Showing 11 open source projects for "input-leap"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Let your crypto work for you

    Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 1

    Java-Enigma

    Enigma Encryption Simulator in Java

    This program is an offline and stand-alone Java application which simulates the Enigma encryption machine that was used during World War II.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 2
    File Encoder Application

    File Encoder Application

    Java application for encryption

    Java application for encryption with a GUI. It is based in the XOR symetric encryption combined with a pseudorandom resorting of the bytes. Strenth and time to encrypt/decyrpt per MB adapted to size of input file. Multithread. zoom Multilanguage Dark mode JDK-17 compatibility It includes detailed documentation in English, Spanish and Catalan. You will find more about it at this web site: https://www.frojasg1.com:8443/downloads_web/web/html/encriptadorDeArchivos.html?origin=sourceforge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Passwords Generator

    Passwords Generator

    If You want to change your passwords globally, this program is for You

    The program by getting input from the user can generate any number of passwords from the range 1 - 10000. The length of the password can by from the range 1 - 40. Also, you can save passwords in the file with the .pass extension. The program takes very low memory on your computer. You don't have to install a program - it's just a jar file ready to run. You only need to have JVM (Java Virtual Machine).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    codeZ

    A program to en/decrypt texts that are only crackable using bruteforce

    codeZ is a program that can encrypt/decrypt texts that are not crackable without using brute-force attacks. It supports loads of characters, including symbols like brackets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 5

    innocence-java

    Replace text with POS equivalent text, in a reversible fashion.

    ...The software relies on having a known "seed" value for the random number generator, which is known only by the sender and receiver. It also relies on the sender and receiver having a shared (identical) vocabulary file. The project contains code to test input sentences for inclusion of words in the current vocabulary, and can create entries for new words as needed. The vocabulary has a "MD-5 hash" value to make sure that the share vocabulary file is identical for both sender and receiver. The software also contains a "bad-words" list of words that should never be generated in the text to be sent.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Simplest Text Encrypter

    A simple example of polyalphabetic cipher in Java.

    ...A variety of encryption techniques and ciphers are used to code important data. A polyalphabetic cipher is one of the simplest cipher one can make. This is a Java program to implement polyalphabetic cipher. [How the cipher encodes?] Input Data: helloaf Key: love l - 12th letter in Alphabet o - 15th letter in Alphabet v - 22nd letter in Alphabet e - 5th letter in Alphabet Now: h(l) e(o) l(v) l(e) o(l) a(o) f(v) Further: h(+12) e(+15) l(+22) l(+5) o(+12) a(+15) f(+22) where +(number) meaning shifting the character forward by the respective number of places. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Codegroup

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    Codegroup is a Java application that will allow one to convert binary (or text) computer files in to 5 letter codegroups for transmission over email, landline telephones, radioteletype or Morse Code. Codegroup has internal error correction & limited cryptography capabilities. Codegroup : ZZZZZ YBPIL AIAIG FMOPP CPAAA DGNGP GPGPA ADNJN ELJKO ELIMO GEOHF KIFGP IFBCB PKCPI YJMHE PHBHP PPOBH NCOHD AKLLL AGHFP DEGEF LKELC EAIJI ABAGP AHPPO IHHPH OHPDF YNFPB ALEPO KMPKP Once this...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    SJEA version 1.0 - Simple Java Encryption Algorithm. SJEA is a simple command-line binary encryption algorithm (symmetric block cipher) written in JAVA. It uses a password and a byte-vector array to scramble the input file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A simple java library (1.5.* and higher versions) in order to crypt (or decrypt) a file using a password. The library accepts the following parameters: an input file, the operation to perform, and the user password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 10
    JECC is an open source implementation of public key Elliptic Curve Cryptography written in Java. As of now it provides en-/decrypted out- and input streams.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    SecureProxy is an proxy application which sits in front of a web server and enforces general security policies which prevent clients from accessing restricted portions of the website or providing dangerous or unauthorized input.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB