Showing 19 open source projects for "new"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Red Hat Enterprise Linux on Microsoft Azure Icon
    Red Hat Enterprise Linux on Microsoft Azure

    Deploy Red Hat Enterprise Linux on Microsoft Azure for a secure, reliable, and scalable cloud environment, fully integrated with Microsoft services.

    Red Hat Enterprise Linux (RHEL) on Microsoft Azure provides a secure, reliable, and flexible foundation for your cloud infrastructure. Red Hat Enterprise Linux on Microsoft Azure is ideal for enterprises seeking to enhance their cloud environment with seamless integration, consistent performance, and comprehensive support.
    Learn More
  • 1
    VeraCrypt

    VeraCrypt

    Open source disk encryption with strong security for the Paranoid

    VeraCrypt is a free disk encryption software brought to you by IDRIX (https://www.idrix.fr) and based on TrueCrypt 7.1a. It adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. It also solves many vulnerabilities and security issues found in TrueCrypt. This enhanced security adds some delay ONLY to the opening of encrypted partitions without any performance impact to the application use phase...
    Leader badge
    Downloads: 1,973 This Week
    Last Update:
    See Project
  • 2
    Hash Latch
    The hash latch generates keys in a manner similar to how some cryptocurrencies are mined. It takes a string and brute-forces a prefix for it so that the hash of the string with the prefix has a certain number of leading zeroes. But that alone would've been too easy to hack. To prevent an attacker from forging the keys by generating a new prefix: the hash latch doesn't output the keys in the plaintext. Instead, it encrypts the key and outputs the ciphertext. That means that instead...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    BlackBelt WASTE - ipv4 / Tor / i2p + AI

    BlackBelt WASTE - ipv4 / Tor / i2p + AI

    A modern, AI-Smart, WASTE p2p for ipv4 and invisible address spaces

    A WASTE client. Download and create your own WASTE networks. For Windows XP 32/64, Vista 32/64, Win7 32/64, Win8 32/64, Win 10, Linux (WINE). *** NEW *** Distributed Autonomic-Performance-Tuning - A Goal-Seeking Swarming-Semiotic AI *** *** Built-in Self-Organising Anti-Spoofing Technology *** *** Medusa - Pure Ephemeral RNG - Routing, Security Extensions *** PLEASE ENSURE YOUR NETWORK USES THE SAME BUILD. FOR BEST RESULTS.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Advanced Onion Router
    Advanced Onion Router is a portable client for the OR network and is intended to be an improved alternative for Tor+Vidalia+Privoxy bundle for Windows users. Some of the improvements include UNICODE paths, support for HTTP and HTTPS proxy protocols on the same Socks4/Socks5 port with HTTP header filtering that generates fake identity-dependent headers every time the identity is changed (proxy chains are also supported), support for NTLM proxies, a User Interface that makes Tor's options and...
    Leader badge
    Downloads: 208 This Week
    Last Update:
    See Project
  • Deliver secure remote access with OpenVPN. Icon
    Deliver secure remote access with OpenVPN.

    Trusted by nearly 20,000 customers worldwide, and all major cloud providers.

    OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
    Get started — no credit card required.
  • 5

    Hashpipe

    Modular Digestion Tool

    Hashpipe is modular hashing tool which can have its functionality easily expanded with new modules. It can be used as a compact command-line tool, a C library and a C++ object.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    The MOTET Cipher & SE Scrambler

    The MOTET Cipher & SE Scrambler

    A tiny, fast encryption tool in C

    MOTET is a tiny, fast super-encipherment application written in C, featuring the new CSPRNG/stream ciphers MOTE and BEDBUG in each of their three variants, as well as the "gold standard" among ciphers, ISAAC. MOTET brings multiple levels of encryption, including a ciphertext-hash, a Vigenere mixing function, a choice of Caesar MOD or Caesar MIX ciphering on the primary key-stream, plus a deeply scrambled "outer shell" as a final super-encryption stage. A unique nonce IV guarantees that each...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    SES Super-Encypherment Scrambler

    SES Super-Encypherment Scrambler

    SES brings back the uncrackable onetime pad, with a digital twist.

