137 projects for "using" with 2 filters applied:

  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 1
    The purpose of this project is to provide a biometric security solution by using voice print, fingerprint and/or facial recognition along with a password and/or smart card support using AES to protect data. Please read forums for if interested.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Ncurses based tool for easily deploying IPsec tunnels using FreeSWAN (Linux only) Easy to configure a tunnel, simple options, user friendly interface
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Password Keeper: Password Keeper will be a program that lets you put all of your passwords in one file and encrypt it easily instead of using a flat file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    StegoGO is an open source software that allows the embedding of hidden data in GO games, using GNUGo. It allows both the embedding of hidden data in an already existing GO game, and the creation of new GO games to hide data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5
    A Secure Diary Program written in Java and using the bouncycastle JCE Cryptograpic library. It uses a combination of BlowFish and TripleDES (XORed) to encrypt Diary entries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A small bash script to create, mount and unmount an encrypted partition / file. Using the kernel's cryptoloop, and all encryption cyphers supported.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Cryptar is a cryptographic network backup program that is able to be very efficient with network resources by using an algorithm derived from the rsync algorithm. It uses SHA-1 hashes to verify (sign) its data and AES to encrypt it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Simple XOR Encryption is written in c++ and can encrypt files using insecure XOR encryption. Could be used to form framework for implementing XOR encryption in other programs, such as encrypting save game files in games, etc. Tested on Windows + Linux.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    A hybrid dictionary/brute passphrase search tool for PMK discovery on 802.11 networks using WPA with preshared keys (PSKs)
    Downloads: 0 This Week
    Last Update:
    See Project
  • All-in-one security tool helps you prevent ransomware and breaches. Icon
    All-in-one security tool helps you prevent ransomware and breaches.

    SIEM + Detection and Response for IT Teams

    Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.
    Learn More
  • 10
    Ultramagnetic is a concurrent fork of GAIM that provides strong end-to-end encryption using libgcrypt and anonymous routing using the Six/Four protocol.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 11
    An IRC-like chat client and server using PGP signed and encrypted messages for maximum privacy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    TrustedPickle is a Python module which lets you create and sign your data files. By using public/private key techniques, this module protects your users from loading malicious data files that others might claim you created. LEGAL FOR EXPORT.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    OpenElection is a secure election management system encompassing ballot creation/localization, voting terminal management, vote counting, and key management. Written using Java and Swing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    ReHash is an easy-to-use console-based hash calculation tool written in C++. It supports many algorithms and output formats and it can be fully configured using some of the many command-line arguments which can be passed to the tool.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 15
    Secure Distributed Objects provides a mechanism for using socket-based SSL communications in the MacOS X Distributed Objects system, by providing a NSPort subclass - SecureSocketPort - and other utilities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This ain't your daddy's crypto! We provide a set of C libs and utilities to perform cypherpunk style crypto functions, using your existing OpenPGP keys. Ring signatures; credentials; mental poker; timelines; zero knowledge proofs. Cool stuff!
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    The goal of Operation Project X is to crack the 2048-bit RSA private encryption key Microsoft uses to sign Xbox media, by using distributed computing. This key could be used by Xbox owners to run homebrew code on their machines.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Encrypt emails using gpg and php.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    EntourageGPG provides powerful email encryption to Microsoft Entourage, using GPG as a backend.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    <b>SicHer</b> is an encryption client that will allow secure chat across the internet using AES and a Diffe-Hellman key exchange.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    A command line tool to create secure encrypted file using private key. You must provide key string to convert you source file into ecrypted one.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    JavaScript Solitaire Encryption using XML
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    SysK allows to crypt text by using system informations calculate the algorithm. For each user,the crypt algo will be different. It's written in C language for Linux x86. The objective is to allows it to crypt streams, binaries and more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    RSA-IP is a Linux kernel net _protocol_ which encrypts IPv[4;6] using RSA public/private key.Think of it as a kernel level implementation of ssl. RSA needs prime number so we release a prime searcher.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    This project is a Linux-PAM module designed for mounting a user's encrypted, home directory using the user's login credentials as the decryption key. The module also unmounts the user's home directory at logout to re-encrypt the protected data.
    Downloads: 0 This Week
    Last Update:
    See Project