Open Source Cryptography Software - Page 54

  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1

    SimpleHNC

    Very Simple Hash value calculater and Checksum Tool

    You can use this program to calculate your file Hash value, also you can use this to verify the file you had downloaded.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    A Public Key Cryptographic system based on OpenSSL and MySQL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Simplebackup is a cross-platform backup program. It reads a configuration file then builds a compress backup set, finally places the compressed files into another location (a directory, a remote http,ftp,sftp server or even one or more email accounts).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5

    Simplest Text Encrypter

    A simple example of polyalphabetic cipher in Java.

    Cryptography fascinates everyone. A variety of encryption techniques and ciphers are used to code important data. A polyalphabetic cipher is one of the simplest cipher one can make. This is a Java program to implement polyalphabetic cipher. [How the cipher encodes?] Input Data: helloaf Key: love l - 12th letter in Alphabet o - 15th letter in Alphabet v - 22nd letter in Alphabet e - 5th letter in Alphabet Now: h(l) e(o) l(v) l(e) o(l) a(o) f(v) Further: h(+12) e(+15) l(+22) l(+5) o(+12) a(+15) f(+22) where +(number) meaning shifting the character forward by the respective number of places. So the result comes out to be: tthqapb and the data is encrypted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Skein 512-512 hash algorithm implemented in Bash. Prepare to have your CPU pegged, and for simple hash calculations to take around 10 seconds. Hit the Home tab for details.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    SlimPGP is a pure Java implementation of OpenPGP protocol as defined in RFC2440. Current version implements most of the features in the OpenPGP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    The Small Crypto Library is a collection of C++ classes for public and private key cryptography. The Small Secure Socket Library uses SCL for maintaining secure IP connections.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Application based on asymmetric cryptography (ECC) allows encrypt and decrypt files and generates digital signatures. Currently implemented algorithms include ECDSA and ECIES.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 10
    Smartcard key storage daemon is an application for storing transparently keys for cryptographic applications on smartcards. (ie. GnuPG or OpenSSH)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Cross-platform distributed password cracking tool, used to carry out brute-force attacks on common encryption protocols. Client/server based with administrative web interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Snarfzilla was a GUI and web browser for the official Freenet Java server. The first web browser for the dark web. It hasn't been compatible with Freenet for several years and development ceased.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Secure notes application for mobile devices (e.g. Palm).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Sobbu

    Sobbu

    Encode-Decode Tool weaponized with Hash Encrypt & Hash Cracker

    Sobbu is a cryprography tool with various encode-decode algorithm weaponized with Hash encrypting and Hash cracker via Rainbow Table method. This tool used 4 different hash database to identify hash value. Currently available for Windows (CLI + GUI) and Linux (CLI) Latest version : 1.4 Available Encode-Decode algorithm : - Base32 - Base64 - Binary - Octal - Hex - ASCII - URL - HTML - ROT13 Available Hash encrypting and Hash cracking algorithm : - MD5 - SHA1 - SHA224 - SHA256 - SHA384 - SHA512 - SHA3_224 - SHA3_256 - SHA3_384 - SHA3_512
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    General software and open source projects
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    The Solitox Community system provides an integrated real-time chat service, web interface, and a scalable infrastructure for adding more services with common credentials. These interfaces allow a greater level of communication for your users.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Speakeazy is a product already based on TrueCrypt 7.0a specifically for USB flash drives. The goal of this open source project is to enhance the encryption user interface and provide enterprise level tools similar to those of IronKey.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A Java Swing application to 'securely' store passwords using symmetric encryption. A user can set up one or many 'datastores' of password/username combinations and commit them to disk. They are stored on the file system using PBE Blowfish.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    *** PLEASE NOTE: THIS PROJECT HAS NOW MOVED TO THE MAIN SSHTOOLS PROJECT PAGE. PLEASE CLICK 'HOME PAGE' TO BE REDIRECTED ***
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    https://github.com/bentonstark/starksoft-aspen https://www.nuget.org/packages/starksoft.aspen/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Stealth Exchange SFX modules are 16548 bit strong enhanced cryptographic modules like Winzip SFX, but with Built-In Public Private Key encryption!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    This is a Win32 (.NET) front end for the StegHide stenography software.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Projeto de software parte integrante do trabalho de conclusão de curso de Tetri Mesquita Neto, do curso de Bacharelado em Informática, na Universidade Estadual do Oeste do Paraná - UNIOESTE, campus Cascavel-PR.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    StegSharp is an application built on C# 2.0 that explains the basic principles of steganography. With StegSharp the user can hide and recover text or files from image files. Supported image extensions are: jpeg and bmp.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    A tool to hide BitTorrent metainfo (.torrent files) into and restore the same back from images (and other types of files) using steganographical methods, providing friendly GUI for the process.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB