Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Java code for signing and handling Croatian fiscal service requests
Java code for signing and handling requests for Croatian fiscal service. Includes unsigned and signed xml samples. For completeness of project my personal testing key is included. Units tests with sample data are available for the ease of use. Whole Eclipse project is committed to source forge Git.
Commercial support for implementation into different java application is available upon request.
Enjoy
Secure Hash Algorithm variant of the nist maintained Secure Hash Algorithm. this is a 1024 bit digest. Comments suggestions always welcome. Rick
Removed old downloads as they are long outdated. The update is the last version I worked on. Algorithm is based on the SHA2 digest. I may work on an updated version for c++11
Crypto is a new cryptographic software which uses common encryption algorithms among with a key word to protect your most valuable files! It now comes with a Console, which is the same as Crypto but with a more professional look.
MD5-utils is a script for MD5 hash function manipulations. It can crypt one or more word(s) and try to crack one or more hash(es) using online servers.
Skein 512-512 hash algorithm implemented in Bash. Prepare to have your CPU pegged, and for simple hash calculations to take around 10 seconds. Hit the Home tab for details.
Implementation of Rijndael, RSA and El Gamal ciphers as well as SHA256, Blake and Blue midnigh wish hash functions. The program is for encrypting files but it can be rewritten for other purposes.
Want to create your own CA? Have a pain typing openssl command? With Certificate Utilities, we include many functions like create private key. This is the most professional and free certificate toolkit based on openssl and lisenced under under GPL!
MS windows shell script to create simple certificate infrastructure. Handle self signed root certificate (CA), service certificates (https server for example) and user (personal) certificates.
Tener un software avanzado para gestión de proyectos basada en trac. Disponibilidad de Firma Electrónica mediante Tarjetas Inteligentes o archivos de claves. Crear un sistema completo de información de forma muy rápida
This project involves implementing simulations of Enigma machines and the Turing bombe on various parallel-computing systems including multi-processor PCs, Linux clusters, and modern enhanced graphic cards.
Java project.
A java application that creates jars with encrypted content inside. With a selfextract and decrypt built in.
GUI aswell as console functionallity.
Options to include a key salt inside of the jar to hinder bruteforce attempts.
File Crypter is a Simple program, that is able to encrypt your files and decrypt them. A version of File Crypter is included as an example in the xCrypter Library and is called "ncrypter" which is short for "new crypter".
Semeir is a Encryption algorithm, Capable of block encryption. It is written in pure C. It is platform independent, and is promising for Embedded systems. Intended as an alternate, yet secure data encryption cipher.
This project is dedicated to creating encryption programs, along with their decryption counterparts. The encryptor will encrypt any file (that I've tested) and decrypt a file.
A package of Rijndael, Twofish and Serpent encryption algorithms implemented in x86 assembly. Meant to learn basics of assembly, learn about the algorithms or to be used in a C program.
This software is a set of tools that hides C source code in txt files. Also the software is able to restore the txt files to C source code again. This work is based on the tool c2txt2c by Leevi Martilla. Csteg needs a book file in txt format to hide C so
EverCrack cryptanalysis engine. The goal is cryptanalysis of any class of cipher. The focus now is the kernel - cryptanalysis of unilateral monalpha substitution ciphers extremely quickly, and later, cryptanalysis of complex ciphers for the kernel.
Securing mails without involving user. Secures them as often as possible if it is possible. Shows security-state and process of mails and mail-partners.
Real-Time Proactive Secret Sharing Library for RTAI is an implementation of the Shamir's secret sharing scheme and Herzberg's proactive secret sharing algorithm. The library uses a port of GNU GMP in order to make multiple precision arithmetic operatio
SSPE: Simple Security Policy Editor is a simple distributed firewall with an central ascii administration. It uses two plain manually edited ascii-files and some other, static files for each of the target-machines to generate iptables.
Java Crypt Framework (JCryptFX) is a java-based education project for de-/encrypting streams. It has a implementation of DES and TripleDES in it but the framework user can write own cryptography algorithms and stream types for it - includes a console app
Cryptographically secure your files with asymmetric and symmetric keys, as well as password based encryptions and file/text checksums. Use upto 6 different keys to encrypt/decrypt and get checksums using MD2, MD5, SHA1, CRC32, etc..