repository: https://codeberg.org/Northstrix/Lakhash/ The related Medium article can be found at...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Blueberry Loom

    Blueberry Loom

    Cryptographically reinforced form builder

    A form builder that utilizes ML-KEM-1024, as well as the "ChaCha20 + Serpent-256 CBC + HMAC-SHA3-512" authenticated encryption scheme to enable end-to-end encryption for enhanced data protection. GitHub repository: https://github.com/Northstrix/blueberry-loom
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
     In-Browser-File-Encrypter

    In-Browser-File-Encrypter

    The source code of the In-Browser-File-Encrypter web app

    The In-Browser File Encrypter is a simple web application that enables you to securely encrypt your files directly in your browser using the AES-256 encryption algorithm in CBC mode. Check it out at: https://codepen.io/Northstrix/pen/xxvXvJL and https://northstrix.github.io/In-Browser-File-Encrypter/V1.0/web-app.html GitHub page: https://github.com/Northstrix/In-Browser-File-Encrypter The download shortcut:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Plum Harbor

    Plum Harbor

    An open-source file sharing app built using Next.js and Perplexity.

    An open-source file sharing app built using Next.js and Perplexity. The app employs ML-KEM-1024, ChaCha20, Serpent-256, and HMAC-SHA512 to ensure data confidentiality and integrity. The app is also equipped with a dedicated password vault. Check it out at https://plum-harbor.netlify.app/ GitHub page: https://github.com/Northstrix/plum-harbor Codeberg page: https://codeberg.org/Northstrix/plum-harbor The app is available in English and Hebrew. German version is available here: SourceForge: https://sourceforge.net/p/plum-harbor-deutsch GitHub: https://github.com/Northstrix/plum-harbor-deutsch Codeberg: https://codeberg.org/Northstrix/plum-harbor-deutsch Deployed app: https://plum-harbor-deutsch.netlify.app/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    React-Cryptographic-Toolkit

    React-Cryptographic-Toolkit

    A simple cryptographic toolkit built with React

    ..."React" is a registered trademark of Meta Platforms, Inc. This name is used solely for identification purposes. You can use this app to encrypt your data, hash strings, and calculate tags using the available HMAC algorithms. This app is provided with no warranty or guarantees of any kind. Use it at your own risk! Check it out at https://northstrix.github.io/React-Cryptographic-Toolkit/ The related article is available at https://medium.com/@Northstrix/react-and-cryptography-creating-my-own-toolkit-40944af4d534
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Midbar ESP32 CYD Firebase Edition

    Midbar ESP32 CYD Firebase Edition

    A version of Midbar data vault adapted for the ESP32 CYD and WebFlash.

    A version of Midbar data vault adapted for the ESP32 CYD and WebFlash. It keeps the cryptographic keys in the ESP32 RAM and stores the ciphertexts (encrypted data) in the Google Firebase. The tutorial is available at: https://www.instructables.com/How-to-Turn-ESP32-CYD-Into-a-Secure-IoT-Data-Vault/ WebFlash for ESP32-CYD: https://northstrix.github.io/Midbar-ESP32-CYD-Firebase-Edition/flash WebFlash for ESP32-CYD2USB: https://northstrix.github.io/Midbar-ESP32-CYD2USB-Firebase-Edition/flash
    Downloads: 6 This Week
    Last Update:
    See Project
  • 20
    Midbar Desktop App

    Midbar Desktop App

    Standalone desktop app from the Midbar project

    This repository contains the standalone desktop application from the Midbar project. The app operates entirely offline and does not require an internet connection. GitHub repository: https://github.com/Northstrix/Midbar-Desktop-App
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    PCA

    PCA

    binary encryption archiver

    Petoron Crypto Archiver (PCA) Key features: AES-256-CFB encryption with unique IV per archive Argon2id key derivation (256MB RAM / time_cost=3 / parallelism=4) HMAC-SHA512 integrity and anti-tampering check No compression, no fingerprinting, no trace of original data Works with both single files and entire directories Fully CLI-based, portable, and open format (.pca) https://github.com/01alekseev/PCA
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    PTBC

    PTBC

    irreversible encryption with time self-destruction

    ...Key features: AES-CFB encryption with per-file IV Argon2id key derivation with 256MB RAM resistance TTL (time to live) built directly into the encrypted file HMAC-SHA512 integrity verification Self-deleting mode (--autowipe) and one-time access marking (--onetime) No file metadata, no recovery, no password resets Philosophy: If you lose the password - it’s over. If time expires - it’s gone. PTBC doesn’t forgive, doesn’t forget, and doesn’t leak. https://github.com/01alekseev/PTBC
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    fwknop

    fwknop

    Single Packet Authorization, Port Knocking

    fwknop stands for the "FireWall KNock OPerator", and implements an authorization scheme called Single Packet Authorization (SPA). This method of authorization is based around a default-drop packet filter (fwknop supports iptables and firewalld on Linux, ipfw on FreeBSD and Mac OS X, and PF on OpenBSD) and libpcap. SPA is essentially next-generation port knocking (more on this below). The design decisions that guide the development of fwknop can be found in the blog post "Single Packet...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    NaviServer

    NaviServer

    NaviServer, a high performance web server written in C and Tcl

    NaviServer is an extensible web server suited to create scalable websites and services. Originally based on AOLserver (http://www.aolserver.com), the ongoing development is done independently under Mozilla Public License by a core group of people that use it for their businesses and by other supporters. Features: High performance multi-threaded architecture, massively scalable and extensible, many modules, dynamic scripted pages (ADP), caching functions (static files, Tcl byte code,...
    Leader badge
    Downloads: 28 This Week
    Last Update:
    See Project
  • 25
    Petoron-P2P-Messenger

    Petoron-P2P-Messenger

    minimalistic, secure and autonomous P2P messenger

    Petoron P2P Messenger (P-P2P-M) Architecture: Pure P2P - no servers, no databases Key storage: Keys generated in memory, never stored, erased after use Metadata: Only IP and port exist during the session - everything else is encrypted & obfuscated Encryption: PQS v1.2 - PBKDF2-HMAC-SHA256 (200k), BLAKE2s-MAC, custom stream cipher + fake padding Authentication: BLAKE2s-MAC (16 bytes) - instant failure on any data change Packet obfuscation: --stealth mode - padding, hidden structures Connection: Direct peer-to-peer only Anonymity: No accounts, logins, or phone numbers Third-party access: Impossible without physical access to both peers during session History: No storage — all in RAM, wiped on close Message size: Limited only by RAM & MTU — no artificial limits External dependencies: None DPI/blocking resistance: Harder to detect, can be masked Autonomy: Fully offline until peers connect 26.01.26 Add pqs_chat_tor.py github.com/01alekseev/Petoron-P2P-Messenger
    Downloads: 2 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next
MongoDB Logo MongoDB