Showing 75 open source projects for "bit"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 1
    Cryptomator

    Cryptomator

    Multi-platform transparent client-side encryption for your cloud files

    Cryptomator is a free and open source project that offers multi-platform, transparent client side encryption of your files in the cloud. It works with just about any cloud storage service; is totally transparent so you can work with your files how you normally would; and secure with a 256-bit key length AES encryption. It’s also simple and easy to use with no need for different accounts, key management, cloud access grants or cipher configurations.
    Downloads: 42 This Week
    Last Update:
    See Project
  • 2
    Cryptol

    Cryptol

    Cryptol: The Language of Cryptography

    Cryptol is a domain-specific language (DSL) for specifying and verifying cryptographic algorithms. Developed by Galois, Cryptol provides a high-level mathematical syntax for describing cryptographic primitives and enables formal verification of algorithm properties. It is used in academic, research, and defense sectors to validate correctness and security through symbolic execution and model checking, ensuring critical cryptographic code is free of design flaws.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 3

    Ed448-Goldilocks

    A 448-bit Edwards curve

    This is an implementation of elliptic curve cryptography using the Montgomery and Edwards curves Curve25519, Ed25519, Ed448-Goldilocks and Curve448, using the Decaf / Ristretto encoding.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 4
    1654 — encryption system

    1654 — encryption system

    1024-bit encryption system (functional safe or disk) | С++20

    ...Dependency-free design The entire cryptographic surface is auditable in-tree. PetoronHash as the cryptographic core All key material derivation, diffusion, and internal transformations are driven by PetoronHash 1024-bit wide internal state The architecture uses a wide internal state to increase diffusion depth and structural safety margins. https://github.com/01alekseev/1654 Petoron | Ivan Alekseev | MIT license
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5

    ProxyCryptGUI

    An easy to use 'front-end' to ProxyCrypt 3.X encryption application

    ProxyCryptGUI2025 • ProxyCryptGUI2025 is a free application that provides a Windows GUI (graphical user interface) for ProxyCrypt to manage encrypted virtual disk drives. • The setup file for ProxyCryptGUI2025 includes the required setup of ProxyCrypt 3.x and required AIM disk driver. • All files stored in an encrypted virtual drive can be accessed just as any files on regular disk drives but only after the drive is mounted/opened with the associated passphrase. • ProxyCryptGUI2025 can...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    ufonet

    ufonet

    UFONet - Denial of Service Toolkit

    UFONet - Is a set of hacktivist tools that allow launching coordinated DDoS and DoS attacks and combine both in a single offensive. It also works as an encrypted DarkNET to publish and receive content by creating a global client/server network based on a direct-connect P2P architecture. + FAQ: https://ufonet.03c8.net/FAQ.html -------------------------------------------- -> UFONet-v1.8 [DPh] "DarK-PhAnT0m!" (.zip) -> md5 = [ c8ab016f6370c8391e2e6f9a7cbe990a ] -> UFONet-v1.8...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 7
    PetoronHash2

    PetoronHash2

    PH2 Permutation-based cryptographic post-quantum hash library with duplex construction (C++20)

    PetoronHash2 (PH2) is a standalone ARX-based sponge construction that combines: A 4096-bit internal permutation core A sponge/duplex architecture with explicit capacity separation An extendable-output function (XOF) Memory-hard (HARD) and burn (BURN) modes A structured tagged absorb scheme A parameterized architecture suitable for hashing, KDF, and stress-oriented derivation PH2 is designed as a wide-state cryptographic primitive with explicit domain separation and configurable output length. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    FileHashler

    FileHashler

    cross-platform (Java) file encryption and archiving tool

    ...Directories can be encrypted as sets of single files in a single action. Uses Twofish (CBC) and SHA-256. Security level is strong and benefits from the PWS3 (Password Safe) encrypted file format. The level can be lowered to 128-bit key-length (normally 256).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Naeon

    Naeon

    The safest way to store private data in untrusted (cloud) environments

    Naeon is a data encryption and sharding method designed to secure data in potentially untrusted off-site storage locations. It uses AES-256 encryption with a randomly generated passphrase, followed by obfuscation techniques to make the encrypted file unidentifiable. The data is then sharded into one private chunk containing the encryption key and part of the data, and multiple public chunks. Each chunk is renamed using its SHA-512 hash, and all chunks are timestamped equally. A filename...
    Downloads: 5 This Week
    Last Update:
    See Project
  • Catch Bugs Before Your Customers Do Icon
    Catch Bugs Before Your Customers Do

    Real-time error alerts, performance insights, and anomaly detection across your full stack. Free 30-day trial.

