No hidden charges. No surprise bills. Cancel anytime.
Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
Start Free
Earn up to 16% annual interest with Nexo.
Access competitive interest rates on your digital assets.
Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform.
Geographic restrictions, eligibility, and terms apply.
it is about a GUI (Graphical User Interface ) program based on Qt4 library ,that hides data on a picture using differents method depending on picture format (BMP,JPG,PNG,...) (this is called Steganography) the data can be on any file format
jHashCalc is a GPL implementation of the popular hashing utility "HashCalc" from SlavaSoft. jHashCalc is written in Java language, and uses the GNU Crypto API to perform the algorithms' computing.
The Solitox Community system provides an integrated real-time chat service, web interface, and a scalable infrastructure for adding more services with common credentials. These interfaces allow a greater level of communication for your users.
Crypto.Net is a free and open cryptography library for C# and .Net. AES (Rijndeal), Twofish, Blowfish, RSA, Diffie-Hellman, SSL/TLS, X509-Certificate builder, stream cipher modes or a secure netowrk stream are only some features of this library.
The Cryptographic Implementations Analysis Toolkit (CIAT) is compendium of command line and graphical tools whose aim is to help in the detection and analysis of encrypted byte sequences within files (executable and non-executable).
platform independent solution to encrypt files on a portable Device. Files will be encrypted with TripleDES and hold in an XML-File. No local Installation needed.
Un programa para cambiar el orden de las palabras en una frase o las letras de una palabra u otros algoritmos. Su principal objetivo es cambiar las frases para hacerlas mas ilegibles o para aparentar ser más friki en tus conversaciones o por diversi
PHP functions and classes to add a Domain Key Identified Mail (DKIM RFC 4871) signatures to emails sent by PHP. It is based on the openssl extensions of PHP. It can generate DKIM signature but cannot verify them.
Developped and tested on PHP 4.0.
Bloppy Blowfish PHP (En/De)crypter can crypt, with a private key, text messages or files, send it via e-mail and decrypt it. You can inject a crypted message into any kind of file (like JPEG image) and send it via e-mail.
The PowerCiph Data Encryption Algorithm is a versatile, yet simplistic, encryption algorithm/protocol. The ultimate goal of the algorithm is simplicity, compactness, and a lack of prerequisites.
obov stands for OATH Based OTP validator. It's a 100% pure Java library that provides simple to use methods to validate (and related utilities) one time passwords generated by OATH compliant devices.
This library implements some of the functionality that could not be found elsewhere, and also allows for straightforward handling of POSIX threads to configuration files.
An encryption/decryption engine which can encrypt any file(text, pdf , doc, rtf , gpg , mp3 , mp4 etc..) or any data on your PC such that only you with the valid password can decrypt it.Also it will compress the file while encrypting it.
Here is a little utility I wrote to facilitate my work when I have to try methods on deciphering coded messages. Well, of course for all those who do not treasure hunts, it may seem slightly unnecessary. So for them, it can also be used to encode a messa
With this system, a person can ask a yes/no-question to group of people while their answer is kept completely anonymous. The project is based on the dining cryptographers protocol.
For system user to take backup of any confidential file(it may be code/important document)as it may contain content not meant for the others to view or the system may crash.We will be securing the backup of selected files at regular intervals of time.
CapPacketDecryptor is a MapleStory packet decrypting solution which reads .pcap files, decrypts the packets in them, and dumps them to another .pcap file, while reconstructing TCP information.