One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
Try Free
Earn up to 16% annual interest with Nexo.
Access competitive interest rates on your digital assets.
Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform.
Geographic restrictions, eligibility, and terms apply.
RotNN is a Python module that implements rotation encryption/obfuscation. The default action is similar to rot-13, but it can also rotate over the entire UNIX printable character set.
Originally a software partnership between my best friend and myself, Diverse Developments seeks to write "useful stuff", of a very diverse nature...
Current projects include a file encoder, and a double-entry accounts package.
We at GCD are here to bring you ease in decoding your friends CRYPTIC GeekCode .signature files -=). Also sometime in the future we plan to eventualy start an ENCODER to help you even more!
A perl server that accepts plain text mails for users and sends them out encrypted. Could be used in a company so that your accountant can be in contact with the salerperson in a secure way, without you needing to tell the accountant everything about PGP
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Open Source Encryption and digital signature libraries for JMS. These librararies are writen in java and are to support secure integration through middelware/ISB/ESB
Checking the integrity of a file on a remote and local untrusted or compromised server is to be achieved with minimal computational and storage requirements on part of a healthy verifier.
openssl is well-known allover the world,but it is huge,complex.our target is develop a tinytls,it is small,simple,good understanding,and usually for embedded system.But it can support most openssl features.You can add some other features easily.
Java Chaotic Random Number Generator - Inspired by chaos theory, the intent of this generator is to produce unseeded, unpredictable numbers. The numbers will not follow a predictable sequence and will not rely on a pseudorandom algorithm.
gPassword Manager, a password manager written in GTK. Lets you store all of your passwords in an encrypted file so you only need to remember 1 master password.
A secure PKI-based client/server encrypted chat engine under development in Java. Encryption will be supported via JCE and PKCS#11. A simple Java interface can be implemented by other projects wishing to develop a Java GUI or CLI for the client.
Final year project with dissertation. This will host my project for my final year dissertation. All of the features of SF will be used to the best of my ability. The tools provided by SF will assist greatly!
cryptshell is a shell used for analysable code (eg anything before wwII). It automates letter substitution, transposition, and has modules useful for breaking various weak ciphers (enigma, substitution, vinigre). It has no real practical value.
Cross-platform distributed password cracking tool, used to carry out brute-force attacks on common encryption protocols. Client/server based with administrative web interface.
Applet loader for the Cyberflex Access Developer 32k and e-gate 32k cards. Will allow you to load the MuscleCard applet onto the smartcard and use it as cryptographic token.
Usb-Defensor is a cross-platform USB-Disk encrypt solution. It can be used to encrypt the whole USB-Disk. There is no different between common USB-Disk and encrypted(Usb-Defensor) USB-Disk in opterating.
Huskarl is an alternative authentication and key exchange schema for Bluetooth devices.Huskarl produces secure shared link keys between two devices using public key cryptography.