Showing 189 open source projects for "can="

View related business solutions
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • Compliant and Reliable File Transfers Backed by Top Security Certifications Icon
    Compliant and Reliable File Transfers Backed by Top Security Certifications

    Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.

    Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
    Start Free Trial
  • 1
    ShadowsocksX-NG

    ShadowsocksX-NG

    Next Generation of ShadowsocksX

    ...It now runs as a background service rather than an in-app process, so the ss-local may still be running even after you quit the app. ShadowsocksX-NG also has an added manual mode so you can configure your apps to use the socks5 proxy manually without configuring the system proxy settings.
    Downloads: 15 This Week
    Last Update:
    See Project
  • 2
    Cryptomator

    Cryptomator

    Multi-platform transparent client-side encryption for your cloud files

    Cryptomator is a free and open source project that offers multi-platform, transparent client side encryption of your files in the cloud. It works with just about any cloud storage service; is totally transparent so you can work with your files how you normally would; and secure with a 256-bit key length AES encryption. It’s also simple and easy to use with no need for different accounts, key management, cloud access grants or cipher configurations.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 3
    Amazon DynamoDB Encryption Client Python

    Amazon DynamoDB Encryption Client Python

    Amazon DynamoDB Encryption Client for Python

    ...The helper clients provide a familiar interface but the actual item encryption and decryption is handled by a low-level item encryptor. You usually will not need to interact with these low-level functions, but for certain advanced use cases it can be useful. If you do choose to use the item encryptor functions directly, you will need to provide a CryptoConfig for each call. By default, the helper clients use your attribute actions and cryptographic materials provider to build the CryptoConfig that is provided to the item encryptor. For some advanced use cases, you might want to provide a custom CryptoConfig for specific operations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    aws-encryption-sdk-cli

    aws-encryption-sdk-cli

    CLI wrapper around aws-encryption-sdk-python

    This command line tool can be used to encrypt and decrypt files and directories using the AWS Encryption SDK. If you have not already installed cryptography, you might need to install additional prerequisites as detailed in the cryptography installation guide for your operating system. Installation using a python virtual environment is recommended to avoid conflicts between system packages and user-installed packages.
    Downloads: 0 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 5
    s2n-quic

    s2n-quic

    An implementation of the IETF QUIC protocol

    ...This library integrates with AWS’s s2n-tls or rustls for the TLS 1.3 handshake and leverages Rust’s memory and thread safety guarantees to deliver a robust implementation. It is built with configurability in mind—you can tune congestion control (like CUBIC), pacing, packet size discovery, and other advanced network behaviors. Extensive testing (unit, fuzz, interop) ensures protocol compliance and interoperability with other implementations. Because it is open-source under Apache 2.0, organizations can integrate it into services where low latency, multiple streams, or mobility (connection migration) matter.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    AWS Encryption SDK for C

    AWS Encryption SDK for C

    AWS Encryption SDK for C

    ...These recipes assume a newly installed system with default installs of dependency packages. The Windows instructions install everything in your current directory (where you run the build process). The AWS Encryption SDK for C can be used with AWS KMS, but it is not required. For best results when doing a build with AWS KMS integration, do not install aws-c-common directly. Build and install the AWS SDK for C++, which will build and install aws-c-common for you (see the C++ SDK dependencies here).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Minisign

    Minisign

    A dead simple tool to sign files and verify digital signatures

    ...The tool is intentionally minimalistic, performing a single task efficiently without unnecessary complexity, which makes it easy to integrate into automated workflows and pipelines. Users can generate key pairs, sign files, and verify signatures using straightforward commands, enabling secure validation of files across different environments. Minisign supports deterministic signatures and includes features such as trusted comments that allow embedding metadata within signatures for additional context and verification integrity.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Halite

    Halite

    High-level cryptography interface powered by libsodium

    ...Halite was created by Paragon Initiative Enterprises as a result of our continued efforts to improve the ecosystem and make cryptography in PHP safer and easier to implement. You can read the Halite Documentation online. Halite is released under Mozilla Public License 2.0. Commercial licenses are available from Paragon Initiative Enterprises if you wish to extend Halite without making your derivative works available under the terms of the MPL. If you are satisfied with the terms of MPL software for backend web applications but would like to purchase a support contract for your application that uses Halite, those are also offered by Paragon Initiative Enterprises.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Trillian

    Trillian

    A transparent, highly scalable and cryptographically verifiable data

    ...Common use cases include certificate transparency, package registries, and audit logs where public verifiability or tamper evidence is required. Trillian exposes both “log” and “map” primitives so developers can choose between append-only timelines or verifiable dictionaries depending on their data model. By making verification independent of trust in the operator, trillian helps build systems that are auditable by external parties.
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 10
    Swift Crypto

