Open Source Cryptography Software - Page 62

  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 1
    Provides a Java implementation of various Attribute Certificate (AC) functionalities. In particular, it provides various client interfaces to the Virtual Organisation Management System (VOMS) system, as well as an AC server that can act as a VOMS Server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    stands for Active Integrity Software, provide quick alert of elf file modifications. Based on Gnu/Linux OS, with a daemon to analyse datas give by the kernel module, written in C.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    akmos

    Cryptography toolset

    Command line utility for encryption/decryption files, computing message digests
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    aleXa Steganography Tool

    Tool to encode a message inside an image using LSB

    xst is a desktop tool written in C# that allows to encode a message inside an image file. The information is Encrypted, protected by a password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Let your crypto work for you

    Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 5
    alr-encrypt has moved to http://sourceforge.net/projects/encrypt
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    aamFetch is a utility for fetching your anonymous esub nym messages from the alt.anonymous.messages newsgroup (or other newsgroups). It allows multiple encrypt-subjects to scan, multiple "destination files" to save messages to and random chaff downloads.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    anonvelope is a mail-message processing program that is designed to allow the message to make full use of Type-I (cpunk-style) remailers. It is especially designed to work with Pine, but it is possible it may be used with other MUA's.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    A web-based system to assign a set of known persons anonymous ids, such that every person only receives one id. The ids cannot be mapped to the corresponding persons afterwards.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Provides steganographic cloaking for scripts and other data by interspersing sensitive lines with ANSI codes to clear themselves after drawing on a terminal. Front data, commented-out, is displayed instead.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • 10
    Sign APK (or JAR) archives by OpenSSL, using standard private keys and certificates instead of keytool-managed keystores.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    AresCrypt is a crypt program used a new cryptology algorytm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    authit

    authit

    Двухфакторная аутентификации на Linux

    Веб-приложение для удаленной настройки двухфакторной аутентификации на Linux-машинах
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    aws-encryption-sdk

    aws-encryption-sdk

    AWS Encryption SDK

    The AWS Encryption SDK is a client-side encryption library designed to make it easy for everyone to encrypt and decrypt data using industry standards and best practices. It enables you to focus on the core functionality of your application, rather than on how to best encrypt and decrypt your data. The AWS Encryption SDK is provided free of charge under the Apache 2.0 license. With the AWS Encryption SDK, you define a master key provider (Java and Python) or a keyring (C, C#/.NET, and JavaScript) that determines which wrapping keys you use to protect your data. Then you encrypt and decrypt your data using straightforward methods provided by the AWS Encryption SDK. The AWS Encryption SDK does the rest. Without the AWS Encryption SDK, you might spend more effort on building an encryption solution than on the core functionality of your application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    aws-encryption-sdk-cli

    aws-encryption-sdk-cli

    CLI wrapper around aws-encryption-sdk-python

    This command line tool can be used to encrypt and decrypt files and directories using the AWS Encryption SDK. If you have not already installed cryptography, you might need to install additional prerequisites as detailed in the cryptography installation guide for your operating system. Installation using a python virtual environment is recommended to avoid conflicts between system packages and user-installed packages. For the most part, the behavior of aws-encryption-cli in handling files is based on that of GNU CLIs such as cp. A qualifier to this is that when encrypting a file, if a directory is provided as the destination, rather than creating the source filename in the destination directory, a suffix is appended to the destination filename. By default the suffix is .encrypted when encrypting and .decrypted when decrypting, but a custom suffix can be provided by the caller if desired.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    This is a simple program to encode normal, ASCII text in to its ASCII value and then convert that number to roman numerals. Ideal for quick notes to friends that you don't want others to easily read. Unlike encryption though, I just described the algo
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    babel.lib is Babel Com Australia's PHP Components Library, which we are releasing under an open source license for other PHP developers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    badpi-cyphering

    file/stream encryption/decryption/CRC based on PI compute algorithm

    Encryption/decryption/CRC algorithm base on PI calculation. The private Key is composed of : - a starting position nb (iterations before starting encrypt) - a loop nb (in-between iteration) - small spot nb for the position in floating number part Challenge is proposed in my website.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A simple proof of concept brute forcer that depends on weak key systems depending on interest I might add more to make it more useful for things other then a reference
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    BcryptFE is a graphical frontend for controlling the bcrypt win32 command line utility. Written in vb.net 2008 and designed to allow easier encryption/decryption of multiple files and directories. Filenames can be hidden in an index file to stay private.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    bookHexor use the key.txt for encoding where is saved an arbitrary text, which is used as key. bookHexor read the key.txt and notice for each character, where it can be found as an index. If you encode text each of your charakters is displayed as index.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Brute is a brute force hash cracker, it allows the user to specify how many threads he want running simultaneously. It is fast, and modular, all the hash algorithm dependent code lies in a module (a shared library). Modules available: MD5; SHA256; SHA512
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Kernel drivers and support ports to use "Trusted Platform Modules" on FreeBSD and OpenBSD
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    This project is to create a system for secure remote administration of a unix server from a variety of different operating systems (eg unix and windows).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    it creates MD5 checksum.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Camram is a hybrid antispam system combining multiple techniques improving the users e-mail experience.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB