Showing 1338 open source projects for "void-linux"

View related business solutions
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    This is a more secure file encryption program which uses SERPENT cipher and WHIRLPOOL+SHA-256 hash functions in key creation and for integrity checking.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    A more modern wiki focusing on open technologies like SOAP and XML, and upon a more focused form of wiki software that incorporates the elements of traditional content creation, such as from journals, books or periodicals.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Ramos - McCain - RSA. Cryptographic tool based on the widely-known RSA public-key algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Software solution for creation and verification of digitral signatures. Can replace tokens and smart cards with mobile phones. Components included are client and server. Can creates, verifiy and store content and signatures. Offers secure sharing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 5
    Cryptic
    Cryptic is a cryptographic applications suite for encryption/decryption of data, calculating cryptographic hashes or message digests and securing user passwords using a master password in a password safe.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A pure python module which implements the DES and Triple-DES encryption algorithms. Triple DES is either DES-EDE3 with a 24 byte key, or DES-EDE2 with a 16 byte key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    mod_auth_certificate is an authentication module for Apache Webserver 2.x. It adds the capability to forward usernames returned by mod_ssl to authorization providers like mod_authz_ldap.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    DCrypt
    DCrypt is an encryption and decryption tool that combines in a smart way multiple algorithms. The combination of multiple strong algorithms makes it much more difficult for hackers to get the plain content of the encrypted file without the password.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 9
    EnCrypted fiLe Sharing In jaVa
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 10
    A very simple file encryption tool. Release 1 is a text editor that saves encrypted files. Release 1.1 will include the ability to convert any file, even binary, to a GEF (Gulosh Encrypted File). Release 2.0 brings the strong encryption into play.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Md5 Project es un programa que encripta una cadena de caracteres y la mete en una base de datos, para posteriormente desencriptar el hash creado. Para ver el programa en funcionamiento: http://md5-project.razican.com/ Está traducido a tres idioma
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    SeCURePass password manager. A flexible, secure password manager for use in many situations, applicable for storing personal information. Integration with Firefox is available via an included extension.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Stores and retrieves files in an encrypted archive. Also manages files stored on CDs and DVDs. Other functions are incomplete. PLEASE NOTE: you need to download both an Objectify release and a Public Objects release.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Mailcrypt is an Emacs Lisp package which provides a simple interface to public key cryptography with PGP [and now GnuPG!]. Mailcrypt makes strong cryptography a fully integrated part of your normal mail and news handling environment
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    QFileHasher
    A program to calculate and verify checksums of multiple files with wizard-like GUI. Supports 12 hashes: CRC32, MD2, MD4, MD5, SHA1, SHA2, RIPEMD,Whirlpool, ED2K, AICH, Tiger, TTH. Allows processing of nested directories and updating of checksum files
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    A software written in java to compute the digital signature on documents and verify them, using a smart card or a token file in p12 format
    Downloads: 5 This Week
    Last Update:
    See Project
  • 17
    Kojoney is an easy of use, secure, robust and powerfull Honeypot for the SSH Service written in Python. With the kojoney daemon are distributeds other tools such as kip2country (IP to Country) and kojreport, a tool to generate reports from the log fi
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    Finds Text in Delphi *.Pas files e.g. : button1.caption:='Hello' Replaces Text with a function call button1.caption:=TXT(0) {##Hello##} Generates a function „TXT“ with a String List with all found Texts at the beginning of your source.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    PAM support in CNTLM proxy. This project is an altered version of latest CNTLM proxy (http://cntlm.sf.net), patched to add PAM authentication support.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    "No more clear text passwords" is a project to stop the nonsense regarding passwords used in the login protocols of most Web 2.0 projects: they are sent in the clear, shamelessly, with absolutely no care for privacy, and without warning the users.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Vernash: Stream cipher based on the Vernam cipher and Variable-Length Hashes
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    IKEv2
    Encrypted Message Exchange by using Diffie-Hellman key exchange algorithm and Advanced Encryption Standard(AES) encryption algorithm with Cipher-block chaining(CBC) mode using User Datagram Protocol(UDP)port server-client application in C, Ansi-style
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Strong cypher with unique recursive alghorythm of bitwise gamma with good avalanche and diffusion. Recurse allow explore quality and parameters at short sequences of data and keys and extrapolate it on very long data and keys.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    If you need to protect your confidential files in office or shared desktops, here is the robust command line and GUI utility to do password based encryption using AES. It can encrypt and decrypt a folder structure containing any number of files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    WebToken is a cryptographic system to authenticate users through a 2FA (Two-Factor Authentication) using OTP (One Time Password).
    Downloads: 0 This Week
    Last Update:
    See Project