Showing 25 open source projects for "ciphers"

View related business solutions
  • Speech-to-Text: Automatic Speech Recognition Icon
    Speech-to-Text: Automatic Speech Recognition

    Accurately convert voice to text in over 125 languages and variants by applying Google's powerful machine learning models with an easy-to-use API.

    New customers get $300 in free credits to spend on Speech-to-Text. All customers get 60 minutes for transcribing and analyzing audio free per month, not charged against your credits.
  • RMM Software | Remote Monitoring Platform and Tools Icon
    RMM Software | Remote Monitoring Platform and Tools

    Best-in-class automation, scalability, and single-pane IT management.

    Don’t settle when it comes to managing your clients’ IT infrastructure. Exceed their expectations with ConnectWise RMM, our MSP RMM software that provides proactive tools and NOC services—regardless of device environment. With the number of new vulnerabilities rising each year, smart patching procedures have never been more important. We automatically test and deploy patches when they are viable and restrict patches that are harmful. Get better protection for clients while you spend less time managing endpoints and more time growing your business. It’s tough to locate, afford, and retain quality talent. In fact, 81% of IT leaders say it’s hard to find the recruits they need. Add ConnectWise RMM, NOC services and get the expertise and problem resolution you need to become the advisor your clients demand—without adding headcount.
  • 1
    HPN-SSH is a series of performance patches for OpenSSH. By addressing network limitations and CPU limitations significant throughput performance can be realized. Gains of close to two orders of magnitude are possible on long fat network paths. The official git repo is now available at http://github.com/rapier1/openssh-portable. The Sourceforge repository should not be seen as the canonical repository for HPN-SSH. We will update it as we can but users should look to github to generate...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 2

    ProxyCrypt

    Encrypted volumes through command line

    ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Encryption and decryption are made on the fly, allowing you to use encrypted volumes like normal ones. Designed for paranoids and advanced users, it is also fast, very lightweight, open source and easy to recompile. See the features below. It works as a "proxy" for the ImDisk Virtual Disk Driver. The latter is included in the full package and does not require installation. See the...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3

    OpenVPN for Windows XP

    OpenVPN v2.5.4 patched for Windows XP and Windows Server 2003

    OpenVPN v2.3.18 was the last version that officially supports Windows XP and Windows Server 2003. We lately had the need to use the newer version 2.5.4 of OpenVPN to support stronger data ciphers like AES-256-CBC. Therefore we decided to rebuild the whole package from the ground up to make it compatible with Windows XP and Windows Server 2003. The following article describes in detail how you can rebuild OpenVPN v2.5.4 for use on these older operating systems. The benefits of this new...
    Leader badge
    Downloads: 84 This Week
    Last Update:
    See Project
  • 4
    Arduino HomeKit ESP8266

    Arduino HomeKit ESP8266

    Native Apple HomeKit accessory implementation for the ESP8266 Arduino

    This Arduino library is a native Apple HomeKit accessory implementation for the ESP8266 Arduino core and works without any additional bridges. This project is mainly based on an esp-home kit for ESP-OPEN-RTOS. I ported the RTOS-based implementation of the esp-home kit to the pure Arduino environment, aimed at easy and fast building projects using Arduino IDE (or Eclipse with sloeber, PlatformIO). Enjoy the "one-key" build, "one-key" upload, and work to link various other Arduino libraries...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Securden Privileged Account Manager Icon
    Securden Privileged Account Manager

    Unified Privileged Access Management

    Discover and manage administrator, service, and web app passwords, keys, and identities. Automate management with approval workflows. Centrally control, audit, monitor, and record all access to critical IT assets.
  • 5
    H2O

    H2O

    The optimized HTTP1, HTTP2, and HTTP3 server

    H2O is a new generation HTTP server that provides quicker response to users with less CPU utilization when compared to older generation of web servers. Designed from ground-up, the server takes full advantage of HTTP/2 features including prioritized content serving and server push, promising outstanding experience to the visitors of your web site. Full support for dependency and weight-based prioritization with server-side tweaks. Static file serving, FastCGI, reverse proxy, scriptable using...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    MySuiteA

    This is not NSA Suite B. This is MySuiteA!

    MySuiteA is a cryptographic suite consisting of symmetric ciphers and hash algorithms, as well as two proof-of-concept quantum-safe asymmetric cryptographic algorithms for digital signature and key agreement. This suite implements: AES-128, AES-192, AES-256, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHAKE128, SHAKE256, NEWHOPE, REBLISS-512A, (and the self-devised)REBLISS-1024A, among a few other things...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    akmos

    Cryptography toolset

    Command line utility for encryption/decryption files, computing message digests
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Eristic Cryptographic Toolkit

    Eristic Cryptographic Toolkit

    Open source P-RNG based cryptography.

    The Eristic Cryptographic Toolkit based on the CRC (Chaotic Random Core). Version 4 is under development and includes: general purpose P-RNG, hash function, cipher, shuffle cipher, with key exchange and authentication on the way. Still in a very Alpha state at the moment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    The MOTET Cipher & SE Scrambler

    The MOTET Cipher & SE Scrambler

    A tiny, fast encryption tool in C

    MOTET is a tiny, fast super-encipherment application written in C, featuring the new CSPRNG/stream ciphers MOTE and BEDBUG in each of their three variants, as well as the "gold standard" among ciphers, ISAAC. MOTET brings multiple levels of encryption, including a ciphertext-hash, a Vigenere mixing function, a choice of Caesar MOD or Caesar MIX ciphering on the primary key-stream, plus a deeply scrambled "outer shell" as a final super-encryption stage. A unique nonce IV guarantees that each...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Email and SMS Marketing Software Icon
    Email and SMS Marketing Software

    Boost Sales. Grow Audiences. Reduce Workloads.

    Our intuitive email marketing software to help you save time and build lasting relationships with your subscribers.
  • 10
    MOTE CSPRNG & Stream Cipher

    MOTE CSPRNG & Stream Cipher

    A family of small-state CSPRNGs and Stream Ciphers

    MOTE is a fast, small-state, cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. MOTE exhibits uniform distribution, mixes extremely rapidly, has no detected bias, and comes in three variants: MOTE8, with an internal state array of 8+4 32-bit words; MOTE16, with an internal state of 16+4 words; and MOTE32 with a 32+4-word state. The former permit seeding with a key of up to 256 or 512 bits, the latter with a 1024-bit key. Reduced to essentials, MOTE is only...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    BEDBUG CSPRNG & Stream Cipher

    BEDBUG CSPRNG & Stream Cipher

    A family of FLEA-inspired CSPRNGs and Stream Ciphers

    BEDBUG is a small, fast, cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It exhibits uniform distribution, mixes rapidly (with worst-case avalanche better than 16-bits), has no detected bias, and comes in three variants: BEDBUG128, with an internal state array of 128+3 32-bit words; BEDBUG256, with an internal state of 256+3 words; and BEDBUG512 with a 512+3-word state. The former permit seeding with a key of up to 4096 or 8192 bits, the latter with a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    One of the first secure telephony programs. Not limited to VOIP but can also directly encrypt a telephone line by using modems. Calls are encrypted using Diffie-Hellmann key exchange and several symmetric ciphers. Download is possible from Germany only, see homepage
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Alkindus is an automated solver for short monoalphabetic substitution ciphers without word divisions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    SSLScan queries SSL services, such as HTTPS, in order to determine the ciphers that are supported. SSLScan is designed to be easy, lean and fast. The output includes prefered ciphers of the SSL service, the certificate and is in Text and XML formats.
    Downloads: 30 This Week
    Last Update:
    See Project
  • 15
    BeeCrypt is an ongoing project to provide a strong and fast cryptography toolkit. Includes entropy sources, random generators, block ciphers, hash functions, message authentication codes, multiprecision integer routines, and public key primitives.
    Leader badge
    Downloads: 234 This Week
    Last Update:
    See Project
  • 16
    A set of tools for manipulating and solving pencil-and-paper style ciphers, cryptograms, and related puzzles.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    EverCrack cryptanalysis engine. The goal is cryptanalysis of any class of cipher. The focus now is the kernel - cryptanalysis of unilateral monalpha substitution ciphers extremely quickly, and later, cryptanalysis of complex ciphers for the kernel.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 18
    CRYPT extension for Netfilter/Iptables allows you to create an encrypted communication using stream and block ciphers. It also authenticates the packets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Cameloid is a new TCP/UDP based P2P voice and video encryption software, that will provide high level of privacy for all levels of communication using only quality secret-key ciphers to ensure long-term security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    libgcrypt-py is a Python wrapper around the libgcrypt cryptographic library. It supports functionality/algorithms that are supported by libgcrypt, including Symetric Ciphers (3DES, AES, Twofish, Blowfish), Cryptographic Hashing (MD5, SHA1, RIPE-MD160), P
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Speak Freely is a Cross Platform Internet telephony (Voice Chat) application which provides high quality voice grade audio with GSM and CELP compression and encryption with DES, Blowfish, and IDEA ciphers. Refering to recent news: The maintainers will never add any unwanted extra software in the zip download file but we can only speak for our selves.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    Speak Freely for Unix is an Internet telephony application which provides high quality voice grade audio with GSM and CELP compression and encryption with DES, Blowfish, and IDEA ciphers. It interoperates with Speak Freely for Windows and any RTP client
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Crypto.mod is a simple LOADABLE cryptographic module for tcl 8.3+ (possibly older, not tested). The module supports the blowfish, twofish and rijndael ciphers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    A project to provide a GUI toolkit to facilitate (and where possible, automate) the breaking of classical (pen-and-paper) cryptosystems. Initial focus is on the cryptanalysis of monoalphabetic substitution ciphers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    iSSL is a minimalistic cryptographical API that uses the ciphers RSA and AES to establish SSL-alike, secure encrypted communications between two peers communicating through a network socket, including session key generation and public key exchange.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next