Build VMs, containers, AI, databases, storage—all in one place.
Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
Get Started
Stop Storing Third-Party Tokens in Your Database
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
This project is to create a system for secure remote administration of a unix server from a variety of different operating systems (eg unix and windows).
libnwrap - a library of network function wrappers that provides a simple and clear yet powerfull enough API for UNIX network programming. It targets ease of use, protocol independence, reentrancy, thread-safety, as well as built-in cryptograpy
SysK allows to crypt text by using system informations calculate the algorithm.
For each user,the crypt algo will be different.
It's written in C language for Linux x86.
The objective is to allows it to crypt streams, binaries and more.
RSA-IP is a Linux kernel net _protocol_ which encrypts IPv[4;6] using RSA public/private key.Think of it as a kernel level implementation of ssl. RSA needs prime number so we release a prime searcher.
Secure File Transfer for Windows with Cerberus by Redwood
Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.
Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
The SLAN project is a GPL open-source project providing a cross platform Virtual Private Networking (VPN) solution focused on providing secured and accountable links over insecure broadcast media such as 802.11 wireless LANs and public ethernets.
The Linux Transparent Encryption project aims for integrating transparent read/write access to encrypted data into the linux
kernel. This enables any application to use encrypted data
without modifying the application itself.
This project is a Linux-PAM module designed for mounting a user's encrypted,
home directory using the user's login credentials as the decryption key. The
module also unmounts the user's home directory at logout to re-encrypt the protected data.
E-Dot (which means Encryption and Decryption Of Texts) is a very small tool for encrypting textfiles. E-Dot doesn't use Keyfiles: A password is enough. This tool is available for Linux and Windows, too.
Yavipind is a secure tunnel aka 2 peers securely forwarding
packets toward each other.It is what most people calls a VPN (virtual private
network).
It forwards any kind ofpacket (IPv4, IPv6 or other) sent over the virtual
network interface (e.g. t
A number of tools to enhance management/coding of NFR (http://www.nfr.net) IDA, and various other admin tools that can be used for both NFR and hand coding other appliance scripts.
dkbf is a distributed, keyboard, brute-force program for Linux clusters that attacks Windows NT Lanman and NT hashes using the Message Passing Interface (MPI).
This project will provide a library for using the AES round 3 cipher candidates (Mars, RC6, Rijndael, Serpent, and Twofish) in an easy to use API. Support for MD5, SHA.
IMPORTANT -- This is an old project that is no longer supported and should not be relied upon for serious applications. If your looking for encryption software, I suggest OpenSSL or GnuPG which are better equipped.
GAIM encryption plugin using GPG (PGP clone). It works transparently and smoothly. Automatically establishes secure conversations with other enabled users, passes keys (if enabled) and eventually will allow you to specify your own keys to use.
Open Source file encryption, written to learn about cryptograpy, programming, etc. And hopefully come up with some new encryption techniques that might benefit the public.
A project to provide a GUI toolkit to facilitate (and where possible, automate) the breaking of classical (pen-and-paper) cryptosystems. Initial focus is on the cryptanalysis of monoalphabetic substitution ciphers.
This is a project that simulates the German Military Enigma machine during WWII.. It is a project for beginers to learn to program and to meet people. If anyone is interested in helping, please email me @ dustin@rockhill.org
sectar: a program that creates encrypted tape archives(tar files), using the AES algorithm Rijndael. Encryption exported under exemption TSU 740.13.
Was star, now sectar.
An API and test suite, or possibly an application unto itself, to manage keys and allow mail user agents (such as pine or mutt) to use encryption and authentication systems (such as S/MIME) via the services of external encryption suites (such as OpenSSL)