Open Source Cryptography Software - Page 14

  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    RSAT

    RSAT

    A script to perform SAT attacks on RSA

    SAT solvers are being used more and more in partial key exposure attacks. The scope of this script is to show that SAT solvers can be used in partial key exposure attacks of RSA with very good results.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Rcrypto

    Rcrypto

    Encryption Tool

    Rcrypto is the encryption and decryption software for windows XP,vista and 7 to keep your data secure from unauthorized users. It uses the highly secure algorithm to encrypt every byte of the file.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3

    SBCD

    partitioning backup recovery and all kind of boot loaders

    partitioning backup recovery and all kind of boot loaders
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4

    SHA256-in-C

    SHA-256 Algorithm Implementation in C

    Downloads: 1 This Week
    Last Update:
    See Project
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 5
    With this software, you can embed the text message into a graphic file. The result file looks exactly the same with the original. But if you use this software, you can see the hidden text inside the pciture
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    This program allows to delete safely files on system Windows (Windows XP/Vista 32 bit). In program the opportunity of adjustment of key parameters such as cycles of filling in zero and cycles of filling is stipulated by random numbers.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    Simple and secure file transfers over SSL. Same program can be server and client. Runs as a unix daemon or Windows NT service.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Semeir is a Encryption algorithm, Capable of block encryption. It is written in pure C. It is platform independent, and is promising for Embedded systems. Intended as an alternate, yet secure data encryption cipher.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    SPcrk is a tool to guess/crack valid login/password pairs for some services of system! Please use allowed only for legal purposes! If used commercially, tool name, version and web address must be mentioned in the report!
    Downloads: 1 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 10
    SimpleKey

    SimpleKey

    Generates keys up to 500 characters and hashes.

    Ever wanted a random key generator? With SimpleKey, you can generate random keys up to 500 characters in length and save them to text files. These keys can be all numerical, alphanumeric, all alphabetical or the previous three plus special characters. You may use your generated key for whatever purpose. SimpleKey also includes a hash table with which to hash strings and files alike. Hash algorithms include: MD4/5, Sha, Skein, Keccak, Grostl, JH, and Blake.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    This project currently provides a set of modules that enable the use of smartcard based authentication & digital signature security services. It also interact with the OpenCA project to provide a smartcard-based PKI.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    Steganopic is a steganography program that hides information in a multitude of file formats without any apparent change to the original file.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    StrongKey PKI2FIDO

    StrongKey PKI2FIDO

    Web application to register FIDO keys from TLS ClientAuth sessions

    StrongKey PKI2FIDO is a web application written in Angular and Java using REST web service calls for client-server communication. The application enables users that have X.509 digital certificates (optionally, on smart cards—such as the PIV card or CAC) to strongly authenticate to PKI2FIDO using TLS ClientAuth and then register a FIDO Security key with a FIDO Server (such as StrongKey FIDO Server at https://sourceforge.net/projects/strongkeyfido/). The TLS ClientAuth strong authentication process validates the digital certificate's chain (if any) and uses CRLs to verify the certificate's revocation status (OCSP checking will come in the next release). Once the certificate chain is validated, it checks an LDAP server to determine if the user is authorized to register a FIDO Security key with the site. Since PKI2FIDO is a sample application, a De-register button is enabled to delete FIDO keys; This enables the user to keep testing with the same username.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    Substitution Cipher Toolkit

    Substitution Cipher Toolkit

    Substitution cipher toolkit (en/decryption + automatical cracking)

    This substitution cipher toolkit enables you to en- and decrypt texts with substitution cipher, to gather language statistics of a specific language and to crack encrypted texts both manually and automatically. All functions can be accessed via an easy-to-use graphical user interface.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    T2DECODE

    T2DECODE

    Offline-first cybersecurity and system learning platform (Flutter)

    T2DECODE — Plateforme locale d’apprentissage technique T2DECODE est une suite native conçue pour l’apprentissage pratique de l’informatique, des réseaux et de la cybersécurité. Porté par l'association TUTODECODE, le projet applique le principe du "Privacy by Design" : exécution 100% locale, zéro télémétrie et souveraineté absolue sur vos données. SPECIFICATIONS TECHNIQUES * 100% Offline-first : Fonctionne sans Internet. Idéal pour zones blanches ou architectures sécurisées (Air-gapped). * Souveraineté : Pas d'analytics, pas de trackers, pas de comptes obligatoires. * IA Locale : Support optionnel des LLM via Ollama pour une assistance privée sans API tierce. MODULES INTÉGRÉS * Réseau : Simulateur de masques de sous-réseau et calculs CIDR. * Système : Gestionnaire et traducteur interactif de permissions Unix (chmod). * Cryptographie & Outils : +15 utilitaires offline (Hachage SHA-256/MD5, diagnostics). Idéal pour étudiants (BTS SIO, BUT) et admins. Licence GPLv3.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    Thumbnail steganography creates a thumbnail from a source image and stores data in it by altering it's color channels. To decipher the data, a new thumbnail is made from the original image and the differences between the pixels are calculated.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    This software implements the time stamp service. (mainly implements the Hierarchical Time-stamp Protocol. This protocol is proposed in a published paper which can be found in this package.)The code can help you to construct your time-stamp server.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    TimeStampClient
    RFC 3161 time-stamping .NET client library and application. Please visit project website - https://github.com/disig/TimeStampClient - for more information.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    jTcGui is a Java Tool for managing TrueCrypt volumes on Linux. Requires TrueCrypt and JAVA 6 installed to run.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Twinkle

    Twinkle

    Twinkle is an open-source text editor.

    Twinkle is an open source text editor that saves the documents in an encrypted form.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    Ncurses based tool for easily deploying IPsec tunnels using FreeSWAN (Linux only) Easy to configure a tunnel, simple options, user friendly interface
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    Vigenère

    Vigenère

    A powerful tool for cracking the Vigenère cipher

    Vigenère is a program for encrypting and decrypting text using the Vigenère cipher. Built-in cryptanalysis tools make it possible to crack the cipher without needing the key — or even knowing its length.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    Webswell Connect is a business integration tool based on WS web services, ebXML and AS2 standards. Installer includes ebXML Registry/Repository, universal Message Service Handler and Dispatcher and supporting software. Tech support at www.webswell.com
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    WinAuth 2 Way Authentication

    WinAuth 2 Way Authentication

    Free 2 way Authentication for Windows

    WinAuth is a free 2-way authentication software for Windows. This app adds a second layer of security to your Windows Login screen, which can only be unlocked with your secret password and USB Key or by scanning a barcode on the Android Client. You can download the android client from Google Play (WinAuth Unlock Client). This app works on Windows XP all the to Windows 10. NOTE: The barcode may sometimes fail on windows XP
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    A simple Win32 application to encrypt and checksum files of any size. Uses 3DES cipher-block-chained encryption, with a 128 bit key. It makes it dirt simple to protect your sensitive files. Good for sending things over unsecured email, stuff like that.
    Downloads: 1 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB