Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free
Try Google Cloud Risk-Free With $300 in Credit
No hidden charges. No surprise bills. Cancel anytime.
Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
Cryptography Workshop is a small yet powerful tool for cryptography and cryptanalysis. It's focused more on classic cryptography. It is currently in alpha and under development.
Backup P2P is a peer to peer application doing automated and secured backups inside a community (Jabber, XMPP). Each user shares some available space on his disk with others, to be able in return to remotely backup some of his own data.
BlueOxygen Debus is the security implementation of tree for BlueOxygen Cimande. Originally this is a Cimande Security, but we found that there is several security that we can implement and we must test it, so we decouple it.
sanesigner is a high level digital signature api component. it support generating and verifying digital signatures as well as encryption and decryption using public keys, and lots of other features in between.
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
A smart card-based public key cryptography system based on elliptic curves, using AES for session key generation and SHA for hashing. This project will include the smart card software, terminal software, and a public key server.
Identityflow provides a framework for building protocol flows that perform distributed Identity operations. Examples of Identity Operations are Single Sign-On (SSO) and Attribute queries.
Java project.
A java application that creates jars with encrypted content inside. With a selfextract and decrypt built in.
GUI aswell as console functionallity.
Options to include a key salt inside of the jar to hinder bruteforce attempts.
This tool encrypts text using polyalphabetic codetables, like the encryption systems in the middle ages. It can be used for simple text encryption with a small password or as a One-Time-Pad with a random codetable for 100% secure text encryption.
BeeCrypt is an ongoing project to provide a strong and fast cryptography toolkit. Includes entropy sources, random generators, block ciphers, hash functions, message authentication codes, multiprecision integer routines, and public key primitives.
Java based Portable hashing application capable of multiple individual file signatures or proprietary group signatures (1 signature for a folder and all its contents). GUI and command line in the same executable. -sha1 -sha256 -sha51 -md5 -crc32
This is a Hash Calculating tool that calculates MD2,MD5,SHA-1,SHA-256,SHA-384,SHA-512 hash of text or a file. This has GUI developed in java swings.All it needs is sun jre installed.
SMScryptor encrypts and decrypts messages sent from any mobile phones using :
- AES 256 encryption
- J2ME MIDP2.0 CLDC1.1
- ECMAScript
- Apache / PHP / mysql
GDigiDoc is a GUI frontend built with GTKMM for DigiDoc (alias OpenXAdES - http://www.openxades.org) library allowing users to create digitally signed documents
and verify signatures of other users. Signatures follow the XAdES (alias ETSI TS 101 903) and
JChecksum allows you to obtain the hash of a given file using a simple GUI. Hash algorithms supported include MD2, MD5, SHA-1, SHA-256, SHA-384, and SHA-512.
talkLock is voice encryption software for your cell phone. talkLock includes a server component so that you own all points of encryption and decryption of your communications.
Easy-SEND is an implementation of the SEND (SEcure Neighbor Discovery) protocol for IPv6. It is aimed to be used for learning and testing purposes. SEND is described in RFC 3971. Easy-SEND includes a tool (CGAGen) to generate and verify CGAs (RFC 3972).