4 projects for "password" with 2 filters applied:

  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 1

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    cppcrypto provides optimized implementations of cryptographic primitives. Hash functions: BLAKE, BLAKE2, Echo, Esch, Groestl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, SHAKE, Skein, SM3, Streebog, Whirlpool. Block ciphers: Anubis, Aria, Camellia, CAST-256, Kalyna, Kuznyechik, Mars, Serpent, Simon, SM4, Speck, Threefish, Twofish, and Rijndael (AES) with all block/key sizes. Stream ciphers: HC-128, HC-256, Salsa20, XSalsa20, ChaCha, XChaCha. Encryption modes: CBC, CTR. AEAD modes:...
    Leader badge
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    CSVHashCrack Suite

    CSVHashCrack Suite

    Multi hash crack suite

    This script is capable of cracking multiple hashes from a CSV-file like e.g. dumps from sqlmap. Over 17.000 md5-hashes in a CSV-file get cracked with a 14.300.000 lines wordlist in less then 1 min. Lines wich cant get cracked with the wordlist get stored in a .leftToCrack-File to further process with another Wordlist or the bruteforce-tool. In addition to the wordlist-cracker I created also a bruteforce-tool named CSVHashBrutforcer.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 3
    Encrypting Safe
    This is free Java desktop application to keep your note in safe from others using the Encrypting Decrypting symmetric key algorithm, it's easy to transfer your note form source to another in confidential manner.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    SharedSecret is a program used to negotiate a shared secret (password) by two hosts in secure way over the Internet. The software is written in C, based on client/server architecture with initial intention to run on POSIX-Compliant Operating Systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • VoIP Business Phone Systems Icon
    VoIP Business Phone Systems

    Hosted VoIP service for businesses. Feature-rich. Awesome service.

    Intulse’s VoIP internet phone and connectivity solutions are designed to increase productivity through VoIP software dashboard apps, VoIP CRM integration (ex. Salesforce & HubSpot), softphones, time-based routing, virtual receptionists, customized greetings, unlimited extensions, and more. Customers who choose Intulse as their cloud VoIP provider get the power of a feature-rich system that can be customized to best-fit how they do business. Intulse’s communications specialists work closely to help select and implement features to ensure each business gets the most out of their system and services.
    Get Started
  • Previous
  • You're on page 1
  • Next