pam-openvpn is a Linux PAM-module which works together with OpenVPN. With this pam-module it is possible to establish vpn connections when a user logs into a system and tear down the connection when the user logs off. This is ideal for mobile systems.
Open Source Encryption and digital signature libraries for JMS. These librararies are writen in java and are to support secure integration through middelware/ISB/ESB
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
The Fenrir Morph Signature project aims to provide existing signatures standards with a morph capability: "Sign once, distribute many". This capability allows to use the same signature for authenticating modified, but authorized, versions of a document
Java Chaotic Random Number Generator - Inspired by chaos theory, the intent of this generator is to produce unseeded, unpredictable numbers. The numbers will not follow a predictable sequence and will not rely on a pseudorandom algorithm.
gPassword Manager, a password manager written in GTK. Lets you store all of your passwords in an encrypted file so you only need to remember 1 master password.
A secure PKI-based client/server encrypted chat engine under development in Java. Encryption will be supported via JCE and PKCS#11. A simple Java interface can be implemented by other projects wishing to develop a Java GUI or CLI for the client.
Final year project with dissertation. This will host my project for my final year dissertation. All of the features of SF will be used to the best of my ability. The tools provided by SF will assist greatly!
cryptshell is a shell used for analysable code (eg anything before wwII). It automates letter substitution, transposition, and has modules useful for breaking various weak ciphers (enigma, substitution, vinigre). It has no real practical value.
Cross-platform distributed password cracking tool, used to carry out brute-force attacks on common encryption protocols. Client/server based with administrative web interface.
Portable, optimised implementation of Bruce Schneier's 64-bit symmetric block cipher, Blowfish. Includes support for ECB, CBC, CFB, OFB and CTR block cipher modes, weak key detection and parallelisation using OpenMP.
SecureProxy is an proxy application which sits in front of a web server and enforces general security policies which prevent clients from accessing restricted portions of the website or providing dangerous or unauthorized input.
Applet loader for the Cyberflex Access Developer 32k and e-gate 32k cards. Will allow you to load the MuscleCard applet onto the smartcard and use it as cryptographic token.
Usb-Defensor is a cross-platform USB-Disk encrypt solution. It can be used to encrypt the whole USB-Disk. There is no different between common USB-Disk and encrypted(Usb-Defensor) USB-Disk in opterating.
Huskarl is an alternative authentication and key exchange schema for Bluetooth devices.Huskarl produces secure shared link keys between two devices using public key cryptography.
We're working on developing a standard encryption API for the Python language,
and building a set of standard cryptography modules. The CVS tree is open
to anyone who needs it for a Python/crypto related package.
The program uses a number of processes to brute-force crack MD5 hashes.
MD5 brute-force cracking involves hashing all possible strings and each
time compare the obtained hash to the one we are trying to crack