Showing 22 open source projects for "projectm-complete"

View related business solutions
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 1
    This project is an implementation of the TCG TPM 2.0 specification. It is based on the TPM specification Parts 3 and 4 source code donated by Microsoft, with additional files to complete the implementation. See the wiki for additional support - additions to the documentation. See the companion IBM TSS at https://sourceforge.net/projects/ibmtpm20tss/
    Leader badge
    Downloads: 317 This Week
    Last Update:
    See Project
  • 2
    Msieve is a C library implementing a suite of algorithms to factor large integers. It contains an implementation of the SIQS and GNFS algorithms; the latter has helped complete some of the largest public factorizations known
    Leader badge
    Downloads: 51 This Week
    Last Update:
    See Project
  • 3
    PyKCS11: a complete PKCS#11 wrapper for Python, created using the SWIG compiler. API documentation: http://pkcs11wrap.sourceforge.net/api/
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    PureBasic Shamir Secret Sharing

    PureBasic Shamir Secret Sharing

    Open-source PureBasic implementation of the Shamir Secret Sharing

    ...This implementation operates over the finite field GF(257), allowing correct handling of all byte values (0–255) without loss, making it compatible with any type of string or binary-compatible data. Main Features Complete implementation of Shamir Secret Sharing Arithmetic over GF(257) Compatible with all character strings Robust Lagrange interpolation Safe modular inverse computation Shares encoded in hexadecimal (3 characters per byte) Clear, well-commented source code ⚠️ Disclaimer This project is intended for educational and demonstration
    Downloads: 2 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5
    PTBC

    PTBC

    irreversible encryption with time self-destruction

    Petoron Time Burn Cipher (PTBC) A promising cipher based on self-destruction of time, complete absence of traces and impossibility of key selection. Key features: AES-CFB encryption with per-file IV Argon2id key derivation with 256MB RAM resistance TTL (time to live) built directly into the encrypted file HMAC-SHA512 integrity verification Self-deleting mode (--autowipe) and one-time access marking (--onetime) No file metadata, no recovery, no password resets Philosophy: If you lose the password - it’s over. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    HTMF is a Java Hard Token Management Framework used to manage the complete livecycle of an organizations Smartcards and/or USB dongles. It communicates with the tokens through a PKCS11 interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    rtl2832-entropyd

    Use an rtl2832 USB dongle to generate random data for the linux kernel

    ...Create the file /etc/modprobe.d/blacklist-dvb_usb_rtl28xxu.conf with the line blacklist dvb_usb_rtl28xxu in it. The project website is an html version of the man page, so you can find more complete information there.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    SES Super-Encypherment Scrambler

    SES Super-Encypherment Scrambler

    SES brings back the uncrackable onetime pad, with a digital twist.

    ...SES is built on ISAAC, Bob Jenkins' unbroken CSPRNG, a fast and simple stream cipher placed in the Public Domain in 1996. SES now gives you the ability to efficiently cipher text of arbitrary length or files of any size or type. Use it with confidence. To achieve complete one-on-one privacy, SES traverses several levels en route to its output. The more words in your key-phrase, the more layers of encipherment SES applies. It is part Vigenere, part onetime pad, part cryptographic hash, not to mention the essential scrambler element, each component driven by ISAAC, with all key-derivation and stretching relying on Keccak in 512-bit configuration.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Codegroup

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    Codegroup is a Java application that will allow one to convert binary (or text) computer files in to 5 letter codegroups for transmission over email, landline telephones, radioteletype or Morse Code. Codegroup has internal error correction & limited cryptography capabilities. Codegroup : ZZZZZ YBPIL AIAIG FMOPP CPAAA DGNGP GPGPA ADNJN ELJKO ELIMO GEOHF KIFGP IFBCB PKCPI YJMHE PHBHP PPOBH NCOHD AKLLL AGHFP DEGEF LKELC EAIJI ABAGP AHPPO IHHPH OHPDF YNFPB ALEPO KMPKP Once this...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Total Network Visibility for Network Engineers and IT Managers Icon
    Total Network Visibility for Network Engineers and IT Managers

    Network monitoring and troubleshooting is hard. TotalView makes it easy.

    This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
    Learn More
  • 10
    Steganography Studio
    This project provides a steganography tool that allows to know, use and compare the results of current steganographic techniques. It also incorporates a comprehensive set of stegoanalitics methods for images.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    opacity
    The Open Protocol for Access Control Identification and Ticketing with privacY, is a standard suite of Key Establishment and Authentication protocols based on ECC and AES, for optimized contactless transactions and simple PKI based Key management.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    A formally verified implementation of cryptographic algorithms using the SPARK programming language. For the complete library proofs of the absence of run-time errors are available. Some of its subprograms include proofs of partial correctness.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Erinaceus is an esoteric two dimensional programming language which uses bitmaps as sourcecode. It is turing complete and able to modify itself. It has been created with the goal to create a language that can be hidden in pictures easily.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    JSerpent is an easy to use Java implementation of the powerful Serpent cryptography algorithm. It can be easily implemented into any project, and is complete with ECB, padding, and a simple API.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Odyssi PKI aims to be a complete PKI suite written in Java, and designed from the ground up with security in mind. When completed, it will be fully standards compliant with PKIX, XKMS, OCSP, and other PKI standards.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Waste.NET is a complete rewrite of the now defunct W.A.S.T.E. project. It aims to become a highly secure file sharing application, as well as a secure chat/VOIP platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    *Unofficial* patch for DALnet's ircd, currently for version 1.4.36. Provides complete IPv6 and IPv4-in-IPv6 support and SSL support.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 18
    SharpPrivacyLibrary is a complete RFC2440 ( OpenPGP specifications ) implementation. It is coded in c# .NET and it is a fully PGP 8.0 compatible API.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Secrets is a complete, standalone, personal encryption solution that works much like PGP (Pretty Good Privacy). With Secrets you can encrypt information before emailing it to a friend or coworker, or before storing it on a removable disk. Secrets is buil
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Lizard Cart CMS offers an easy way for people with limited HTML experience to manage the content and products of their websites.It uses PHP/MySql/Java Script comes complete with a WYSIWYG online editor.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    An almost complete one-time-pad suite. Has many features which are non-existant in other OTP programs, and includes 5 programs (plus an uninstaller) which allow the user to create keys, create fake keys, encrypt, and decrypt files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    The Ada Cryptographic Framework (ACF) is a set of Ada packages that implement the most popular cryptographic algorithms. The main goal of the proyect is to implement a complete set of cryptographic primitives entirely in Ada 95
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next