Showing 64 open source projects for "using"

View related business solutions
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Vibes don’t ship, Retool does Icon
    Vibes don’t ship, Retool does

    Start from a prompt and build production-ready apps on your data—with security, permissions, and compliance built in.

    Vibe coding tools create cool demos, but Retool helps you build software your company can actually use. Generate internal apps that connect directly to your data—deployed in your cloud with enterprise security from day one. Build dashboards, admin panels, and workflows with granular permissions already in place. Stop prototyping and ship on a platform that actually passes security review.
    Build apps that ship
  • 1
    Raiden block cipher: An extremely lightweight and fast block cipher, developed using genetic programming, with the intention to be an alternative to TEA. This cipher is as fast as TEA, and without many of its known weaknesses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Python wrapper around a small subset of the OpenSSL library. Includes: X509 Certificates, SSL Context objects, SSL Connection objects using Python sockets as transport layer. The Connection object wraps all the socket methods and can therefore be use
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    This a a small program to encrypt/decrypt files using AES (Advanced Encryption Standard)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Open Legacy Storage Document: Generic Document Archiving on Disk and Network(using MINA) Framework in Java for huge number of docs(up to 2^192 documents), efficient(Java NIO), crypto, net transfert, web retrieve, J2EE and eMail archiving compatible.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • 5
    A self contained cross platform utility for encrypting (and decrypting) files using AES 256 (and SHA 256) for secure transportation or privacy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Pseudo Random Number Generator (PRNG) frontend using libtomcrypt. It simply writes pseudorandom data (using sober-128, fortuna, yarrow or rc4 algorithm) on standard output. The output may be encoded to base64, base85 or hex or just left binary.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Figaro's Password Manager (FPM) is a GNOME application that allows you to securely store & categorize your passwords, which are encrypted using the blowfish algorithm. It can launch applications using the host names, user names, and passwords you supply.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    stegotools is a suite of UNIX command-line applications to read/write hidden information from/in files using steganography. It currently fully supports 24bpp bitmap images.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    This contains a sample implementation of DTLS-VPN using OpenSSL DTLSv1 Support - to send data over an encrypted channel.
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-First Supply Chain Management Icon
    AI-First Supply Chain Management

    Supply chain managers, executives, and businesses seeking AI-powered solutions to optimize planning, operations, and decision-making across the supply

    Logility is a market-leading provider of AI-first supply chain management solutions engineered to help organizations build sustainable digital supply chains that improve people’s lives and the world we live in. The company’s approach is designed to reimagine supply chain planning by shifting away from traditional “what happened” processes to an AI-driven strategy that combines the power of humans and machines to predict and be ready for what’s coming. Logility’s fully integrated, end-to-end platform helps clients know faster, turn uncertainty into opportunity, and transform the supply chain from a cost center to an engine for growth.
    Learn More
  • 10
    B-Trust eDoc is a program built on top of LibDigiDoc a free implementation of the OpenXAdES standard for signing/encrypting files using smartcard tokens. It also contains Openssl and PKCS11 wrapper classes in C++ which might be useful to developers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    The ELF-Encrypter program suite is a collection of programs to encrypt your ELF binaries using various algorithms. GnuPG is required in order to use some encryption techniques. The suite also contains programs to inject code into ELF binaries.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    SecureRSS - Secure RSS-Syndication for Mobile Devices. Non-repudiability of RSS-Newsfeed channels/items on the assumption of a resource-constraint client using w3c-ietf xml signatures. (proof-of-concept)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Cameloid is a new TCP/UDP based P2P voice and video encryption software, that will provide high level of privacy for all levels of communication using only quality secret-key ciphers to ensure long-term security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    httpcert is an apache module, that enables apache itself to manage x509 certificates efficiently, for Client Authentications over HTTPS.Through Web-Interfaces,Clients/Webadmin can create/submit/sign certificates using In-House CA Certificate.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    WEPCrack is a tool that cracks 802.11 WEP encryption keys using the latest discovered weakness of RC4 key scheduling.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 16
    Qryptix consists of a PAM object and utilities for session- and key-management for encrypted home directories using the International Kernel (CryptoAPI) patches for Linux. It simplifies login/logout, mounting/unmounting, and key generation and changing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Ncurses based tool for easily deploying IPsec tunnels using FreeSWAN (Linux only) Easy to configure a tunnel, simple options, user friendly interface
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Cryptar is a cryptographic network backup program that is able to be very efficient with network resources by using an algorithm derived from the rsync algorithm. It uses SHA-1 hashes to verify (sign) its data and AES to encrypt it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    p12_import is an utility created to import pkcs#12 file into a pkcs#11 device. It could be used in place of Netscape/Mozilla, if there are troubles using the crypto device with other pkcs11 compliant application.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 20
    A hybrid dictionary/brute passphrase search tool for PMK discovery on 802.11 networks using WPA with preshared keys (PSKs)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Ultramagnetic is a concurrent fork of GAIM that provides strong end-to-end encryption using libgcrypt and anonymous routing using the Six/Four protocol.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 22
    A ultrafast lightweight (no GUI) encryption/decryption software using the CryptoAPI on Windows platform, to secure just about anything - regular files and directories, consoles, communication resources(COM ports), Disk devices, pipes and sockets anythin
    Downloads: 2 This Week
    Last Update:
    See Project
  • 23
    Secure Distributed Objects provides a mechanism for using socket-based SSL communications in the MacOS X Distributed Objects system, by providing a NSPort subclass - SecureSocketPort - and other utilities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    ReHash is an easy-to-use console-based hash calculation tool written in C++. It supports many algorithms and output formats and it can be fully configured using some of the many command-line arguments which can be passed to the tool.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 25
    This ain't your daddy's crypto! We provide a set of C libs and utilities to perform cypherpunk style crypto functions, using your existing OpenPGP keys. Ring signatures; credentials; mental poker; timelines; zero knowledge proofs. Cool stuff!
    Downloads: 1 This Week
    Last Update:
    See Project