Open Source Mac Cryptography Software - Page 9

Cryptography Software for Mac

View 930 business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 1
    Backup P2P is a peer to peer application doing automated and secured backups inside a community (Jabber, XMPP). Each user shares some available space on his disk with others, to be able in return to remotely backup some of his own data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    *Unofficial* patch for DALnet's ircd, currently for version 1.4.36. Provides complete IPv6 and IPv4-in-IPv6 support and SSL support.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    BarTex is a system designed to create inexpensive tickets for events. It uses a crypto system to verify tickets using barcodes; thus eliminating the cost of expensive, colorful tickets that cannot be photocopied/forged.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    You can encode your php files with this class
    Downloads: 0 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 5
    Bigram Table Generator

    Bigram Table Generator

    A program to generate random reciprocal bigram tables

    A command-line program to encrypt/decrypt a message using a random reciprocal bigram table and write a bigram table to a text file. Executing the program without any command-line arguments starts bigram in message encryption/decryption mode. The program prompts for a password or passphrase and a message to encrypt/ decrypt. After the message is entered the ciphertext is displayed. Executing the program with command-line arguments causes bigram to generate a random bigram table to print to screen or save to disk depending on whether the -f filename argument was given. If the -p passphrase argument is given a specific table is generated and is repeatable each time the same passphrase is given. This program was written to supplement the Enigma Simulator by Dirk Rijmenants. http://users.telenet.be/d.rijmenants/en/enigmasim.htm Enigma message procedures: http://users.telenet.be/d.rijmenants/en/enigmaproc.htm
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    BitShade

    BitShade

    AES Cipher, Base64 encoder, SHA calculator

    BitShade is a graphic utility to encrypt/decrypt with AES, base64 encode/decode, calculate the SHA checksum. It is cross platform, written in Java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Black Hole is a GPG frontend. The GUI has is file browser where you can drag and drop your files for being encrypted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Blocked based Multi Identity Cryptographic Storage (BMICS) is a storage method that stores encrypted data of multiple users within a BMICS file without giving away details of the users in an explicit manner unless decrypted with the correct key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Portable, optimised implementation of Bruce Schneier's 64-bit symmetric block cipher, Blowfish. Includes support for ECB, CBC, CFB, OFB and CTR block cipher modes, weak key detection and parallelisation using OpenMP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 10
    BlowfishVHDL - free fully synthesizable Blowfish encryption algorithm hardware implementation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    BoarderZone ASNalyzer
    A 100% pure Java Swing ASN.1 analysis utility for inspecting arbitrary BER-encoded data files. It allows inspection of data with unknown structure, can drill down to any nesting level and allows to interpret embedded OCTET STRING data recursively.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Bork is a very small, cross-platform file encryption utility. It is written in Java and designed to be included along with the files it encrypts for long-term storage (eg on CD-R). Its minimal external dependencies make it fairly futureproof.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Botan is a C++ crypto library Note: all versions of botan served on sf are OBSOLETE AND NOT SUPPORTED IN ANY WAY. Go to http://botan.randombit.net for the latest stable/supported release.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Java SWING applet to store encrypted files in your box.net account
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    BroBu converT

    Convert .txt files into .brobu files

    BroBu converT can convert .txt files into .brobu files which can be used in our codeZ application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    Bwst

    BWST is a short word for Brute-force Word-list Segmentation Technique.

    Simply, it’s a brute-force word list generating application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Common Data Security Architecture Objective-C Wrapper Framework - Digest: MD5/SHA-1 - Encryption/Decryption: Symmetric encryption - Utils: Base64 encoding/decoding
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Applet loader for the Cyberflex Access Developer 32k and e-gate 32k cards. Will allow you to load the MuscleCard applet onto the smartcard and use it as cryptographic token.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    CRYPTOKIT

    Home Text Encryption Tool

    Cryptokit is a Securit software for text encryption for you sensible data without regard of what kind of source is
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    CRYXOR 2012

    Encryption with Vernam (1917)

    Programm dev by www-cassiopee (sophen). Encryption with Vernam. unbreakable algorithme... but needs lot of safty measures for be it realy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    A graphical tool for generating RSA and ECDSA cryptographic key-pairs, creating Certificate Signing Requests (CSRs) from them, and combining the key-pair with an issued digital certificate to create a secure portable container (PKCS12, JKS, JCEKS, etc.).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    CapPacketDecryptor is a MapleStory packet decrypting solution which reads .pcap files, decrypts the packets in them, and dumps them to another .pcap file, while reconstructing TCP information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Cardano SL

    Cardano SL

    Cryptographic currency implementing Ouroboros PoS protocol

    Cryptographic currency implementing Ouroboros PoS protocol. The cardano-node is the top level for the node and aggregates the other components from other packages: consensus, ledger and networking, with configuration, CLI, logging and monitoring. The node no longer incorporates wallet or explorer functionality. The wallet backend and explorer backend are separate components that run in separate external processes that communicate with the node via local IPC. The new Cardano implementation consists of more granular components.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Cassiopeia's BitMail

    Cassiopeia's BitMail

    Encrypting E-Mail Client

    BitMail is a Proof-of-Concept- / Design-Study for an Qt E-Mail Client. POP3 / IMAP / SMTP / P2P E-Mail-Client. ● Qt E-Mail Client. ● Build-in Encryption to secure E-Mails ● IMAP & POP3 ● Additionally a full decentral P2P Email-Option via the Echo Protocol ● Store Email for Offline-Friends in the P2P Network. ● Chat and Instant Messaging is build in. ● POPTASTIC function (Chat over Email) ● Calendar widget functionality. ● Open Source. BSD License. "Cassiopeia is the tortoise of Momo, which can communicate through writing on her shell and guides into the future." - Wikipedia. Source from: https://sf.net/projects/spot-on/files/ & https://github.com/textbrowser/spot-on
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    CertForge is a web-based certificate utility written in Java 1.6, to make or view X.509 certificates, keys, CRLs, manage keystore and truststore (CTL) for SSL sites, and run as a simple Certificate Authority (CA).
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB