Showing 43 open source projects for "program files"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    RHash
    RHash (Recursive Hasher) is a console utility for computing and verifying hash sums of files. It supports CRC32, CRC32C, MD4, MD5, SHA1, SHA256, SHA512, SHA3, AICH, ED2K, DC++ TTH, BTIH, Tiger, GOST R 34.11-2012, RIPEMD-160, HAS-160, EDON-R, and Whirlpool.
    Leader badge
    Downloads: 982 This Week
    Last Update:
    See Project
  • 2

    GUI File Encrypter

    Just A Few Clicks To Encrypt Your File

    Simple GUI File Encrypter 128-bit AES in CBC mode and PKCS7 padding, with HMAC using SHA256 for authentication. Requirements: - Python 3.9 - Dependencies are required to be installed, Read the README.txt file for instructions. How To Run The Program: - Windows: Just run GUI File Encrypter.py - Mac / Linux: Open Terminal, navigate to folder with the program files & type "python3 GUI\ File\ Encrypter.py" without the quotes If you need to rename the file you can just make sure the extension stays ".py"
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    XORCrypter

    XORCrypter

    Little program for encryption-decryption.

    Little program that uses the bit XOR operation for encryptioning and decryptioning, for now, just text files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    crackpkcs12

    Multithreaded program to crack PKCS#12 files (p12 and pfx extensions)

    Downloads: 10 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 5

    codeZ

    A program to en/decrypt texts that are only crackable using bruteforce

    codeZ is a program that can encrypt/decrypt texts that are not crackable without using brute-force attacks. It supports loads of characters, including symbols like brackets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    otpcrypt

    Linux command line one time pad program

    Linux command line one time pad program. Generates a large one time pad file and tolerates missing messages while keeping pad files in sync. For more information see Wiki tab or source.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    GPGUI - PGP GUI

    GPGUI - PGP GUI

    GUI wrapping GnuPG functionality provided by Bouncy Castle

    The GPGUI program is GUI wrapping GnuPG functionality provided by Bouncy Castle. The program allows you to encrypt/sign/decrypt text messages and files using asymmeric PGP keys. The program can read and manage GnuPG keys if GnuPG is installed. But the program also maintains its own secret and public key files and having GnuPG installed is optional.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8

    NCrypted

    NCrypted - simple file encryption software with GPU support

    NCrypted is a simple file encryption software. It is implemented on top of AES 128-bit algorithm. This software was designed to be as simple as possible, so you won't find any fancy, flashy gui elements or complicated advanced options. You can also use it directly from command line. NCrypted can automatically detect and take advantage of your NVidia graphics card to speed up the file processing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    AESA

    All-purpose Encryption and Security Adaptation

    Starting as a personal study project, I have decided to share this security project. For now, it is a JAVA program that can be used to encrypt and decrypt simple file content (ie files), possibly later evolving into a utility with user interface and/or a library
    Downloads: 0 This Week
    Last Update:
    See Project
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 10
    Kypeless

    Kypeless

    Fully decentralised secure p2p communication program

    Kypeless encapsulates strong symmetric and asymmetric cryptography so you can get the benefits of secure communication following some simple steps. Right now, Kypeless is unstable pre-alpha software, published only for testing purposes. Kypeless allows you to exchange instant messages, long not-so-instant messages and files, but a lot more features are planned to be implemented later.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    SES Super-Encypherment Scrambler

    SES Super-Encypherment Scrambler

    SES brings back the uncrackable onetime pad, with a digital twist.

    SES brings back the uncrackable onetime pad, with a digital twist. It is well known that a random key of message-length is the only provably unbreakable cipher. SES uses cryptographic strength pseudo-random keys of message-length for its many encipherments, in addition to offering true one-time pad capability for the intrepid. SES is built on ISAAC, Bob Jenkins' unbroken CSPRNG, a fast and simple stream cipher placed in the Public Domain in 1996. SES now gives you the ability to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    This is a program that creates one-time-pads, encodes plaintext files with the one-time-pads, decodes them, and creates number-stations-like sound files for message transmission.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    ISC - The ISAAC Stream Cipher

    ISC - The ISAAC Stream Cipher

    ISC lets you encrypt & decrypt text and files of any type up to 4GB

    ...ISAAC is fast - especially when optimised - and portable to most architectures in nearly all programming and scripting languages. After more than 20 years of existence ISAAC has not been broken, and the little program you have here allows you to use it to encrypt and decrypt text of arbitrary length, files of any type, on a key-phrase of any complexity. ISC is a symmetric key encryption system, which means that both the sender and recipient of a message must possess the key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    CryptoX

    AES Encryption Program

    v2.0.0 (Latest) ---CHANGE LOG--- v1.0.0 - Original Release v1.0.1 - Source Code Cleanup v2.0.0 - Now Features File Encryption Protect your privacy! Encrypt your messages and files with a cryptographic strength of up to 256 bits before sending them to others!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    xxteac - XXTEA Encrypter/Decrypter

    xxteac - XXTEA Encrypter/Decrypter

    This xxteac program utilizes the "Corrected Block TEA" encryption/decryption algorithm by Roger Needham and David Wheeler. The original algorithm has been slightly modified to allow arbitary length passwords / password files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Wordpie Python Based Brute Force

    Wordpie Python Based Brute Force

    Python Based Brute Force Password Cracking Assistant By Clownsec

    A python script used to generate all possible password combinations for cracking WAP and other logins or password files. This program is open source. If you see the need to repair or change something by all means do so, but share your findings. *HONK* Usage: wordpie.py [-h] [-o OUTPUT] [-min MIN_SIZE] [-max MAX_SIZE] [-N] [-L] [-U] [-S] [-A] [-v] Generate a wordlist with all possible combinations of letters including: -L (Lowercase Letters) -U (Uppercase Letters) -N (Numbers) -S (Special Characters) -A (All Characters, Numbers, and Letters) -min (Minimum Size) -max (Maximum Size) -o outputfile.gz or -o stdout By default -o filename.gz to create a GZ compressed text file of all the words. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Bigram Table Generator

    Bigram Table Generator

    A program to generate random reciprocal bigram tables

    A command-line program to encrypt/decrypt a message using a random reciprocal bigram table and write a bigram table to a text file. Executing the program without any command-line arguments starts bigram in message encryption/decryption mode. The program prompts for a password or passphrase and a message to encrypt/ decrypt. After the message is entered the ciphertext is displayed. Executing the program with command-line arguments causes bigram to generate a random bigram table to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    inKey

    inKey - small & strong encryption utility (> 800 000 bit).

    inKey - small encryption utility with big encryption block (> 800 000 bit). This program can protect very sensitive data, such e-mail, which has size up to 100 kilobytes, but processing speed might be too small with the bigger size of source data. ProcessingTime(data) = O(data ^ 2); USE IT ONLY TO PROTECT SMALL FILES (~ 100 Kb or a bit bigger). You can use "PaperBack" to print your 100 Kb encrypted *.iK file to A4 paper and get strong encrypted digital letter. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    Codegroup

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    Codegroup is a Java application that will allow one to convert binary (or text) computer files in to 5 letter codegroups for transmission over email, landline telephones, radioteletype or Morse Code. Codegroup has internal error correction & limited cryptography capabilities. Codegroup : ZZZZZ YBPIL AIAIG FMOPP CPAAA DGNGP GPGPA ADNJN ELJKO ELIMO GEOHF KIFGP IFBCB PKCPI YJMHE PHBHP PPOBH NCOHD AKLLL AGHFP DEGEF LKELC EAIJI ABAGP AHPPO IHHPH OHPDF YNFPB ALEPO KMPKP Once this program has a graphical user interface, an Enigma like subsystem must be devised for data whitening. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20

    MLCrypt

    Simple, lightweight, standalone command-line single file encryption.

    Simple, lightweight, cross-platform (Windows / Linux / ARM6 Linux), cross-arch (x32 / x64), standalone command line file encryption program. GnuPG is probably the best application for cross-platform encryption. However, its usage on Windows PCs may be inconvenient (installation administrator rights; large executable size for perhaps just a one-time file decryption, complicated command-line switches for stronger encryption). NCrypt would fulfill this task, but does not operate on 64-bit...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    LastBit Suite

    LastBit Suite

    A steganographic program to hide files into images

    This is a steganogric program that uses images last bits to hide information ( files ). It can crypt data with a rotation and a xor key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    TinyCrypt is a simple secure program for encrypting files. The core encryption code is only 76 lines of C code, based on the well known ARC4-D(768) algorithm.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 23
    TBFAA/encoder
    A program that encrypts multiple files. It uses new encryption algorithms, such as a Three-Block Feistel chiper, ArchFurry's algorithm and a new hash function. Licensed under the ISC.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Implementation of Rijndael, RSA and El Gamal ciphers as well as SHA256, Blake and Blue midnigh wish hash functions. The program is for encrypting files but it can be rewritten for other purposes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Perfenc is a encryption program that encrypts/decrypts files or the standard input with a one-time pad. More information about one-time pads is available at http://en.wikipedia.org/wiki/One-time_pad
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB