Open Source Cryptography Software - Page 10

Cryptography Software

View 5809 business solutions
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Let your crypto work for you

    Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 1
    ClearPass (formerly BlowPass) is web based password storage system that uses the Blowfish algorithm and a Host-Proof design pattern.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    CryptoPy is a pure python implmentation of cryptographic algorithms and applications. The algorithms are developed for readability more than speed. The collection now includes IEEE 802.11i specific algorithms that generated the test vectors for 802.11i.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    Cryptomak contains cipher and tools for encryption utility written in php such as substitution, vigenere, affine, transposition and index of coincidence. It is powered by Phrame platform which implements MVC design and Smarty template engine.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    Steganography program. Crypture encrypts (1024 bit key) and stores files in Windows bitmap files. Only 6 KB, with no install required. Fills all bits with noise, to slip by standard steganalysis methods. Data header is encrypted and scattered as well.
    Downloads: 3 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 5
    This is a project that simulates the German Military Enigma machine during WWII.. It is a project for beginers to learn to program and to meet people. If anyone is interested in helping, please email me @ dustin@rockhill.org
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    A plugin for the popular OS X IRC client Colloquy providing Blowfish-encryption
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    IMPORTANT -- This is an old project that is no longer supported and should not be relied upon for serious applications. If your looking for encryption software, I suggest OpenSSL or GnuPG which are better equipped.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 8
    FullDiskHash

    FullDiskHash

    Get and save hashes of files in a drive or folder.

    Get and save hashes (MD5 and SHA256) of files in a drive or folder. In later stages of the project, it will be possible to compare the hashes with previous scans to check which files have been changed. Additional information such as the author of the software or its certification in the case of executables or libraries is also read.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    GnuPG Components for Delphi and freepascal
    Downloads: 3 This Week
    Last Update:
    See Project
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 10

    Java-Enigma

    Enigma Encryption Simulator in Java

    This program is an offline and stand-alone Java application which simulates the Enigma encryption machine that was used during World War II.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 11
    LavaRnd is a random number generator that converts a digitized chaotic source (such as a lens capped web camera) into cryptographically strong random numbers. LavaRnd comes with both an APIs (currently C and Perl) as well as a number of demos.
    Leader badge
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    This is a new, very powerful Nsis plugin, as a wrapper around Windows CryptoAPI. It has the ability to Hash, Encrypt & Decrypt using various algorithms. It also has the Base64 encode/decode functions.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13
    PKS is an OpenPGP Public Key Server. It allows users to store and lookup public keys from the server's database. It can also synchronize with other servers. (This product includes software developed by Marc Horowitz.)
    Downloads: 3 This Week
    Last Update:
    See Project
  • 14
    RSA-IP is a Linux kernel net _protocol_ which encrypts IPv[4;6] using RSA public/private key.Think of it as a kernel level implementation of ssl. RSA needs prime number so we release a prime searcher.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 15
    The Racal Simulator Library is an implementation of a software emulation of the Thales (formerly Zaxus, formerly Racal) RG7000 Host Security Module cryptographic device. (Note: This project is now hosted at Codeplex as ThalesSim).
    Downloads: 3 This Week
    Last Update:
    See Project
  • 16
    This program allows to delete safely files on system Windows (Windows XP/Vista 32 bit). In program the opportunity of adjustment of key parameters such as cycles of filling in zero and cycles of filling is stipulated by random numbers.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 17
    An anonymizing peer-to-peer file storage network, similar to Freenet and Gnutella - only better, of course.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 18
    An extremely versatile neural net. Hopefully.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 19
    VersionInfo

    VersionInfo

    Generate file version information

    This command-line utility produces a report of file information including version information where available. The reports can be useful for release information, manifests, and integrity verification.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 20

    Vigenere Dictionary Attack

    Vigenere brute force / dictionary cracking tool

    This is a tool that uses a combination between a brute force and dictionary attack on a Vigenere cipher. At present, keys are generated using brute force (will soon try passwords generated from a dictionary first). Each key is then used to decode the encoded message input. The output is analysed and then put into a ranking table. Outputs will be ranked on a variety of factors (at present, only number of dictionary words in output are counted). For the future: Better key generation, trying combinations of dictionary words with numbers. If that fails, brute force will be used. For all attempts of the dictionary attack, only keys within the known key length range will be generated. Better ranking system and analysis of possible decoded messages. Note: The version currently released, I made in an evening! It is nowhere near ready for release but is a fun project to think about and I need more ideas for improvements mentioned above. Discuss possible solutions and ideas!
    Downloads: 3 This Week
    Last Update:
    See Project
  • 21
    Vigenère

    Vigenère

    A powerful tool for cracking the Vigenère cipher

    Vigenère is a program for encrypting and decrypting text using the Vigenère cipher. Built-in cryptanalysis tools make it possible to crack the cipher without needing the key — or even knowing its length.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 22
    Cumulus4j is an encryption plug-in for DataNucleus. Applications can thus use JDO or JPA to persist their data into every common database. Using the Bouncy Castle cryptography libs, it provides strong encryption via AES, TwoFish or other algorithms.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 23
    pgpenvelope is an interface between Pine and the GNU Privacy Guard (GnuPG). It allows one to perform expected OpenPGP-related operations on messages. Ease of installation, setup, and use are distinguishing features.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 24
    pup2p is a remaster of the Puppy Linux livecd distro and is aimed at use with the anonymous network I2P. It includes I2P as well as a number of I2P related apps. NOTE: The ISO is currently VERY out of date! Sorry for my absence. I may try to update the project soon. The SFS file IS up to date as of this change. 03/2013
    Downloads: 3 This Week
    Last Update:
    See Project
  • 25

    sha3sum and then some

    sha3sum - A demonstration of the Keccak permutation.

    Hash mode interface to the Keccak code package. This program illustrates the use of the Keccak permutation. Usage is much more than a hash function. The NIST compatible settings are subject to change when they publish FIPS PUB 180-5. I wrote this program when evaluating the permutation and developing tree hashing for the Intel(R) MIC architecture.
    Downloads: 3 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB