Open Source Perl Cryptography Software

Perl Cryptography Software

View 5700 business solutions

Browse free open source Perl Cryptography Software and projects below. Use the toggles on the left to filter open source Perl Cryptography Software by OS, license, language, programming language, and project status.

  • Run applications fast and securely in a fully managed environment Icon
    Run applications fast and securely in a fully managed environment

    Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.

    Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
    Try for free
  • Cloud-based help desk software with ServoDesk Icon
    Cloud-based help desk software with ServoDesk

    Full access to Enterprise features. No credit card required.

    What if You Could Automate 90% of Your Repetitive Tasks in Under 30 Days? At ServoDesk, we help businesses like yours automate operations with AI, allowing you to cut service times in half and increase productivity by 25% - without hiring more staff.
    Try ServoDesk for free
  • 1
    Simplebackup is a cross-platform backup program. It reads a configuration file then builds a compress backup set, finally places the compressed files into another location (a directory, a remote http,ftp,sftp server or even one or more email accounts).
    Downloads: 26 This Week
    Last Update:
    See Project
  • 2
    OpenCA

    OpenCA

    Open Source PKI solutions

    The OpenCA PKI Development Project is a collaborative effort to develop a robust, full-featured and Open Source out-of-the-box Certification Authority implementing the most used protocols with full-strength cryptography world-wide.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3
    The Entropy Gathering Daemon is a portable perl script which provides a source of randomness on systems that lack an in-kernel /dev/random. GnuPG, OpenSSH, and the OpenSSL toolkit can use EGD to seed their random number generators.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 4
    WEPCrack is a tool that cracks 802.11 WEP encryption keys using the latest discovered weakness of RC4 key scheduling.
    Downloads: 7 This Week
    Last Update:
    See Project
  • The All-In-One Google Workspace Management Tool for IT Admins Icon
    The All-In-One Google Workspace Management Tool for IT Admins

    Our advanced administration makes adding, deleting, suspending, and de-provisioning users simple and quick.

    gPanel by Promevo streamlines administration, security, and user management, giving organizations full control over their Google Workspace.
    Learn More
  • 5
    IKECrack is an IKE/IPSec crack tool designed to perform Pre-Shared-Key [password] analysis of RFC compliant aggressive mode authentication.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    Kojoney is an easy of use, secure, robust and powerfull Honeypot for the SSH Service written in Python. With the kojoney daemon are distributeds other tools such as kip2country (IP to Country) and kojreport, a tool to generate reports from the log fi
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7

    Rockhopper VPN software

    IPsec / IKEv2-based VPN software for Linux.

    Rockhopper is IPsec/IKEv2-based VPN software for Linux. This software is interoperable with Windows 7, Windows 8 and Windows 10 VPN clients and it provides a handy AJAX-based Web console to manage Secure Virtual Ethernet(LAN), Routing-based VPN, Remote Access VPN and servers protected by IPsec. No kernel modules are needed. The ESP protocol stack is also implemented in user space.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    __Alien Cipher

    __Alien Cipher

    A bespoke symmetric cipher.

    Released under 'Creative Commons v3' license Alien Cipher is an endeavour to build my own symmetric cipher. The primary aim is to simply learn the fundamentals and finer details of cryptography in general and build working examples of my ideas in code. The code is shared here for posterity (future folk) in the guise that it may help others also on the path to cryptography. This code demo uses a 256bit rolling hash table (8x8bytes) at its heart to mix together pre-defined parameters in a way that allows the cipher to produce encoded output that is locked to a key of arbitrary length without padding. Based upon some random data points the cipher produces encoded output that is non-deterministic in nature, the same key and message will never produce the same output each time it's run. The cipher attempts to render output that is resistant to several types of analysis although this has yet to be proven. Please note that I make no claims to this being safe. Cheers o7
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    Alist is a program that collects hardware and software information about systems and stores it in a database for users to browse and search via a Web interface. The program consists of three parts: a client portion that collects the information, a daemon
    Downloads: 0 This Week
    Last Update:
    See Project
  • Digital Signage Software and Kiosk Software | FrontFace Icon
    Digital Signage Software and Kiosk Software | FrontFace

    The Easy-to-Use, Flexible and Affordable Software Solution for Professional Digital Signage and Kiosk Applications!

    FrontFace can display any kind of media format, no matter whether you want to display text, pictures, photos, PDFs, videos, news ticker tapes or even entire Web pages (HTML5).
    Learn More
  • 10
    A library implementing the AES (American Encryption Standard) or Rijndael algorithms, intended to provide a neat packaged solution for other projects to use. Package includes C and Intel Pentium/MMX assembler versions of AES, along with an extensive
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    BoCrypto encrypts/decrypts files using one-time-pad keys. Mersenne Twist PRNG is utilized for the key stream. Features enc/dec benchmarking as well as 'duress' key generation. OTP encryption is the only unbreakable encryption, if implemented correctly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    This software is a set of tools that hides C source code in txt files. Also the software is able to restore the txt files to C source code again. This work is based on the tool c2txt2c by Leevi Martilla. Csteg needs a book file in txt format to hide C so
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Set of perl scripts to analyse and check expiration of user certificates in Microsoft Windows Certification Authority. Output is in HTML with list of expiration state of latest user certificates. Expirated are marked. List can be sent by e-mail.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    CommCA - A Community-driven Certificate Authority for distribution of free X.509 digital certificates for personal email and server use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Cryptix is an international volunteer effort to produce robust, open-source cryptographic software libraries. Cryptix products are free, both for commercial and non-commercial use and are being used by developers all over the world.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    DES Cracker is a small perl script that cracks DES encrypted passwords.Currently there is only a brute force implementation where phrases are generated. Later version will have a possibility to use word lists for cracking.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    In DeCrypto you will find a collection of scripts for helping decrypt messages. Eventully I am going to put these scripts together into a nice interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    EnigmaLike
    EnigmaLike is an Enigma-like encoding tool for text files that encodes word-by-word using a dictionary/code book/encryption reel set-up. EnigmaLike is written using PerlTk and has instructions in PDF format. For Linux.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    The FreePKI project aims to create practical, interoperable & free code and services for Certificate and Registration Authorities based on the X.509 standard, including nearly zero-cost ID verification through a PGP-like web of trust scoring system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    GNet Server - Network compression client/server software. Compresses data over slow networks to save on the cost of bandwidth. Server is developed for Unix and Windows platforms, The client will run on Windows based PCs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Use of Michael Rabin's Information Dispersal Algorithm to provide secure, dispersed storage in a networked environment. For full download, please get both Math-FastGF2 and Crypt-IDA releases under the files link. See project wiki for more information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    GnuPG::Interface is a Perl module interface to interacting with GnuPG. It implements a rich set of filehandle communications with GnuPG and includes a key object organization structure, with information gathered from GnuPG's with-colons option.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Juggernaut v1000 Beta v1.2

    Juggernaut v1000 Beta v1.2

    Juggernaut v1000 Anti-Cryptography

    Juggernaut v1000 can crack MD4, MD5, MD6, SHA1, SHA256, SHA384, SHA512, HMAC-MD5, HMAC-SHA1 and also all the Base-64 version of them in minutes... but the cracking process depends in your password wordlist/dictionary.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    This perl script merges two keepassx databases into one.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    LavaRnd is a random number generator that converts a digitized chaotic source (such as a lens capped web camera) into cryptographically strong random numbers. LavaRnd comes with both an APIs (currently C and Perl) as well as a number of demos.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next