Showing 26 open source projects for "language"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 1
    Cryptol

    Cryptol

    Cryptol: The Language of Cryptography

    Cryptol is a domain-specific language (DSL) for specifying and verifying cryptographic algorithms. Developed by Galois, Cryptol provides a high-level mathematical syntax for describing cryptographic primitives and enables formal verification of algorithm properties. It is used in academic, research, and defense sectors to validate correctness and security through symbolic execution and model checking, ensuring critical cryptographic code is free of design flaws.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    cargo-crev

    cargo-crev

    A cryptographically verifiable code review system for the cargo

    A cryptographically verifiable code review system for the cargo (Rust) package manager. cargo-crev is an implementation of Crev as a command-line tool integrated with cargo. This tool helps Rust users evaluate the quality and trustworthiness of their package dependencies. Crev is a language and ecosystem agnostic, distributed code review system. Use reviews produced by other users. Increase the trustworthiness of your own code. Build a web of trust of other reputable users to help verify the code you use. Static binaries are available from the releases page. Crev is a system for verifying the security and reliability of dependencies based on collaborative code reviews. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    aws-encryption-sdk

    aws-encryption-sdk

    AWS Encryption SDK

    The AWS Encryption SDK is a client-side encryption library designed to make it easy for everyone to encrypt and decrypt data using industry standards and best practices. It enables you to focus on the core functionality of your application, rather than on how to best encrypt and decrypt your data. The AWS Encryption SDK is provided free of charge under the Apache 2.0 license. With the AWS Encryption SDK, you define a master key provider (Java and Python) or a keyring (C, C#/.NET, and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    mendelson AS2

    mendelson AS2

    Implementation of the EDIINT AS2 protocol (RFC 4130)

    mendelson AS2 is the JAVA-based open source EDIINT AS2 solution. Monitoring- and configuration GUI, async & sync MDN, signatures, encryption, TLS, web interface, pluggable into any servlet container, partner manager, certificate manager, data compression, optional profiles: MA, FN. Localized to Spanish, Italian, Portuguese, German, English, French.
    Leader badge
    Downloads: 484 This Week
    Last Update:
    See Project
  • Automate KYC, KYB and AML to prevent fraud, ensure compliance and onboard customers noticeably faster with Authologic. Icon
    Automate KYC, KYB and AML to prevent fraud, ensure compliance and onboard customers noticeably faster with Authologic.

    Supercharge your existing KYC with e-IDs.

    Add government-issued digital IDs, identity wallets and Bank IDs to your existing KYC/AML & KYB infrastructure. No manual checks. No deep-fakes or forged documents. Customise your onboarding without the need of IT, using our modular workflow architecture.
    Learn More
  • 5
    Vigen

    Vigen

    UTF-8 Multi-pass Tableau de Vigenère Encryption Rotation Engine

    Vigen is a Unicode UTF-8 multi-pass rotation encryption system based on the classic Tableau de Vigenère. Vigen is an experiment using this particular cypher, intended for those who are interesting in building their own encryption tables. Vigen can generate exceedingly strong rotation cyphers that are probably unbreakable without the given keys and tables. Vigen might even generate military grade cyphers, although I make no claim as to the security of the cypher. Vigen is for encrypting UTF-8...
    Downloads: 26 This Week
    Last Update:
    See Project
  • 6
    wolfSSL
    The wolfSSL embedded SSL library (formerly CyaSSL) is a lightweight, portable, C-language-based SSL/TLS library targeted at IoT, embedded, and RTOS environments primarily because of its size, speed, and feature set. It works seamlessly in desktop, enterprise, and cloud environments as well. wolfSSL supports industry standards up to the current TLS 1.2 and DTLS 1.2, is up to 20 times smaller than OpenSSL, offers a simple API, an OpenSSL compatibility layer, OCSP and CRL support, is backed by the robust wolfCrypt cryptography library, and much more. ...
    Downloads: 13 This Week
    Last Update:
    See Project
  • 7
    Tink

    Tink

    A library that provides cryptographic APIs that are easy and secure

    Tink is a multi-language, cross-platform, open source library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse. Tink is an open-source cryptography library written by cryptographers and security engineers at Google. Tink's secure and simple APIs reduce common pitfalls through user-centered design, careful implementation and code reviews, and extensive testing.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Ciphey

    Ciphey

    Decrypt encryptions without knowing the key or cipher

    ...Ciphey uses a custom-built artificial intelligence module (AuSearch) with a Cipher Detection Interface to approximate what something is encrypted with. And then a custom-built, customizable natural language processing Language Checker Interface, which can detect when the given text becomes plaintext.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 9

    PyPWD

    A Python3 Password Manager, with encryption and without connection

    https://www.garanet.net/it-blog/python-password-manager/ A Python3 Password Manager, with encryption and without an Internet connection. How it Works: First Run: PyPWD > Creates Master Key with your master username and password (Do not forget it or modify the config file, otherwise you'll be not able to open your password manager anymore). PyPWD > Saves a DataFrame as an encrypted CVS and all passwords are encrypted too, with key and the master password. Login: PyPWD >...
    Downloads: 0 This Week
    Last Update:
    See Project
  • No-code automation to improve your process workflows Icon
    No-code automation to improve your process workflows

    Pipefy is a digital automation software that centralizes data and standardizes workflows for teams like Finance and HR

    Transform your financial and HR operations and improve efficiency even remotely with digital, customized workflows that your team can automate and integrate with other software without the need of IT development.
    Try For Free
  • 10
    Crypt

    Crypt

    Crypt encryption and decryption is based on ASCII Table Shift.

    Crypt is the developed based on the ASCII Table shift and it can customized based on the user requirements, right from the shifting order and the level of encryption or decryption. It can be integrated to any of the programming language with the custom build of the source code. It can secure from text file to binary code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    The MOTET Cipher & SE Scrambler

    The MOTET Cipher & SE Scrambler

    A tiny, fast encryption tool in C

    MOTET is a tiny, fast super-encipherment application written in C, featuring the new CSPRNG/stream ciphers MOTE and BEDBUG in each of their three variants, as well as the "gold standard" among ciphers, ISAAC. MOTET brings multiple levels of encryption, including a ciphertext-hash, a Vigenere mixing function, a choice of Caesar MOD or Caesar MIX ciphering on the primary key-stream, plus a deeply scrambled "outer shell" as a final super-encryption stage. A unique nonce IV guarantees that...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
    ISC - The ISAAC Stream Cipher

    ISC - The ISAAC Stream Cipher

    ISC lets you encrypt & decrypt text and files of any type up to 4GB

    ISAAC is a cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It was developed by Bob Jenkins from 1993-1996 and placed in the Public Domain. ISAAC is fast - especially when optimised - and portable to most architectures in nearly all programming and scripting languages. After more than 20 years of existence ISAAC has not been broken, and the little program you have here allows you to use it to encrypt and decrypt text of arbitrary length, files of any...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    Substitution Cipher Decryption

    Decrypt messages encrypted with a substitution cipher

    ... • Fast frequency analysis for single letters, bigrams, trigrams and quadgrams (more N -grams can be made available by adding a single line of code). • Showing the most common letters (bi-/trigrams) in the ciphertext compared to the most common letters (bi-/trigrams) in the British English language. • Easy assignment and change of the substitution letters. • Auto assignment of the 10 first letters.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Encrypting Safe
    This is free Java desktop application to keep your note in safe from others using the Encrypting Decrypting symmetric key algorithm, it's easy to transfer your note form source to another in confidential manner.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A formally verified implementation of cryptographic algorithms using the SPARK programming language. For the complete library proofs of the absence of run-time errors are available. Some of its subprograms include proofs of partial correctness.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Language: C++ using wxWidgets and STL. Platforms: Win98/ME/2000/XP, perhaps Linux. Description: Download Manager for FTP and HTTP. Features: Resuming, priority/exact ordering, threaded downloading, mirror searching and mass adding of downloads.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    ShredBitz
    ShredBitz is a free and simple file shredder tool that can wipe selected files from any hard disk drive. ShredBitz is written in the java programming language and uses a custom written algorithm for shredding. ShredBitz is a very powerful tool.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 18
    Originally made to crack /etc/passwd files from *nix utilizing the GPU. Uses GLSL and OpenGL. Acts as a parallel to John the Ripper, but for the GPU. Supports both ATI and nVidia, anywhere OpenGL can run.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    jHashCalc is a GPL implementation of the popular hashing utility "HashCalc" from SlavaSoft. jHashCalc is written in Java language, and uses the GNU Crypto API to perform the algorithms' computing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Erinaceus is an esoteric two dimensional programming language which uses bitmaps as sourcecode. It is turing complete and able to modify itself. It has been created with the goal to create a language that can be hidden in pictures easily.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    S/Key Generator. An RFC2289 compliant One-Time Password generator written in Java language and O.S. Thinlet package for GUI. It uses MD4 and MD5 hash algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Powerful 512bit pseudo random encryption, optimized for the x86-64 architecture. Coded in x86-64 assembly language, this has the potential to be one of the most powerful and fastest file encryption engines to date.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    xmlsig is a multi-language, multi-platform implementation of XML signatures.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    RC4.NET is a library that adds support for encrypting/decrypting using the symmetric RC4 algorithm in the .NET environment. The library is written in C# language, and performs equally well on both the Microsoft CLR and Mono platform.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    1. project name eXPimenttk (e-SecureOffice) 2.Language Java (req. - at least j2re) 3.target platform - Cross-platform software 4.problem we want to sole- Encryption, Decryption software, File eraser, Messenger, Mailer,Remailer,FireWall 5 target - user
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next