    Move from alert to fix before users notice. AppSignal monitors errors, performance bottlenecks, host health, and uptime—all from one dashboard. Instant notifications on deployments, anomaly triggers for memory spikes or error surges, and seamless log management. Works out of the box with Rails, Django, Express, Phoenix, Next.js, and dozens more. Starts at $23/month with no hidden fees.
    Try AppSignal Free
  • 10
    PetoronHash-System

    PetoronHash-System

    PHASH | post-quantum XOF hashing algorithm | C++20

    PHASH is a self-contained, dependency-free, post-quantum XOF hashing algorithm implemented in modern C++20. This release delivers the first fully stable production implementation of the PetoronHash-System — a 1600-bit sponge-based hash function with domain separation, extendable output, and deterministic behavior. Key Features No external dependencies — pure C++20 implementation. Extendable Output (XOF) — supports arbitrary output length (256–8192+ bits). Post-quantum oriented design — ARX-based sponge resistant to Grover-type attacks. Context and salt separation — unique hashing domains for each use-case. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    PCSecrets

    PCSecrets

    Encrypt and manage secret text data

    PCSecrets is a PC application that holds secret text data - protected by a master password and strong encryption. Use it as a password manager or just somewhere to hold any text data securely in one place. It can hold a second, hidden set of secrets that is undetectable and plausibly deniable. The program is also a PC counterpart of the Secrets for Android app. It uses the same data structure and provides synchronization that allows easy transfer of secrets between the two. For those who...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    AnubisCrypt

    AnubisCrypt

    Anubis Involutional 128-bit SPN Block cipher Encryption Tool

    Barreto & Rijmen 128-bit block cipher with GCM Mode (RFC 5288) provides both authenticated encryption (confidentiality and authentication) and the ability to check the integrity and authentication of additional authenticated data (AAD) that is sent in the clear. Whirlpool-based PBKDF2. Anubis is a block cipher with SP-network structure designed by Vincent Rijmen and Paulo S.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 13

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    cppcrypto provides optimized implementations of cryptographic primitives. Hash functions: BLAKE, BLAKE2, Echo, Esch, Groestl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, SHAKE, Skein, SM3, Streebog, Whirlpool. Block ciphers: Anubis, Aria, Camellia, CAST-256, Kalyna, Kuznyechik, Mars, Serpent, Simon, SM4, Speck, Threefish, Twofish, and Rijndael (AES) with all block/key sizes. Stream ciphers: HC-128, HC-256, Salsa20, XSalsa20, ChaCha, XChaCha. Encryption modes: CBC, CTR. AEAD modes:...
    Leader badge
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14

    GUI File Encrypter

    Just A Few Clicks To Encrypt Your File

    Simple GUI File Encrypter 128-bit AES in CBC mode and PKCS7 padding, with HMAC using SHA256 for authentication. Requirements: - Python 3.9 - Dependencies are required to be installed, Read the README.txt file for instructions. How To Run The Program: - Windows: Just run GUI File Encrypter.py - Mac / Linux: Open Terminal, navigate to folder with the program files & type "python3 GUI\ File\ Encrypter.py" without the quotes If you need to rename the file you can just make sure the extension stays ".py"
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    S-DES Crypto App

    Encryption/Decryption demonstration app using the S-DES algorithm

    Encryption/Decryption demonstration app using the S-DES algorithm. Use the Java runtime environment 11 for execution. The GUI pops up that allows entering a 10-bit encryption/decryption key in binary (0, 1 digits) and the plaintext/ciphertext in the same form (8-bit). Executing the algorithm, decription of the encoding/decoding functionality is provided in the three main text boxes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    XORCrypter

    XORCrypter

    Little program for encryption-decryption.

    Little program that uses the bit XOR operation for encryptioning and decryptioning, for now, just text files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    IP-Chat

    IP-Chat

    UDP based desktop chatting app which supports AES-256 bit encryption.

    Simple Encrypted chat application built with Java. It uses AES-256 bit block cipher algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    LazLock

    LazLock

    Free, cross platform, portable password manager.

    The latest version of LazLock is at https://github.com/cyberfilth/LazLock/releases A free, lightweight, portable password manager for Windows & GNU/Linux that encrypts your data with 128 bit AES encryption. LazLock also includes a password generator which allows you to create more secure passwords. A plain text version of your data is never written to disk as all decryption is done in memory. LazLock is truly portable, no installation is required so it can be run from a USB drive. Unlike similar programs, there are no dependencies on the .NET Framework (Windows) or Mono (Linux) ------------------------------------- Easily Copy and Paste your login details into any website without having to manually type them out. ...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 19

    file digest

    A command-line utility for calculating and verifying file checksums.

    ...Usage: digest [-c] <algorithm> <filename(s)> For example, if you want to calculate the checksums using skein512/256 algorithm, use this command: digest skein512/256 * > checksums.skein To verify the checksums: digest -c skein512/256 checksums.skein You can get a full list of supported algorithms and test the performance of different algorithms on your PC using the command: digest test <iterations> <filename> This will calculate hash sum of <filename> multiple times (number of times is specified by <iterations>) and output the results with precise timings. Note: if you have a 64-bit operating system, use 64-bit binary of the utility, because it is significantly faster for large files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    CrypSten

    A Hybrid Cryptosystem with Steganography DLL

    A library written in Visual C# for encrypting a text message into an image file, and decrypting an image file to get the text message using Rijndael Algorithm, RSA Algorithm, and LSB Substitution Algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    d-crypt

    Tweakable 256-bit symmetrical block cipher.

    ...Features a similar structure as AES (uses simpler versions of ShiftRows, MixColumns) and uses AES SBOX. It is an SP network. The Key Schedule is a different from AES's, however the Expansion is partially inspired in AES. The 256-bit key is turned into a 576-byte expanded key which is used in every key addition round. D-crypt performs a total of 18 rounds: Firstly it does a SBOX round, and a XOR keyaddition with the first 32bytes of the expanded key, Secondly it does 16 rounds of MixcColums, ShiftRows, KeyAddition (this step is determined by the tweak) and SBOX, and finally, it does an final round of SBOX followed by a final round of XOR key addition, providing key whitening. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    NCrypted

    NCrypted - simple file encryption software with GPU support

    NCrypted is a simple file encryption software. It is implemented on top of AES 128-bit algorithm. This software was designed to be as simple as possible, so you won't find any fancy, flashy gui elements or complicated advanced options. You can also use it directly from command line. NCrypted can automatically detect and take advantage of your NVidia graphics card to speed up the file processing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Eristic Cryptographic Toolkit

    Eristic Cryptographic Toolkit

    Open source 8 bit random number generator

    The Eristic Cryptographic Toolkit based on the CRC (Chaotic Random Core).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    AUM CSPRNG & Stream Cipher

    AUM CSPRNG & Stream Cipher

    A minimal CSPRNG reflecting the Zen of cipher design

    AUM is an extremely fast, small-state, cryptographically secure pseudo-random number generator and stream cipher. AUM exhibits uniform distribution, mixes rapidly, has no detected bias, and comes in three variants: AUM16, with an internal state array of 16+4 32-bit words; AUM32, with an internal state of 32+4 words; and AUM64 with a 64+4-word state. The former permit seeding with a key of up to 512 or 1024 bits, the latter with a 2048-bit key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    CryptoPad v1.0

    CryptoPad v1.0

    AES-128 bit file encryptor

    ...The icing on the cake is that it's 100% cross-platform. i.e. You can run the same .jar file on Windows, Mac OS, Linux and any OS capable of running JRE 8 :) CryptoPad uses AES-128 bit symmetric key encryption to secure your data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next
MongoDB Logo MongoDB