    Swift Crypto

    Open-source implementation of a substantial portion of the API

    Swift Crypto is a cross-platform, open-source implementation that mirrors a substantial portion of CryptoKit so server and Linux/Windows ARM64 apps can share one modern crypto API. It exposes high-level, misuse-resistant primitives with Swift ergonomics while delegating to well-vetted backends under the hood. The repository maintains active releases and issue tracking for enhancements like PEM handling and ecosystem compatibility. High-level, misuse-resistant primitives and key handling. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    AWS Encryption SDK for Dafny

    AWS Encryption SDK for Dafny

    AWS Encryption SDK for Dafny

    ...In addition, this project uses the parallel verification tasks provided by the dafny.msbuild MSBuild plugin, and thus requires dotnet 3.0. The tests currently require native implementations of cryptographic primitives and other methods, so they can only be run when embedding this library into one of the compilation target languages supported by Dafny. This repo uses Duvet to directly document the specification alongside this implementation. Refer to the specification for how to install duvet in order to generate reports. By default duvet_report will extract the spec only if it cannot find the compliance directory in the specification repo, but will re-use a previous extraction if it exists.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Qtum

    Qtum

    Qtum Core Wallet

    ...If you are testing the network or developing unstable software on Qtum, we highly recommend using either testnet or regtest mode. A Proof of Stake consensus system which is optimized for Qtum's contract model. Any user can stake and help to secure the network. There is no voting, master nodes, or minimum amount required. There have been transactions as small as 2 Qtum that have created blocks in the past. Staking from smart contracts is under development.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    VeraCrypt

    VeraCrypt

    Open source disk encryption with strong security for the Paranoid

    ...All released files are PGP signed with key ID=0x680D16DE, available on key servers and downloadable at https://www.idrix.fr/VeraCrypt/VeraCrypt_PGP_public_key.asc VeraCrypt can mount TrueCrypt volumes. It also can convert them to VeraCrypt format. Documentation: https://www.veracrypt.fr/en/Documentation.html FAQ : https://www.veracrypt.fr/en/FAQ.html
    Leader badge
    Downloads: 2,346 This Week
    Last Update:
    See Project
  • 14
    GpgFrontend

    GpgFrontend

    A Free, Easy-to-Use, Cross-Platform OpenPGP Crypto Tool.

    GpgFrontend is a Free, Open Source, Powerful, Easy-to-Use, Compact, Cross-Platform OpenPGP Crypt Tool. Also, it's one of the excellent GUI Frontends for Modern GnuPG (gpg). By using GpgFrontend, you can quickly encrypt and decrypt text or files. You can also digitally sign your text or files.GpgFrontend does not need to depend on any server, therefore it may be one of the last lines of defense in protecting your privacy. Please use this tool to transmit or store information that you regard as very precious. You can also use it to guarantee the authenticity of your information.
    Downloads: 19 This Week
    Last Update:
    See Project
  • 15
    denuvo

    denuvo

    DENUVO (VMProtect 2.6x) VM research tool

    ...DENUVO_Profiler is a subsequent development of the SecuROM_Profiler utility - the simplest tool for visualising the operation of a virtual machine and effectively controlling the data it uses in the byte-code tape (p-code). DENUVO_Profiler also hunts for Electronic Arts (Origin) licence containers on the current user's machine and can extract their contents, with including the GameToken. # See also: 80_PA SecuROM keygen
    Leader badge
    Downloads: 71 This Week
    Last Update:
    See Project
  • 16
    MyPGP

    MyPGP

    PGP graphical user interface

    ...It relies on BouncyCastle libraries for the cryptographic primitives. It uses file system folders to store keys, either single or key rings, organized as a nested tree of folders. It can also create lists of keys for bulk operations.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 17

    ProxyCryptGUI

    An easy to use 'front-end' to ProxyCrypt 3.X encryption application

    ... • The setup file for ProxyCryptGUI2025 includes the required setup of ProxyCrypt 3.x and required AIM disk driver. • All files stored in an encrypted virtual drive can be accessed just as any files on regular disk drives but only after the drive is mounted/opened with the associated passphrase. • ProxyCryptGUI2025 can open and convert most (but not all) older ProxyCrypt 2.x encrypted containers. • ProxyCryptGUI2025 is currently a beta version release... be sure to keep data backed up Requirements: • Windows 7, 8 or 8.1, 10, 11 64b • computer administrator privileges • CPU with SSE2 instructions
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18

