One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
Try Free
AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
Strong cypher with unique recursive alghorythm of bitwise gamma with good avalanche and diffusion. Recurse allow explore quality and parameters at short sequences of data and keys and extrapolate it on very long data and keys.
Ruby script framework for the encryption and decryption of email according the GPG/MIME Format (RFC 3156). It can be used for e.g. for Apple' Mail as replacement for GPGMail.
Cryptography Workshop is a small yet powerful tool for cryptography and cryptanalysis. It's focused more on classic cryptography. It is currently in alpha and under development.
Backup P2P is a peer to peer application doing automated and secured backups inside a community (Jabber, XMPP). Each user shares some available space on his disk with others, to be able in return to remotely backup some of his own data.
SLEncrypt is a python module for encryption with 11 ciphers at the moment, including ADFGVX, Autokey, Caesar/ROT13, Vigenere, XOR and a lot more. It contains functions allowing you to easily encrypt/decrypt files. The code is about 95% PEP 8 compilant.
Advanced Perl script for DES password cracking. Might be handy for password QA. Brut-force, load Unix passwd/shadow, multi hash crack, input/output file, save/resume cracking state.
It load the current public-timestamp-block from publictimestamp.org and store it in a file to use it e.g. as a signature in an e-mail software.
The project is inactive and not under development anymore.
Sharemind is a secure multiparty computation system that allows you to process data without seeing it.
IMPORTANT: The version available on this page is a seriously outdated version that is kept available as an educational tool. More recent versions with more features and better quality are available from http://sharemind.cyber.ee/.
Secure File Transfer for Windows with Cerberus by Redwood
Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.
Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
SMADRET Means Always Do Really Encrypt Talk (or Find A Better Acronym). It is a SOCKS 4-proxy that listens on localhost and acts as a middleman between your chat client and the outside world, intercepting messages and performing PGP-encryption using GnuP
This project aims to provide an open source Matlab-based development framework to conduct side-channel attacks. Part of this framework are Matlab classes, functions, scripts, and demos.
Hide your data from any scans for fingerprints at forensic analysis. Fragger is an concept to fragment files into many small files by scrambling the content of the source file.
A smart card-based public key cryptography system based on elliptic curves, using AES for session key generation and SHA for hashing. This project will include the smart card software, terminal software, and a public key server.
Pure managed C# implementation of well-known cryptographic hash functions such as SHA-family (SHA0, SHA1, SHA2), MD-family (MD2, MD4, MD5), RIPEMD, Tiger, Haval, Snefru and others.
Moved to Github: https://github.com/AndreyRusyaev/acryptohashnet
sanesigner is a high level digital signature api component. it support generating and verifying digital signatures as well as encryption and decryption using public keys, and lots of other features in between.
Identityflow provides a framework for building protocol flows that perform distributed Identity operations. Examples of Identity Operations are Single Sign-On (SSO) and Attribute queries.
Originally made to crack /etc/passwd files from *nix utilizing the GPU. Uses GLSL and OpenGL. Acts as a parallel to John the Ripper, but for the GPU. Supports both ATI and nVidia, anywhere OpenGL can run.
This is a simple ANSI-C implementation of Triple-DES (as described in NIST Special Publication 800-67.) This implementation also includes an 8-bit version that can be used in microcontrollers with memory constraints.
New, Improved version of VB.Net Registration System. It sends emails to alert you when someone registers your program, if they try to use a used key, and if they try to use a banned key/their key has been banned. Checks every time against ban list.
Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material. First and foremost for memory dump analysis and forensics usage. Able to identify AES, Serpent, Twofish and RSA keys as of version 0.0.3.
Secure P2P Instant Messenger running on .NET Framework 2.0. Uses server to store user information (user name, password, email address, friends list, log in state, IP address) in encrypted form. Uses custom designed symmetric encryption algorithm.