    SES brings back the uncrackable onetime pad, with a digital twist. It is well known that a random key of message-length is the only provably unbreakable cipher. SES uses cryptographic strength pseudo-random keys of message-length for its many encipherments, in addition to offering true one-time pad capability for the intrepid. SES is built on ISAAC, Bob Jenkins' unbroken CSPRNG, a fast and simple stream cipher placed in the Public Domain in 1996. SES now gives you the ability to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    FreeOTFE

    FreeOTFE

    A free "on-the-fly" transparent disk encryption program for PC & PDAs.

    An upstream source site housing the original files for this mirror is no longer available. With this software, you can create one or more "virtual disks" on your PC/PDA. These disks operate exactly like a normal disk, with the exception that anything written to one of them is transparently, and securely, encrypted before being stored on your computer's hard drive.
    Downloads: 20 This Week
    Last Update:
    See Project
  • 9

    chameleon_14443

    Low-cost, ISO 14443 compliant emulator for contactless smartcards

    ! This website is discontinued ! The new, improved MiniChameleon is maintained as of January 2014 on github: https://github.com/emsec/ChameleonMini ATXmega based emulator for contactless smartcards, designed and maintained by Embedded Security Group at the Ruhr-University in Bochum.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Manage printing in a cost-efficient and eco-friendly way with Gelato. Icon
    Manage printing in a cost-efficient and eco-friendly way with Gelato.

    Gelato offers an extensive catalog of custom products, a zero-inventory business model, and free designing tools—all in one place.

    The world's largest print on demand network with 140+ production partners across 32 countries. Gelato offers end-to-end design, production and logistics for individuals looking to start their own business today!
    Sign up for Free
  • 10
    Delay Based Routing Protocol

    Delay Based Routing Protocol

    A distance vector routing protocol based on delay for IPv4 & IPv6

    A new routing protocol called Delay Based Routing Protocol (DBRP). It is a flexible distance vector routing protocol with a metric based on delay. It natively supports IPv4 and IPv6, and can also carry information for common services such DNS servers
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    MetFS is a filesystem in userspace that is FUSE based, encrypted, dynamic sized (increase when new data added, decrease when data removed), single file when it's unmounted and very fast. MetFS 's proved to be running on Linux and FreeBSD.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    TBFAA/encoder
    A program that encrypts multiple files. It uses new encryption algorithms, such as a Three-Block Feistel chiper, ArchFurry's algorithm and a new hash function. Licensed under the ISC.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The Mav.Crypt tool will be upgraded to many different encryption methods. At the Moment, the only method is ROT13, but we are developing some other technics and a new Algorithm. More Infos shortly at the Project Web Page.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Cameloid is a new TCP/UDP based P2P voice and video encryption software, that will provide high level of privacy for all levels of communication using only quality secret-key ciphers to ensure long-term security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Confiture is the new generation of the cryptographic software, Confiture use the all new innovation cryptographic.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This is an experimental program that encrypt/decrypt/divide/join files. This program uses a new algorithm made by me, this algorithm is experimental and I working on it, every day this algoritm will be better.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    OS based on Agent based Security with a new type of split kernel and agents platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    DISCONTINUATION OF PROJECT. This project will no longer be maintained by Intel. Intel will not provide or guarantee development of or support for this project, including but not limited to, maintenance, bug fixes, new releases or updates. Patches to this project are no longer accepted by Intel. If you have an ongoing need to use this project, are interested in independently developing it, or would like to maintain patches for the community, please create your own fork of the project...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Open Source file encryption, written to learn about cryptograpy, programming, etc. And hopefully come up with some new encryption techniques that might benefit the public.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next