    DavUtils

    Powerful webdav client and sync tools with client-side AES encryption

    ...The built-in client-side encryption allows you to encrypt and decrypt files on the fly with AES. Currently two command line tools are available: dav is a multipurpose WebDAV client that can be used like the standard unix tools ls, mkdir and rm. The other tool is dav-sync that can synchronize local files with a WebDAV server. It is very flexible and configurable and has advanced data safety features to prevent data loss. The integrated client-side AES encryption makes it secure to use public clouds.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 19
    a smal tool tat can split a file into to files for encryption only both files can restore the orginal file
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    GoldBug - Encrypted Communications

    GoldBug - Encrypted Communications

    Chat Messenger. E-Mail-Client. Websearch. Filetransfer.

    ...Microsoft & Qt MinGW deprecated Win32 & for Compiling: ● https://sourceforge.net/p/goldbug/wiki/compiling As Spot-On implemented the minimal GB-concept & Nuvola Icons, GoldBug has now been fully integrated into Spot-On Win64: Just choose Tabs at East & Mini-View in Options - w/ Nuvola Icons of course! Voilá! & Many Thanks, Pro-Files can be found archived at ● current source: https://github.com/textbrowser/spot-on ● EN Manual: https://www.amazon.com/dp/3749435065 ● DE: https://compendio.github.io/goldbug-manual-de/ ● Study: https://www.amazon.com/asin/dp/3750408971
    Downloads: 12 This Week
    Last Update:
    See Project
  • 21
    PCSecrets

    PCSecrets

    Encrypt and manage secret text data

    PCSecrets is a PC application that holds secret text data - protected by a master password and strong encryption. Use it as a password manager or just somewhere to hold any text data securely in one place. It can hold a second, hidden set of secrets that is undetectable and plausibly deniable. The program is also a PC counterpart of the Secrets for Android app. It uses the same data structure and provides synchronization that allows easy transfer of secrets between the two. For those who find the personal computer environment more comfortable for data entry and editing (i.e. a real keyboard), PCSecrets provides an alternative way to manage your secrets. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    EasyJCE

    Provides encryption & password hashing for your app or Hibernate POJOs

    ...EasyJCE supports most algorithms implemented for the JCE, including those provided by third-party encryption service providers. Integrated MAC (Message Authentication Code) support can optionally be used to ensure data integrity and indicate possible data tampering. EasyJCE also provides basic encoding and decoding facilities for transmitting encrypted binary data through mediums which are limited to printable ASCII characters, such as email messages or URL's.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Vigen

    Vigen

    UTF-8 Multi-pass Tableau de Vigenère Encryption Rotation Engine

    Vigen is a Unicode UTF-8 multi-pass rotation encryption system based on the classic Tableau de Vigenère. Vigen is an experiment using this particular cypher, intended for those who are interesting in building their own encryption tables. Vigen can generate exceedingly strong rotation cyphers that are probably unbreakable without the given keys and tables. Vigen might even generate military grade cyphers, although I make no claim as to the security of the cypher. Vigen is for encrypting UTF-8 TEXT files; it is not intended for encrypting binary files. Vigen is not a private/public key encryption system such as PGP (at least, not yet).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    OpenVPN

    OpenVPN

    Robust and flexible VPN network tunnelling

    OpenVPN is a robust and highly flexible tunneling application that uses all of the encryption, authentication, and certification features of the OpenSSL library to securely tunnel IP networks over a single TCP/UDP port. Discussion forums and project wiki can be found here: https://forums.openvpn.net/ http://community.openvpn.net/openvpn
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    PureBasic Shamir Secret Sharing

    PureBasic Shamir Secret Sharing

    Open-source PureBasic implementation of the Shamir Secret Sharing

    PureBasic Shamir Secret Sharing is an open-source, self-contained and educational implementation of the Shamir Secret Sharing Scheme, written entirely in PureBasic. Shamir Secret Sharing is a cryptographic method that splits a secret into multiple parts (shares), such that any combination of at least T shares can reconstruct the original secret, while any number of shares fewer than T reveals no usable information. This implementation operates over the finite field GF(257), allowing correct handling of all byte values (0–255) without loss, making it compatible with any type of string or binary-compatible data. Main Features Complete implementation of Shamir Secret Sharing Arithmetic over GF(257) Compatible with all character strings Robust Lagrange interpolation Safe modular inverse computation Shares encoded in hexadecimal (3 characters per byte) Clear, well-commented source code ⚠️ Disclaimer This project is intended for educational and demonstration
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB