Showing 32 open source projects for "sha-256"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 1
    mendelson AS2

    mendelson AS2

    Implementation of the EDIINT AS2 protocol (RFC 4130)

    mendelson AS2 is the JAVA-based open source EDIINT AS2 solution. Monitoring- and configuration GUI, async & sync MDN, signatures, encryption, TLS, web interface, pluggable into any servlet container, partner manager, certificate manager, data compression, optional profiles: MA, FN. Localized to Spanish, Italian, Portuguese, German, English, French, Polish
    Leader badge
    Downloads: 223 This Week
    Last Update:
    See Project
  • 2
    ADAMANT Messenger Progressive Web App

    ADAMANT Messenger Progressive Web App

    ADAMANT decentralized Messenger, progressive web application

    ...Apps have no access to the contact list or geotags, IPs are hidden from chatters and paranoids can use Tor app. All the messages are encrypted with the Diffie-Hellman Curve25519, Salsa20, Poly1305 algorithms and signed by SHA-256 + Ed25519 EdDSA. Private keys are never transferred to the network.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    WeeChat

    WeeChat

    The extensible chat client

    The extensible chat client. Full-featured IRC plugin: multi-servers, proxy support, IPv6, SASL authentication, nicklist, DCC, and many other features. 256 colors, horizontal and vertical splits, smart filtering, customizable bars and much more. 8 scripting languages supported with a built-in scripts manager. Connect to your WeeChat instance from your browser, smartphone, GUI client, Emacs or even another WeeChat.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    mendelson OFTP2

    mendelson OFTP2

    Implementation of the OFTP2 protocol (RFC 5024)

    The mendelson OFTP2 is a JAVA-based open source OFTP2 solution. It contains a logging- and configuration UI and supports encryption, digital signatures, message compression, TLS, certificate exchange, message routing, mail notification
    Leader badge
    Downloads: 23 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 5
    GameNetworkingSockets

    GameNetworkingSockets

    Reliable & unreliable messages over UDP

    ...The basic idea is for the receiver to efficiently communicate to the sender the status of every packet number (whether or not a packet was received with that number). By remembering which segments were sent in each packet, the sender can deduce which segments need to be retransmitted. Encryption. AES-GCM-256 per packet, Curve25519 for key exchange and cert signatures. The details for shared key derivation and per-packet IV are based on the design used by Google's QUIC protocol. This library has shipped on consoles, mobile platforms, and non-Steam stores, and has been used to facilitate cross-platform connectivity. Contact us to get access to the code.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    BlackBelt Privacy Tor/i2p+WASTE+VidVoIP

    BlackBelt Privacy Tor/i2p+WASTE+VidVoIP

    Browse on Tor/i2p, Anon p2p Chat / FileTx, Conf / Video VoIP

    Open Source - GPLv3 inc images. *** PLEASE NOTE: There are now 2 seperate versions here. *** One is Pre Firefox 57. The other is Post Firefox 57. *** For those providing mirrors, please enable your users to realize this. Vidalia Based, Tor as a Service Solution. MicroSip: enables FREE PC to PC video calling with no account sign-up and no middleman server. WASTE: enables FREE Conference VoIP, chat, file transfer and support. *** AI Powered *** Tor/i2p: enables safer...
    Downloads: 55 This Week
    Last Update:
    See Project
  • 7
    PyCheck

    PyCheck

    Calculates the checksum of a file, and compares it to an original.

    PyCheck calculates the checksum of a file, and compares it to an original either by selecting an original copy of the file, or manually entering the checksum of the original file, such as when it is provided on a website from which you downloaded a file. In Linux this program depends on the Python3 TK package, so make sure you have python3-tk installed using your distribution's package manager before continuing. I digitally sign some files in my releases. If you'd like to verify those...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Chat of Death
    Chat of Death is an anonymous, peer-to-peer encrypted communication application designed for maximum privacy and security. Maybe you guys will have better luck with it then I do. There's a bit of latency do to the Tor network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    FrostWire

    FrostWire

    Search, Download, Play, Share on Bittorrent and the cloud

    ...System Requirements Any of the following operating systems: ● Windows 10, 8, 7, Vista for Intel processors (64-bit only) ● Mac OS X 10.11 (El Capitan) or later (64-bit) ● Linux, Unix such as Solaris (64-bit) ● Android 7.0 or later 256 MB of RAM (512 MB Recommended) An active internet connection
    Leader badge
    Downloads: 425 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 10

    Portable Text Encryption

    Single Linux or Windows binary for secure text encryption

    Self contained and completely portable binary encrypts text for secure email, messaging, irc use, etc., ideal for USB flash drives. AES-128/192/256 (ecb/cbc), Blowfish (ecb/cbc), DES / TripleDES (ecb/cbc/ofb/cfb), or RC4. Linux and Windows binaries. I don't make cute interfaces, it just works. https://codeberg.org/BloodFeastMan/pte I would also recommend FTC, encrypts both files and text using the same interface as PTE, and a separate encryption and hashing engine I wrote in Crystal, and is much faster than PTE: https://sourceforge.net/projects/ft-crypt/
    Downloads: 7 This Week
    Last Update:
    See Project
  • 11
    Bhakti-Apps
    This app is meant for a simplified user experience, perfect for note takers. It has a good encryption system, and the best feature is that it works on the CLI, so its compatibility is great.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Plum Harbor Deutsch

    Plum Harbor Deutsch

    German version of the "Plum Harbor" file sharing app.

    Eine experimentelle Dateifreigabe App, die mit Next.js und Perplexity entwickelt wurde und es den Nutzern ermöglicht, Dateien einfach zu teilen, zu empfangen, zu senden und erneut zu senden. Die App verwendet ML-KEM-1024, ChaCha20, Serpent-256 und HMAC-SHA512, um die Vertraulichkeit und Integrität der Daten zu gewährleisten. Außerdem ist die App mit einem speziellen Passwortspeicher ausgestattet. Schau es dir an unter: https://plum-harbor-deutsch.netlify.app/ GitHub: https://github.com/Northstrix/plum-harbor-deutsch Codeberg: https://codeberg.org/Northstrix/plum-harbor-deutsch English Version: Deployed app: https://plum-harbor.netlify.app/ SourceForge: https://sourceforge.net/projects/plum-harbor/ GitHub page: https://github.com/Northstrix/plum-harbor Codeberg page: https://codeberg.org/Northstrix/plum-harbor
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Plum Harbor

    Plum Harbor

    An open-source file sharing app built using Next.js and Perplexity.

    An open-source file sharing app built using Next.js and Perplexity. The app employs ML-KEM-1024, ChaCha20, Serpent-256, and HMAC-SHA512 to ensure data confidentiality and integrity. The app is also equipped with a dedicated password vault. Check it out at https://plum-harbor.netlify.app/ GitHub page: https://github.com/Northstrix/plum-harbor Codeberg page: https://codeberg.org/Northstrix/plum-harbor The app is available in English and Hebrew.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Devault

    Devault

    Decentralized alternative to proprietary and centralized cloud storage

    A Blockchain-based, self-hosted, and end-to-end encrypted cloud storage. Devault is a decentralized, self-hosted, and end-to-end encrypted alternative to proprietary and centralized cloud storage. The file gets encrypted using AES-256-CBC encryption. The encrypted file is split into pieces. The chunks are distributed across the network nodes. The root hash will be stored in your wallet on the blockchain.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Skyhook

    Skyhook

    Send and recieve files securely through the IPFS network

    Send and receive files securely through the IPFS network. Skyhook is a command-line tool that allows the user to securely share files over the IPFS network. Seamless file encryption and decryption using AES-256. Local history of file names, hashes, keys and dates which can be both imported and exported easily. Ability to run off both local and remote IPFS nodes. Simply running Skyhook with no arguments gives the user a list of available commands. The only requirements for running Skyhook are the ipfshttpclient and skyhookfilecrypt modules for Python 3.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Novel Insight Inner Circle

    Novel Insight Inner Circle

    Graphical message and file encryption tool

    ...NOTE: By using encryption twice the implementation is (in theory) vulnerable to Meet-In-The-Middle attack reducing key size to 256bit but the attack still requires 2^256 bytes of memory making it impossible in practice.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    qD Messages

    qD Messages

    Lightning fast peer-to-peer cross-platform messenger

    qDesk Messages is on track to become the first fully featured, cross-platform, publicly auditable, decentralized, real-time, dag-based end-to-end encrypted messenger with a feature to exchange goods and services and send payments. In this module, you can create end-to-end encrypted channels, organize them in folders, share the folder structure with your invite, control the channels you own, and participate in self-owned channels. Have private conversations or public channel discussions. Use...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    IP-Chat

    IP-Chat

    UDP based desktop chatting app which supports AES-256 bit encryption.

    Simple Encrypted chat application built with Java. It uses AES-256 bit block cipher algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    iTelliHashExcel

    iTelliHashExcel

    Cryptographic Hashing Application for Excel Files

    iTelliHashExcel is a cryptographic “one-way” hashing application designed to securely protect sensitive or private information from disclosure. Proper use of this program allows organizations, businesses, and individuals (i.e., the data owners) to share complete/intact datasets containing sensitive data with others without actually disclosing the sensitive or private information. Additionally, if such datasets are subsequently modified or enhanced through value-added services or products...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    iTelliHashCSV

    iTelliHashCSV

    Cryptographic Hashing Application for CSV Files

    iTelliHashCSV is a cryptographic “one-way” hashing application designed to securely protect sensitive or private information from disclosure. Proper use of this program allows organizations, businesses, and individuals (i.e., the data owners) to share complete/intact datasets containing sensitive data with others without actually disclosing the sensitive or private information. Additionally, if such datasets are subsequently modified or enhanced through value-added services or products...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    NosRegister

    NosRegister

    NosRegister | WebPage

    NosRegister its an register page with server status check, developed in html, php and javascript + AJAX
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    ...You can chat with other peers in clear text or AES password-based encryption on your own computer network. The AES encryption and decryption is based on 128 bit key which is reached by padding the resulting SHA256 from your provided password. Simply put, SHA is a checksum that change when a single bit change. When you send a message with a password field, the resulting password checksum is cut at 128 bit which means 16 characters bytes KEY is entered into AES 128 bit encryption and decryption scheme. The resulting ciphertext is sent to the server while the server relay it to the connected peers. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    cdmessenger

    cdmessenger

    Advanced Instant Office Messenger Software by CDMesseger

    ...Your employees can communicate across the hallway or across the world. Easy to download, install and launch, CDMessenger secures all your communication by encrypting all the chat messages with 256 bit SSL encryption. CDMessenger produces chat transcripts which you can both review and archive. Your employees can chat with each other, with a group such as a department or a project team, or with the entire organization. Download CDMessenger today and provide your employees with a new communication channel that is known to improve office productivity and efficiency.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    MOTE CSPRNG & Stream Cipher

    MOTE CSPRNG & Stream Cipher

    A family of small-state CSPRNGs and Stream Ciphers

    ...MOTE exhibits uniform distribution, mixes extremely rapidly, has no detected bias, and comes in three variants: MOTE8, with an internal state array of 8+4 32-bit words; MOTE16, with an internal state of 16+4 words; and MOTE32 with a 32+4-word state. The former permit seeding with a key of up to 256 or 512 bits, the latter with a 1024-bit key. Reduced to essentials, MOTE is only 5 lines of code: Ten arithmetic and bitwise operations in all. It's called MOTE because a PRNG can't be made much smaller (or faster) without introducing bias or severely reducing avalanche. MOTE alternates its shift and rotation constants unpredictably, and has passed the most stringent industry-standard tests for randomness and security, including NIST & DIEHARD.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    The MOTET Cipher & SE Scrambler

    The MOTET Cipher & SE Scrambler

    A tiny, fast encryption tool in C

    MOTET is a tiny, fast super-encipherment application written in C, featuring the new CSPRNG/stream ciphers MOTE and BEDBUG in each of their three variants, as well as the "gold standard" among ciphers, ISAAC. MOTET brings multiple levels of encryption, including a ciphertext-hash, a Vigenere mixing function, a choice of Caesar MOD or Caesar MIX ciphering on the primary key-stream, plus a deeply scrambled "outer shell" as a final super-encryption stage. A unique nonce IV guarantees that...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB