Showing 310 open source projects for "using"

View related business solutions
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 1

    Cryptkeeper

    Cryptkeeper Secuirty tool

    ...some uses encryption keys and some dont. there are AES , 4DES , RC2 , RC4 , MD5 , SHA1 , SHA2 , SHA3 , SHA4 , XoR , Crypt , HeX , BINARY , Rijndael 256 , Obfuscation String , RSA , BASE64. The password manager anything saved WILL NOT BE ENCRYPTED so it is smart to protect the program from others not using it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    pwdex

    Web-based password exchange, sharing and storage system.

    Web-based password exchange, sharing and storage system. It has 2 types of passwords: private and shared. Shared ones can be shared to individual users or to groups of users. The system is written in Ruby using Sinatra framework. Storage backend is any database (e.g. MySQL, sqlite), encryption is done via AES-256.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Using encryption to secure your code or text. Click File->Run to run your code using Ruby, see the pop up for output. Never save your text or code to disk unencrypted. Don't forget your password. Encryption is error-persistent.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    ...German/Austrian ID-card and passport). It can check the numbers for correctness. Also it can extract information from the numbers (e.g. birthday) or generate numbers using custum values.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • 5
    This is a password bruteforcer for a SIP protocol using NVIDIA CUDA GPU
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    RC4-32.ASM

    Code to brute force the 32-bit key used to RC4 encrypt .pwl files.

    PROJECT HAS MOVED TO GITHUB: https://github.com/alex-georgiou/rc4-32.asm Code to brute force the 32-bit key used to RC4 encrypt .pwl files. Assembles to a 992 byte .COM file using the Intel Architecture Assembler v1.0 Copyright (c) 1998 augusto at dcc.ufmg.br. http://web.archive.org/web/19981205090800/http://www.dcc.ufmg.br/~augusto/project/iasm.zip
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    A multithreaded opensource password cracker
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Sign APK (or JAR) archives by OpenSSL, using standard private keys and certificates instead of keytool-managed keystores.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Encrypting Safe
    This is free Java desktop application to keep your note in safe from others using the Encrypting Decrypting symmetric key algorithm, it's easy to transfer your note form source to another in confidential manner.
    Downloads: 0 This Week
    Last Update:
    See Project
  • eProcurement Software Icon
    eProcurement Software

    Enterprises and companies seeking a solution to manage all their procurement operations and processes

    eBuyerAssist by Eyvo is a cloud-based procurement solution designed for businesses of all sizes and industries. Fully modular and scalable, it streamlines the entire procurement lifecycle—from requisition to fulfillment. The platform includes powerful tools for strategic sourcing, supplier management, warehouse operations, and contract oversight. Additional modules cover purchase orders, approval workflows, inventory and asset management, customer orders, budget control, cost accounting, invoice matching, vendor credit checks, and risk analysis. eBuyerAssist centralizes all procurement functions into a single, easy-to-use system—improving visibility, control, and efficiency across your organization. Whether you're aiming to reduce costs, enhance compliance, or align procurement with broader business goals, eBuyerAssist helps you get there faster, smarter, and with measurable results.
    Learn More
  • 10
    TextConverter is a graphical text editor allowing the user to encrypt/decrypt the textual contents displayed on the screen using a 128-bit AES (Advanced Encryption Standard) cipher.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    A quick and easy to use SHA1 calculator for Windows, using C# & .net. (very) Similiar in style to winMD5Sum; supports filenames passed on the command line & files drag+dropped on!
    Downloads: 17 This Week
    Last Update:
    See Project
  • 12
    Calypso is a file sharing client using the anonymous network MUTE. Developped using C++ and Qt. For windows and linux, portable to other environments.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 13
    OpenHash is a desktop application for .NET which uses the "OpenSSL .NET" managed wrapper for OpenSSL from Frank Laub (also on SourceForge) to produce the cryptographic hash value for a string or any file using any of the hash functions from OpenSSL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    AssinaFacil

    Software para assinar arquivos no formato PKCS7

    Easy and simple PKCS7 signer using java and SunMSCAPI provider.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A formally verified implementation of cryptographic algorithms using the SPARK programming language. For the complete library proofs of the absence of run-time errors are available. Some of its subprograms include proofs of partial correctness.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Language: C++ using wxWidgets and STL. Platforms: Win98/ME/2000/XP, perhaps Linux. Description: Download Manager for FTP and HTTP. Features: Resuming, priority/exact ordering, threaded downloading, mirror searching and mass adding of downloads.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Tool for encrypting files using blowfish, aes, des or cast5, File hashing with md5, sha and ripemd160, compresssion with gzip, and a nice user interface. Created using C++ with Qt framework, depends on QCA third-part Qt Library and OpenSSL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A free (as in beer) OpenSSL GUI for encrypting, decrypting and compressing files and folders, using the AES256 cipher in "salted" CBC Mode. Made for Mac OS X 10.5 (or later) Intel or PPC.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Papercrypt
    This project aims at porting visual cryptography, which only works with transparent slides, to ordinary 80g/m^2 white paper. Please read the documentation before using the program.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Aircrack-ng Windows GUI
    This is mainly just an interface tweak. Added function of mac address changer. If you have problems getting the mac changer to work, try using a mac address that starts with something other than "00" in the first octet. If you are intersted in learning about network security please check out my Juniper Networks training course at: http://academy.gns3.com/courses/juniper-jncia-intro-to-junos
    Downloads: 17 This Week
    Last Update:
    See Project
  • 21
    Small cryptic tool, using matrix key
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Derived from TrueCrypt 6.3 release, I added some command line options to "TrueCrypt Format.exe" to allow TrueCrypt volumes to be created without using the graphical user interface
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Cryptic
    Cryptic is a cryptographic applications suite for encryption/decryption of data, calculating cryptographic hashes or message digests and securing user passwords using a master password in a password safe.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    This is a new, very powerful Nsis plugin, as a wrapper around Windows CryptoAPI. It has the ability to Hash, Encrypt & Decrypt using various algorithms. It also has the Base64 encode/decode functions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    A software written in java to compute the digital signature on documents and verify them, using a smart card or a token file in p12 format
    Downloads: 6 This Week
    Last Update:
    See Project