Showing 204 open source projects for "gimp-program"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 1

    Largest Generic Hash and HMAC Program

    57 Hash Functions In One Program, plus each with HMAC or KMAC

    FEHASHMAC is the largest collection of publicly known hash algorithms integrated into a command-line utility. FEHASHMAC contains a set of known test vectors and results for each algorithm such that the correct implementation for each hardware platform and compiler version can directly be verified. Currently 57 hash algorithms like sha1 sha224 sha256 sha384 sha512 and variants, sha3 and shake, all SHA3 finalists and blake3, md2 md4 md5 md6, rmd128 rmd160 rmd256 rmd320, whirl gost lash160...
    Leader badge
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    RHash
    RHash (Recursive Hasher) is a console utility for computing and verifying hash sums of files. It supports CRC32, CRC32C, MD4, MD5, SHA1, SHA256, SHA512, SHA3, AICH, ED2K, DC++ TTH, BTIH, Tiger, GOST R 34.11-2012, RIPEMD-160, HAS-160, EDON-R, and Whirlpool.
    Leader badge
    Downloads: 1,183 This Week
    Last Update:
    See Project
  • 3
    Vigenère

    Vigenère

    A powerful tool for cracking the Vigenère cipher

    Vigenère is a program for encrypting and decrypting text using the Vigenère cipher. Built-in cryptanalysis tools make it possible to crack the cipher without needing the key — or even knowing its length.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Java-Enigma

    Enigma Encryption Simulator in Java

    This program is an offline and stand-alone Java application which simulates the Enigma encryption machine that was used during World War II.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Auth0 B2B Essentials: SSO, MFA, and RBAC Built In Icon
    Auth0 B2B Essentials: SSO, MFA, and RBAC Built In

    Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.

    Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
    Sign Up Free
  • 5
    BWTC32Key

    BWTC32Key

    A file compressor with AES256CTR and Base32768 binary-to-text encoding

    BWTC32Key is a program I wrote that compresses data, then optionally encrypts it, and then outputs a Base32768 representation as the final output
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    PCSecrets

    PCSecrets

    Encrypt and manage secret text data

    ...Use it as a password manager or just somewhere to hold any text data securely in one place. It can hold a second, hidden set of secrets that is undetectable and plausibly deniable. The program is also a PC counterpart of the Secrets for Android app. It uses the same data structure and provides synchronization that allows easy transfer of secrets between the two. For those who find the personal computer environment more comfortable for data entry and editing (i.e. a real keyboard), PCSecrets provides an alternative way to manage your secrets. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    Password Keeper + Generator

    Password Keeper + Generator

    Free portable cross-platform graphical multi-user password manager

    ...DB for each pkg-user is encrypted and protected by pkg-user hash. In addition - passwords in DB are stored in encrypted form. In result - stored passwords are double encrypted ! Passwords of pkg-users are not stored in program - stored and compared only hashes. Support md2, md5, sha1, sha256, sha384 and sha512 hash. Support export DB to CSV, HTML, XLS or XML and import from CSV, XLS or XML. Simple and intuitive GUI - Graphical User Interface. PKG use crypto security random generator. Developed with Java Spring Framework. Tested in Windows/Linux. Need Jre-1.8 - https://www.oracle.com/java/technologies/javase/javase8-archive-downloads.html. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Pasword generator RORG

    Pasword generator RORG

    Securely generate passwords using UTF16 and Random.org

    ...INSTALATION: No installation is needed. Simply extract the folder PR-RORG.zip and use it. The application keeps its settings (including the API key) in its folder located within C: Program Files. Frequently asked questions (FAQs) in file FAQ.txt
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Private File

    Private File

    Container software to encrypt files.

    ...E' possibile gestire più archivi, e salvarli su pen-drive o altro supporto removibile. . Container software to encrypt files. It is possible to create a tree of folders and manage them as you wish, the files inserted into the program are automatically encrypted and shown as in Windows Explorer. All encrypted data is managed by a file saved in a location decided by the user. It is possible to manage multiple archives and save them on a pen drive or other removable media. . Supported operating systems: Windows™ x86 / 64bit
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 10
    bitcrypt

    bitcrypt

    BitCrypt is a free ultra-strong encryption that hides text in bitmaps.

    ...In this manner, another party can access it without anyone realizing that information is transmitted. The program hides the complexity of its inner workings and is easy to use. It requires only a few steps to perform the task of storing and retrieving text.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Checksum Control
    A program to verify and write checksumfiles. It supports SFV and MD5 , even some exotic MD5 file types. Very easy to use, with a wizard interface.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 12
    EncrypIT

    EncrypIT

    Program to quickly and easily encrypt or decrypt files or directories

    Program to quickly and easily encrypt or decrypt files or directories using Encrypting File System (EFS) as well as add and remove domain user EFS permissions to a file. There is also a button to view the info on an encrypted file as well as for backing up a users EFS PFX certificate.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 13
    Mkpass

    Mkpass

    Mkpass - Command line Secure Password Generator

    ...https://en.wikipedia.org/wiki/Random_password_generator This is a single executable JAR file. While you will need Java installed, there is no need to install this program. Just download the JAR file, please it somewhere convenient, and execute it from the command line: java -jar mkpass.jar See home page for additional details and usage instructions. https://github.com/frossm/mkpass
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14

    GUI File Encrypter

    Just A Few Clicks To Encrypt Your File

    Simple GUI File Encrypter 128-bit AES in CBC mode and PKCS7 padding, with HMAC using SHA256 for authentication. Requirements: - Python 3.9 - Dependencies are required to be installed, Read the README.txt file for instructions. How To Run The Program: - Windows: Just run GUI File Encrypter.py - Mac / Linux: Open Terminal, navigate to folder with the program files & type "python3 GUI\ File\ Encrypter.py" without the quotes If you need to rename the file you can just make sure the extension stays ".py"
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Certificate create and sign tool

    Certificate create and sign tool

    Easy create and sign x509 certificates and generate RSA key pairs

    With this tool you can create and sign x509 certificates, certificate request, create self-signed certificates, RSA private and public keys with simple and intuitive GUI. This program is using OpenSSL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    XORCrypter

    XORCrypter

    Little program for encryption-decryption.

    Little program that uses the bit XOR operation for encryptioning and decryptioning, for now, just text files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    With this python program you can crypt your text files with password!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    CKK Encryption

    Fast and unbreakable encryption

    ...I'm not a mathematician "not even sure what they are" but I think the results equal n exp 256 + n exp 256 + n exp 256 * n exp 2,147,483,647. Again, not a mathematician. This project was written using VS 2019 Community Edition. C# .NET Framework 4.7.2 I have included a sample program or change the source to fit your needs. I'm working on documenting the class so you can easily make changes as needed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Passwords Generator

    Passwords Generator

    If You want to change your passwords globally, this program is for You

    The program by getting input from the user can generate any number of passwords from the range 1 - 10000. The length of the password can by from the range 1 - 40. Also, you can save passwords in the file with the .pass extension. The program takes very low memory on your computer. You don't have to install a program - it's just a jar file ready to run.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    TraySafe

    TraySafe

    Elegant and reliable profile data storage

    ...PIN functionality is included in versions 1.1.0 and above. The serious perk of the app is that all the info is saved as encrypted data in the data.tsf file in the program directory. The simple yet effective encryption algorithm has a password hash, salt key and vigenère cipher key that are changed with every update. The only thing you have to do when updating is to delete the .tsf files and re-enter all your info again so that it can be encrypted using the new parameters. Detailed How-To can be found in the project wiki.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    TinyObfuscate

    TinyObfuscate

    A tool for strings obfuscation tool in c++ by Michael Haephrati

    When you need encrypt/obfuscate strings in your program so that they don't just show up with a strings or hex tool when your executable is examined, this tool can be useful. See Code Project article: https://www.codeproject.com/Articles/1210398/Small-String-Obfuscator by Michael Haephrati
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    iTelliHashCSV

    iTelliHashCSV

    Cryptographic Hashing Application for CSV Files

    iTelliHashCSV is a cryptographic “one-way” hashing application designed to securely protect sensitive or private information from disclosure. Proper use of this program allows organizations, businesses, and individuals (i.e., the data owners) to share complete/intact datasets containing sensitive data with others without actually disclosing the sensitive or private information. Additionally, if such datasets are subsequently modified or enhanced through value-added services or products provided by other organizations or individuals and then returned, the data owner retains the ability to “re-map” the hashed sensitive data values back to their original values.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    CheckMate

    Utility to generate and verify checksums/hashes

    CheckMate is a program designed to generate all kinds of checksums and/or hashes. Checksums can simply be displayed or saved and used to verify the integrity of a file later on.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    PyCryptImg

    CLI image text encryption using python

    Simple python program to encrypt up to 255 character text into .png or .bmp images. VIEW the README for further instructions as well as image specifications. Used pyinstaller to compile into an .exe ---Feedback is welcome ---
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    SimpleHNC

    Very Simple Hash value calculater and Checksum Tool

    You can use this program to calculate your file Hash value, also you can use this to verify the file you had downloaded.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB