Showing 31 open source projects for "string encryption"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 1
    Speedcrypt File Encryption

    Speedcrypt File Encryption

    A File Encryptor with many Options and Powerful Algorithms!

    ...Speedcrypt implements libraries such as Bouncy Castle and others among the most used in the world of cryptography! Speedcrypt is a free program for encrypt the files which helps you to manage in a secure way. The files are encrypted using the best and most Secure Encryption algorithms currently known: AES-GCM, AES RIJNDAEL, PGP, AES (String Crypto 256 Bit Key) SERPENT, CHACHA20, XCHACHA20-POLY1305. Speedcrypt is it really free, more than that: it is Open Source. You can have a look at its full source code and check whether the security features are implemented correctly.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 2
    JavaScript Obfuscator

    JavaScript Obfuscator

    A powerful obfuscator for JavaScript and Node.js

    JavaScript Obfuscator is a Node.js library and CLI that transforms readable JavaScript into hardened, difficult-to-reverse code. It applies techniques such as identifier mangling, string array extraction/encoding, control-flow flattening, dead-code injection, and numeric literal transformations to disguise intent. Advanced options include self-defending code, domain locking, debug/console protection, and property key transformation, allowing you to tailor defenses to your threat model. The...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    PureBasic Shamir Secret Sharing

    PureBasic Shamir Secret Sharing

    Open-source PureBasic implementation of the Shamir Secret Sharing

    PureBasic Shamir Secret Sharing is an open-source, self-contained and educational implementation of the Shamir Secret Sharing Scheme, written entirely in PureBasic. Shamir Secret Sharing is a cryptographic method that splits a secret into multiple parts (shares), such that any combination of at least T shares can reconstruct the original secret, while any number of shares fewer than T reveals no usable information. This implementation operates over the finite field GF(257), allowing...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    Private Vault
    My Private Vault is a general-purpose Windows application to encrypt your sensitive files (string AES algorithm) locally. Did you know that trojans and other kinds of malware can easily access all your files after getting into your machine? Download My Private Vault now and take control of your privacy!
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 5
    Hash Latch
    The hash latch generates keys in a manner similar to how some cryptocurrencies are mined. It takes a string and brute-forces a prefix for it so that the hash of the string with the prefix has a certain number of leading zeroes. But that alone would've been too easy to hack. To prevent an attacker from forging the keys by generating a new prefix: the hash latch doesn't output the keys in the plaintext. Instead, it encrypts the key and outputs the ciphertext. That means that instead of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    IRBS - Institutional Registers Backup

    IRBS - Institutional Registers Backup

    Open Source Institutional Registers Backup Syst. for Paper Registers

    If you are looking for a way to backup your numerous paper based registers, i.e. Admissions / Withdrawals, Fees, Attendance & Exam Mark Registers of Schools, Junior / Senior Colleges, then this software will help you. Designed with goals of Simplicity & packaged with all necessary open source tools to get you into action, straightaway. Refer Screenshots Below. Just download the above zip file, extract it to a Disk Partition, with lots of free space & Turn ON Network Discovery By Right...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    mystic-crypt is designed as a Java library that can be used for simple and complex encryption and decryption. The source code for the library is available under https://github.com/astrapi69/mystic-crypt For demonstration what the library can do there is a graphical client: The source code for the ui is available under https://github.com/astrapi69/mystic-crypt-ui
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Koperek.VCL

    Fast file copier, experimental archiver and encrypter for Windows 95+

    Copy handler written in Windows 98 era ~ 2002 written to by used by myself. To speed up file copy operations, thanks to bigger buffer size. Work as simple shell extension (Send To). Source files to be copied are always passed as string list via Clipboard. Destination directories passed via program parameters list. Note - you could copy multiple sources into multiple places at once! You will be able to: - Copy files - Move files and entire directories - Delete directories - Encrypt...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    .Net Core for Delphi/Lazarus

    .Net Core for Delphi/Lazarus

    The best library to work with the .Net Core from Delphi and Lazarus.

    The .Net Core for Delphi/Lazarus (dotNetCore4Delphi) is a .Net Core Runtime Library for Delphi which helps Delphi/Pascal developers work with .Net Core. It is designed to provide a way to interact with .Net Core applications from Delphi/Pascal. What dotNetCore4Delphi can do: - Access .Net Core Framework Class Library. - Access Third Party .Net Core Libraries. - Access Your .Net Core Libraries. - etc Competitive Advantages: - Cross-platform framework that runs on Windows, Linux and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • 10
    Open Source Data Quality and Profiling

    Open Source Data Quality and Profiling

    World's first open source data quality & data preparation project

    This project is dedicated to open source data quality and data preparation solutions. Data Quality includes profiling, filtering, governance, similarity check, data enrichment alteration, real time alerting, basket analysis, bubble chart Warehouse validation, single customer view etc. defined by Strategy. This tool is developing high performance integrated data management platform which will seamlessly do Data Integration, Data Profiling, Data Quality, Data Preparation, Dummy Data...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 11

    CKK Encryption

    Fast and unbreakable encryption

    Any comments or question should be directed to the Discussion section of this website. I'll respond to any post directed there. Still in alpha stage. We take a file/stream and break it down to 8bit ASCII "0-255" values. We then take those values and combine with individual 8bit ASCII values of the password/pass phrase. We loop thru the file combining 1 byte with 1 byte from "password phrase" in a continuous loop. We then write all odd results then even results to a file, array or string...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    .Net Runtime Library for Delphi

    .Net Runtime Library for Delphi

    This is the best library to work with the .Net framework from Delphi.

    The .Net Runtime Library for Delphi (CNClrLibrary) is the best library to work with .Net framework and .Net libraries from Delphi. It is designed to provide a way to interact with applications written in anyone of the .Net languages (such as C#, Visual Basic.Net, Delphi.Net, JScript.Net, etc) from Delphi. CNClrLibrary allows Delphi to use .Net libraries without the need for registry entries, COM registrations, or changes to the .NET libraries. Competitive Advantages: - No extra dll...
    Leader badge
    Downloads: 8 This Week
    Last Update:
    See Project
  • 13
    IT-Remote Service Tools

    IT-Remote Service Tools

    Manage Remote Connections, RDP, SSH, Mikrotik, VNC

    ...IT-Remote Service Tools is secured with password with possibly to turn ON or OFF feature. Configurations file are Extensible Markup Language XML. Password are encypted with symmetric-key encryption that means the string can only be decrypted if the other party has the correct key (which is used for encryption). Application is portable that means that you can move it easily without losing any of your data of connections places. Except password of your application which is stored in your registry.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    TinyObfuscate

    TinyObfuscate

    A tool for strings obfuscation tool in c++ by Michael Haephrati

    When you need encrypt/obfuscate strings in your program so that they don't just show up with a strings or hex tool when your executable is examined, this tool can be useful. See Code Project article: https://www.codeproject.com/Articles/1210398/Small-String-Obfuscator by Michael Haephrati
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Anak Krakatoa Defined Crypt

    Anak Krakatoa Defined Crypt

    Uma implementação diferente do algorítmo de Virgenère

    ...Isso seria o ideal, mas infelizmente ele utilizava todos os 256 caracteres do conjunto ASCII, quer dizer, ele também incluía em seus cálculos todos os caracteres de controle (DEL, CR, LF, ACK, etc.). Esse componente, foi INTEIRAMENTE convertido e otimizado a partir do JavasScript VIRGENERE ENCRYPTION criado por Francisco Ryan Tolmasky (opossum@mailcity.com) e usa uma tabela fixa contendo pares de caracteres comuns em meu idioma, nunca saindo desse intervalo evitando assim o aparecimento de caracteres indesejados na string criptografada resultante
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    Bye Common Code

    Never Rewrite the same code again

    This contains all the stateless code you will need for any business application: Including: An emailer, AES Encryption, AES Decryption, Form Uploader and Submitter For Form Redirection and uploads without a web form, File Form Uploader, JQuery or Angular Generator, XML and CSV document generator, String Validator: international and US phone, email, numbers, double with precision and other string validators, XSS Cleaning and XML cleaning.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    approach to encryption and decryption involves two strings. The first is an encryption / decryption string which we will allow to be up to 128 lower case alphabetical characters in length. The second string is a line of text from a file that is to be encrypted or decrypted. the basic strategy for encrypting data is based on mapping alphabetical characters to specific values, then doing some simple mathematical operations to create a new value.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    PortaBase

    A Portable Database

    A personal database application for Maemo devices as well as PCs running Linux/UNIX, Mac OS X, and Windows. It can be used as a shopping list, password manager, media inventory, financial tracker, TODO list, address book, photo album, and more.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 19

    CyberCrypt

    .NET Library for Encryption/Decryption

    CyberCrypt: ----------------- .NET Library for Encryption/Decryption Usage: ---------- Encrypting file using AES (256 bits): CyberCrypt._AES256.EncryptFile("C:\example.txt", "YourPassword") Decrypting file using AES (256 bits): CyberCrypt._AES256.DecryptFile("C:\example.txt", "YourPassword") Hashing string using SHA512: CyberCrypt._SHA.SHA512Hash("A string that will be converted to SHA512 hash.")
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    Brute Script VBS Crypter\Obfuscator

    Free obfuscation\crypting application for VBS files.

    This program uses string array encryption to protect your VBScripts, it is also sugested you encode your script after obfuscating it. Tags: VBS, VBScript, Crypter, Obfuscator; FUD, Protector, Protect, Download, free, vbs crypter, vbs obfuscator download, fud vbs crypter download, vbs obfuscator, protect vbscripts, vbscript protector, vbscript crypter.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    WTF Obfuscator

    WTF Obfuscator

    WTF Obfuscator is a new obfuscator for your .NET applications

    [W]hat [T]he ob[F]uscator is a new obfuscator which protects your application. Not too good protection until!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    Java Encryption Library

    Simple Java Encryption Library

    I have packaged the Java encryption library with a wrapper used to make saving and loading files in Java easier. I have also included the source for a command line application to encrypt a String and save it to a text file. The source for AESEncryption was actually written by "erickson" from Stack Overflow. The original post can be found here: http://stackoverflow.com/questions/992019/java-256-bit-aes-password-based-encryption/992413#992413
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    LeetSocket is an easy to use Socket Component, built on TCP, written in c# .net 2.0 Example Usage: Build a chat in 5 mins http://www.youtube.com/watch?v=Tm2jS6mQjRs Developers: Ahmet Yüksektepe Nick Russler
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    Mini.Net.Library

    Utility library

    Mini.Net.Library is a utility library for .Net, containing a comprehensive set of utility functions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    Cryptkeeper

    Cryptkeeper Secuirty tool

    ...some uses encryption keys and some dont. there are AES , 4DES , RC2 , RC4 , MD5 , SHA1 , SHA2 , SHA3 , SHA4 , XoR , Crypt , HeX , BINARY , Rijndael 256 , Obfuscation String , RSA , BASE64. The password manager anything saved WILL NOT BE ENCRYPTED so it is smart to protect the program from others not using it.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next