Showing 44 open source projects for "decryption"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 1
    libzip

    libzip

    A C library for reading, creating, and modifying zip archives.

    libzip is a C library for reading, creating, and modifying zip archives. Files can be added from data buffers, files, or compressed data copied directly from other zip archives. Changes made without closing the archive can be reverted. The API is documented by man pages. libzip is fully documented via man pages. HTML versions of the man pages are on libzip.org and in the man directory. You can start with libzip(3), which lists all others. Example source code is in the examples and src...
    Downloads: 29 This Week
    Last Update:
    See Project
  • 2
    AWS Encryption SDK for C

    AWS Encryption SDK for C

    AWS Encryption SDK for C

    The AWS Encryption SDK for C is a client-side encryption library designed to make it easy for everyone to encrypt and decrypt data using industry standards and best practices. It uses a data format compatible with the AWS Encryption SDKs in other languages. For more information on the AWS Encryption SDKs in all languages, see the Developer Guide. We will demonstrate some simple build recipes for Linux, Mac, and Windows operating systems. These recipes assume a newly installed system with...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    strobe

    STROBE cryptographic protocol framework

    Note: this is alpha-quality software, and isn't ready for production use. STROBE is a lightweight framework for cryptographic protocols. It supports encryption/decryption, hashing, pseudorandom generation and message authentication. It integrates these components in an innovative way that makes secure protocol design relatively simple. With the included elliptic curve code, STROBE additionally supports asymmetric key exchange and digital signature creation and verification.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    DavUtils

    Powerful webdav client and sync tools with client-side AES encryption

    DavUtils is a collection of easy to use WebDAV client tools. The built-in client-side encryption allows you to encrypt and decrypt files on the fly with AES. Currently two command line tools are available: dav is a multipurpose WebDAV client that can be used like the standard unix tools ls, mkdir and rm. The other tool is dav-sync that can synchronize local files with a WebDAV server. It is very flexible and configurable and has advanced data safety features to prevent data loss. The...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
    Learn More
  • 5
    Midbar

    Midbar

    Midbar is more than just an open source password vault!

    Midbar is more than just a password vault! It's made to significantly increase the cost of unauthorized access to its your personal data. Some tutorials: ESP32 V4.0: https://www.instructables.com/Midbar-V40/ Raspberry Pi Pico V2.0: https://www.instructables.com/Midbar-Raspberry-Pi-Pico-Version-V20/ ESP32 V5.0: https://www.instructables.com/Midbar-V50/ STM32F401CCU6 + Arduino Uno Version V1.0: https://www.instructables.com/Midbar-STM32F401CCU6-Arduino-Uno-Version/ RTL8720DN +...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    ProxyCrypt

    Encrypted volumes through command line

    ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Encryption and decryption are made on the fly, allowing you to use encrypted volumes like normal ones. Designed for paranoids and advanced users, it is also fast, very lightweight, open source and easy to recompile. See the features below. It works as a "proxy" for the ImDisk Virtual Disk Driver. The latter is included in the full package and does not require installation. See...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    XOR Encryptor/Decryptor

    Encrypts and decrypts files using XOR operation.

    Encrypts and decrypts files using XOR operation.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 8
    Application based on asymmetric cryptography (ECC) allows encrypt and decrypt files and generates digital signatures. Currently implemented algorithms include ECDSA and ECIES.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    XORCrypter

    XORCrypter

    Little program for encryption-decryption.

    Little program that uses the bit XOR operation for encryptioning and decryptioning, for now, just text files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Tigerpaw One | Business Automation Software for SMBs Icon
    Tigerpaw One | Business Automation Software for SMBs

    Fed up with not having the time, money and resources to grow your business?

    The only software you need to increase cash flow, optimize resource utilization, and take control of your assets and inventory.
    Learn More
  • 10

    Photon4K

    32768-bit symmetric-key encryption, fully-functional development CLI

    Photon4K is a 32768-bit symmetric-key encryption cipher accessed via a basic, yet fully-functional development-oriented Command Line Interface (CLI) utility. The algorithm is intended to be a high-security "symmetric" cipher designed primarily for archival purposes -- http://wikipedia.org/wiki/Symmetric-key_algorithm . Photon4K is implemented as an attempt to take long-established, proven cryptographic techniques to another "level" to contend with the rapid advances in powerful...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Crypt

    Crypt

    Crypt encryption and decryption is based on ASCII Table Shift.

    Crypt is the developed based on the ASCII Table shift and it can customized based on the user requirements, right from the shifting order and the level of encryption or decryption. It can be integrated to any of the programming language with the custom build of the source code. It can secure from text file to binary code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    NCrypted

    NCrypted - simple file encryption software with GPU support

    NCrypted is a simple file encryption software. It is implemented on top of AES 128-bit algorithm. This software was designed to be as simple as possible, so you won't find any fancy, flashy gui elements or complicated advanced options. You can also use it directly from command line. NCrypted can automatically detect and take advantage of your NVidia graphics card to speed up the file processing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    hsencfs

    hsencfs

    High Security Encrypting File System

    HSENCFS is a user space encrypting file system. Simple to set up, seamless to use, fast, safe, secure and maintenance free. It will encrypt data on the fly written to it, decrypt data read from it. HSENCFS uses only storage space for actual data stored, no pre-allocation needed. It is fast enough for real time Video Encryption. HSENCFS is classified as a variable key length encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Ncrypt is intended to give you security in an insecure environment. If you are wanting to encrypt files, wishing to hide your activites from prying eyes, and want to "cover your tracks", Ncrypt is for you.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 15

    akmos

    Cryptography toolset

    Command line utility for encryption/decryption files, computing message digests
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This is a chat system composed of a TCP/IP server daemon and its corresponding java client. You can chat with other peers in clear text or AES password-based encryption on your own computer network. The AES encryption and decryption is based on 128 bit key which is reached by padding the resulting SHA256 from your provided password. Simply put, SHA is a checksum that change when a single bit change. When you send a message with a password field, the resulting password checksum is cut at 128...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    VCipher

    VCipher

    A Social Media Encryption/Decryption Tool

    VCipher is a unique encryption and decryption tool.The code is not unique rather it is quite simple as it uses Vigenère cipher algorithm but the idea is quite unique.It is created to be used as an extra layer of protection for social networking sites,so even if someone's account is hacked it will take them so expertise to read those messages.And if used correctly it can also be made uncrackable if used correctly.This is a CLI(Command Line Interface) there is a web version too. VCipher Web...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    SES Super-Encypherment Scrambler

    SES Super-Encypherment Scrambler

    SES brings back the uncrackable onetime pad, with a digital twist.

    SES brings back the uncrackable onetime pad, with a digital twist. It is well known that a random key of message-length is the only provably unbreakable cipher. SES uses cryptographic strength pseudo-random keys of message-length for its many encipherments, in addition to offering true one-time pad capability for the intrepid. SES is built on ISAAC, Bob Jenkins' unbroken CSPRNG, a fast and simple stream cipher placed in the Public Domain in 1996. SES now gives you the ability to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    xxteac - XXTEA Encrypter/Decrypter

    xxteac - XXTEA Encrypter/Decrypter

    This xxteac program utilizes the "Corrected Block TEA" encryption/decryption algorithm by Roger Needham and David Wheeler. The original algorithm has been slightly modified to allow arbitary length passwords / password files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    MLCrypt

    Simple, lightweight, standalone command-line single file encryption.

    Simple, lightweight, cross-platform (Windows / Linux / ARM6 Linux), cross-arch (x32 / x64), standalone command line file encryption program. GnuPG is probably the best application for cross-platform encryption. However, its usage on Windows PCs may be inconvenient (installation administrator rights; large executable size for perhaps just a one-time file decryption, complicated command-line switches for stronger encryption). NCrypt would fulfill this task, but does not operate on 64-bit...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 21

    libdvdetect DVD Online Database

    libdvdetect provides fast database lookup for DVDs

    .... What the library does not provide is DVD ripping and decryption. It reads the structure (e.g. titles and chapters) and generates a special checksum to look up the database. More details at http://www.dvdetect.de. The database can also be searched using a web browser at http://search.dvdetect.de/. For those who are curious I suggest downloading the binaries from https://sourceforge.net/projects/libdvdetect/files/binaries/ to try it out (windows only).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    tsdec

    tsdec

    TSDEC - the DVB transport stream offline decrypter

    ... itself neither comes with decryption keys nor enables pirate viewing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    GPG-Crypter
    GPG-Crypter is a graphical front-end to GnuPG(GPG) using the GTK3 toolkit and GPGME library. It has been developed to provide an easy access to GPG encryption and decryption. It supports encryption and decryption of text entered into the program's input fields. It also supports file encryption and decryption.
    Downloads: 42 This Week
    Last Update:
    See Project
  • 24
    kokla
    Simple tool for file encryption and folder content encryption with AES 256. Files can also be hashed with a SHA1 signature. A command line version is available as well as a GUI version. One other useful feature is to encrypt messages for emails.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    This is a more secure file encryption program which uses SERPENT cipher and WHIRLPOOL+SHA-256 hash functions in key creation and for integrity checking.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next