Showing 12 open source projects for "sha3-256"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Top-Rated Free CRM Software Icon
    Top-Rated Free CRM Software

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
    Get started free
  • 1
    WeeChat

    WeeChat

    The extensible chat client

    The extensible chat client. Full-featured IRC plugin: multi-servers, proxy support, IPv6, SASL authentication, nicklist, DCC, and many other features. 256 colors, horizontal and vertical splits, smart filtering, customizable bars and much more. 8 scripting languages supported with a built-in scripts manager. Connect to your WeeChat instance from your browser, smartphone, GUI client, Emacs or even another WeeChat.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Devault

    Devault

    Decentralized alternative to proprietary and centralized cloud storage

    A Blockchain-based, self-hosted, and end-to-end encrypted cloud storage. Devault is a decentralized, self-hosted, and end-to-end encrypted alternative to proprietary and centralized cloud storage. The file gets encrypted using AES-256-CBC encryption. The encrypted file is split into pieces. The chunks are distributed across the network nodes. The root hash will be stored in your wallet on the blockchain.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    FrostWire

    FrostWire

    Search, Download, Play, Share on Bittorrent and the cloud

    ...) ● Android 7.0 or later 256 MB of RAM (512 MB Recommended) An active internet connection
    Leader badge
    Downloads: 659 This Week
    Last Update:
    See Project
  • 4
    mendelson AS2

    mendelson AS2

    Implementation of the EDIINT AS2 protocol (RFC 4130)

    mendelson AS2 is a JAVA-based open source EDIINT AS2 solution. Logging- and configuration GUI (SWING), async & sync MDN, signatures, encryption, SSL, web interface, pluggable into any servlet container, TP manager, compression, optional profiles: MA, FN
    Leader badge
    Downloads: 157 This Week
    Last Update:
    See Project
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 5
    mendelson OFTP2

    mendelson OFTP2

    Implementation of the OFTP2 protocol (RFC 5024)

    The mendelson OFTP2 is a JAVA-based open source OFTP2 solution. It contains a logging- and configuration GUI (SWING) and supports encryption, digital signatures, message compression, SSL, certificate exchange, message routing, mail notification
    Leader badge
    Downloads: 77 This Week
    Last Update:
    See Project
  • 6
    PyCheck

    PyCheck

    Calculates the checksum of a file, and compares it to an original.

    PyCheck calculates the checksum of a file, and compares it to an original either by selecting an original copy of the file, or manually entering the checksum of the original file, such as when it is provided on a website from which you downloaded a file. In Linux this program depends on the Python3 TK package, so make sure you have python3-tk installed using your distribution's package manager before continuing. I digitally sign some files in my releases. If you'd like to verify those...
    Downloads: 16 This Week
    Last Update:
    See Project
  • 7
    Skyhook

    Skyhook

    Send and recieve files securely through the IPFS network

    Send and receive files securely through the IPFS network. Skyhook is a command-line tool that allows the user to securely share files over the IPFS network. Seamless file encryption and decryption using AES-256. Local history of file names, hashes, keys and dates which can be both imported and exported easily. Ability to run off both local and remote IPFS nodes. Simply running Skyhook with no arguments gives the user a list of available commands. The only requirements for running Skyhook...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    qD Messages

    qD Messages

    Lightning fast peer-to-peer cross-platform messenger

    qDesk Messages is on track to become the first fully featured, cross-platform, publicly auditable, decentralized, real-time, dag-based end-to-end encrypted messenger with a feature to exchange goods and services and send payments. In this module, you can create end-to-end encrypted channels, organize them in folders, share the folder structure with your invite, control the channels you own, and participate in self-owned channels. Have private conversations or public channel discussions. Use...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    IP-Chat

    IP-Chat

    UDP based desktop chatting app which supports AES-256 bit encryption.

    Simple Encrypted chat application built with Java. It uses AES-256 bit block cipher algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    MOTE CSPRNG & Stream Cipher

    MOTE CSPRNG & Stream Cipher

    A family of small-state CSPRNGs and Stream Ciphers

    MOTE is a fast, small-state, cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. MOTE exhibits uniform distribution, mixes extremely rapidly, has no detected bias, and comes in three variants: MOTE8, with an internal state array of 8+4 32-bit words; MOTE16, with an internal state of 16+4 words; and MOTE32 with a 32+4-word state. The former permit seeding with a key of up to 256 or 512 bits, the latter with a 1024-bit key. Reduced to essentials, MOTE is only 5...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    The MOTET Cipher & SE Scrambler

    The MOTET Cipher & SE Scrambler

    A tiny, fast encryption tool in C

    MOTET is a tiny, fast super-encipherment application written in C, featuring the new CSPRNG/stream ciphers MOTE and BEDBUG in each of their three variants, as well as the "gold standard" among ciphers, ISAAC. MOTET brings multiple levels of encryption, including a ciphertext-hash, a Vigenere mixing function, a choice of Caesar MOD or Caesar MIX ciphering on the primary key-stream, plus a deeply scrambled "outer shell" as a final super-encryption stage. A unique nonce IV guarantees that...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    BEDBUG CSPRNG & Stream Cipher

    BEDBUG CSPRNG & Stream Cipher

    A family of FLEA-inspired CSPRNGs and Stream Ciphers

    BEDBUG is a small, fast, cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It exhibits uniform distribution, mixes rapidly (with worst-case avalanche better than 16-bits), has no detected bias, and comes in three variants: BEDBUG128, with an internal state array of 128+3 32-bit words; BEDBUG256, with an internal state of 256+3 words; and BEDBUG512 with a 512+3-word state. The former permit seeding with a key of up to 4096 or 8192 bits, the latter with a 16384...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next