Showing 31 open source projects for "domain"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    Cryptol

    Cryptol

    Cryptol: The Language of Cryptography

    Cryptol is a domain-specific language (DSL) for specifying and verifying cryptographic algorithms. Developed by Galois, Cryptol provides a high-level mathematical syntax for describing cryptographic primitives and enables formal verification of algorithm properties. It is used in academic, research, and defense sectors to validate correctness and security through symbolic execution and model checking, ensuring critical cryptographic code is free of design flaws.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Msieve is a C library implementing a suite of algorithms to factor large integers. It contains an implementation of the SIQS and GNFS algorithms; the latter has helped complete some of the largest public factorizations known
    Leader badge
    Downloads: 75 This Week
    Last Update:
    See Project
  • 3

    ProxyCryptGUI

    An easy to use 'front-end' to ProxyCrypt 3.X encryption application

    ProxyCryptGUI2025 • ProxyCryptGUI2025 is a free application that provides a Windows GUI (graphical user interface) for ProxyCrypt to manage encrypted virtual disk drives. • The setup file for ProxyCryptGUI2025 includes the required setup of ProxyCrypt 3.x and required AIM disk driver. • All files stored in an encrypted virtual drive can be accessed just as any files on regular disk drives but only after the drive is mounted/opened with the associated passphrase. • ProxyCryptGUI2025 can...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    File Encoder Application

    File Encoder Application

    Java application for encryption

    Java application for encryption with a GUI. It is based in the XOR symetric encryption combined with a pseudorandom resorting of the bytes. Strenth and time to encrypt/decyrpt per MB adapted to size of input file. Multithread. zoom Multilanguage Dark mode JDK-17 compatibility It includes detailed documentation in English, Spanish and Catalan. You will find more about it at this web...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8 Monitoring Tools in One APM. Install in 5 Minutes. Icon
    8 Monitoring Tools in One APM. Install in 5 Minutes.

    Errors, performance, logs, uptime, hosts, anomalies, dashboards, and check-ins. One interface.

    AppSignal works out of the box for Ruby, Elixir, Node.js, Python, and more. 30-day free trial, no credit card required.
    Start Free
  • 5
    Stegcore

    Stegcore

    A cross-platform crypto-steganography toolkit

    Stegcore combines cryptography and steganography to hide encrypted data inside ordinary files. It encrypts your payload before embedding it, so the hidden content is unreadable even if someone extracts it, and invisible to anyone who doesn't know it's there. Unlike basic steganography tools that hide data without encrypting it, Stegcore ensures the payload is cryptographically protected at rest. Unlike pure encryption tools, the payload isn't even visible. Designed for journalists,...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 6
    PetoronHash-System

    PetoronHash-System

    PHASH | post-quantum XOF hashing algorithm | C++20

    PHASH is a self-contained, dependency-free, post-quantum XOF hashing algorithm implemented in modern C++20. This release delivers the first fully stable production implementation of the PetoronHash-System — a 1600-bit sponge-based hash function with domain separation, extendable output, and deterministic behavior. Key Features No external dependencies — pure C++20 implementation. Extendable Output (XOF) — supports arbitrary output length (256–8192+ bits). Post-quantum oriented design — ARX-based sponge resistant to Grover-type attacks. Context and salt separation — unique hashing domains for each use-case. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    PetoronHash2

    PetoronHash2

    PH2 Permutation-based cryptographic post-quantum hash library with duplex construction (C++20)

    PetoronHash2 (PH2) is a standalone ARX-based sponge construction that combines: A 4096-bit internal permutation core A sponge/duplex architecture with explicit capacity separation An extendable-output function (XOF) Memory-hard (HARD) and burn (BURN) modes A structured tagged absorb scheme A parameterized architecture suitable for hashing, KDF, and stress-oriented derivation PH2 is designed as a wide-state cryptographic primitive with explicit domain separation and configurable output length. https://github.com/01alekseev/PetoronHash2 Petoron | Ivan Alekseev | MIT license
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    truecrypt-wxGTK3

    Truecrypt Ported to wxGTK3

    This is the final release of truecrypt (7.1a) ported to use wxGTK3 instead of 2.8. None of the underlying code has changed, instead the compile errors due to modern distros using and updated version of wxGTK have been resolved (for now).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9

    d-crypt

    Tweakable 256-bit symmetrical block cipher.

    D-crypt is an symmetrical block cipher operating on 256bit blocks with an key of the same length. The cipher takes 3 inputs: the data to encrypt, the symmetric key and a tweak consisting in a array of 16 integers representing each one of eleven possible keyaddition algorithms. Features a similar structure as AES (uses simpler versions of ShiftRows, MixColumns) and uses AES SBOX. It is an SP network. The Key Schedule is a different from AES's, however the Expansion is partially inspired in...
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 10
    ISC - The ISAAC Stream Cipher

    ISC - The ISAAC Stream Cipher

    ISC lets you encrypt & decrypt text and files of any type up to 4GB

    ISAAC is a cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It was developed by Bob Jenkins from 1993-1996 and placed in the Public Domain. ISAAC is fast - especially when optimised - and portable to most architectures in nearly all programming and scripting languages. After more than 20 years of existence ISAAC has not been broken, and the little program you have here allows you to use it to encrypt and decrypt text of arbitrary length, files of any type, on a key-phrase of any complexity. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    inKey

    inKey - small & strong encryption utility (> 800 000 bit).

    inKey - small encryption utility with big encryption block (> 800 000 bit). This program can protect very sensitive data, such e-mail, which has size up to 100 kilobytes, but processing speed might be too small with the bigger size of source data. ProcessingTime(data) = O(data ^ 2); USE IT ONLY TO PROTECT SMALL FILES (~ 100 Kb or a bit bigger). You can use "PaperBack" to print your 100 Kb encrypted *.iK file to A4 paper and get strong encrypted digital...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    Absolutely Safe Chat

    p2p (sockets) chat with inKey encryption (32768 bit).

    p2p (sockets) chat with "inKey 6.0" encryption (key size up to 32768 bit), written on CBuilder 6.0. source code included P.S. http://sourceforge.net/projects/inkey/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Codegroup

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    Codegroup is a Java application that will allow one to convert binary (or text) computer files in to 5 letter codegroups for transmission over email, landline telephones, radioteletype or Morse Code. Codegroup has internal error correction & limited cryptography capabilities. Codegroup : ZZZZZ YBPIL AIAIG FMOPP CPAAA DGNGP GPGPA ADNJN ELJKO ELIMO GEOHF KIFGP IFBCB PKCPI YJMHE PHBHP PPOBH NCOHD AKLLL AGHFP DEGEF LKELC EAIJI ABAGP AHPPO IHHPH OHPDF YNFPB ALEPO KMPKP Once this...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    Enigma Encryption any OS

    Enigma Encryption any OS

    A cross-plattform encryption tool for texts and files

    Enigma encrypts texts (PINs, Passwords, Messages, etc.) of any kind and is available for any OS, because it's just an HTML-Webpage with JavaScript in the back. So you can share secrets with friends on any device which has a HTML-Browser. On my Homepage you can find out how to use file-encryption.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    pup2p is a remaster of the Puppy Linux livecd distro and is aimed at use with the anonymous network I2P. It includes I2P as well as a number of I2P related apps. NOTE: The ISO is currently VERY out of date! Sorry for my absence. I may try to update the project soon. The SFS file IS up to date as of this change. 03/2013
    Downloads: 5 This Week
    Last Update:
    See Project
  • 16
    TinyCrypt is a simple secure program for encrypting files. The core encryption code is only 76 lines of C code, based on the well known ARC4-D(768) algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    XTEA (eXtended Tiny Encryption Algorithm) support for db4o open source object database. XTEA is a block cipher that operates on a 64-bit block size with a 128-bit key. An extremely tiny but very fast encryption algorithm (with cycles less than 32 rounds)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A Javascript implementation of the Blowfish Encryption Algorithm described by Bruce Shneier circa 1993. Blowfish is a keyed, symmetric block cipher common in cipher suites and was placed, by Mr. Shneier, in the public domain.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A pure python module which implements the DES and Triple-DES encryption algorithms. Triple DES is either DES-EDE3 with a 24 byte key, or DES-EDE2 with a 16 byte key.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 20
    This library provides two operations: one to wrap key data, and another to unwrap the key data. This code also includes a fairly comprehensive unit test library which ensures the implementation is verified against the vectors provided in RFC 3394.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    it creates MD5 checksum.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    This software implements the time stamp service. (mainly implements the Hierarchical Time-stamp Protocol. This protocol is proposed in a published paper which can be found in this package.)The code can help you to construct your time-stamp server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    PHP functions and classes to add a Domain Key Identified Mail (DKIM RFC 4871) signatures to emails sent by PHP. It is based on the openssl extensions of PHP. It can generate DKIM signature but cannot verify them. Developped and tested on PHP 4.0.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    OW.NET -- 1-Wire API port from Java (and J#) to C#. Use the Dallas 1-Wire and iButton chips with standard C# using a serial adapter (also CF.net) or the TMEX drivers on the Windows platform. No J# distribution installation required.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Powerful 512bit pseudo random encryption, optimized for the x86-64 architecture. Coded in x86-64 assembly language, this has the potential to be one of the most powerful and fastest file encryption engines to date.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB