Open Source Perl Cryptography Software

Perl Cryptography Software

View 5660 business solutions

Browse free open source Perl Cryptography Software and projects below. Use the toggles on the left to filter open source Perl Cryptography Software by OS, license, language, programming language, and project status.

  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    OpenCA

    OpenCA

    Open Source PKI solutions

    The OpenCA PKI Development Project is a collaborative effort to develop a robust, full-featured and Open Source out-of-the-box Certification Authority implementing the most used protocols with full-strength cryptography world-wide.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 2
    Simplebackup is a cross-platform backup program. It reads a configuration file then builds a compress backup set, finally places the compressed files into another location (a directory, a remote http,ftp,sftp server or even one or more email accounts).
    Downloads: 27 This Week
    Last Update:
    See Project
  • 3
    IKECrack is an IKE/IPSec crack tool designed to perform Pre-Shared-Key [password] analysis of RFC compliant aggressive mode authentication.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 4
    WEPCrack is a tool that cracks 802.11 WEP encryption keys using the latest discovered weakness of RC4 key scheduling.
    Downloads: 16 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    This tool will allow obfuscation of UNIX scripts listing an interpreter as the first line. It is most useful for distributing functionality in a commercial product or a high user volume environment where you wish to hide proprietary information.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6
    MD5-utils
    MD5-utils is a script for MD5 hash function manipulations. It can crypt one or more word(s) and try to crack one or more hash(es) using online servers.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    A library implementing the AES (American Encryption Standard) or Rijndael algorithms, intended to provide a neat packaged solution for other projects to use. Package includes C and Intel Pentium/MMX assembler versions of AES, along with an extensive
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8

    Rockhopper VPN software

    IPsec / IKEv2-based VPN software for Linux.

    Rockhopper is IPsec/IKEv2-based VPN software for Linux. This software is interoperable with Windows 7, Windows 8 and Windows 10 VPN clients and it provides a handy AJAX-based Web console to manage Secure Virtual Ethernet(LAN), Routing-based VPN, Remote Access VPN and servers protected by IPsec. No kernel modules are needed. The ESP protocol stack is also implemented in user space.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    Use of Michael Rabin's Information Dispersal Algorithm to provide secure, dispersed storage in a networked environment. For full download, please get both Math-FastGF2 and Crypt-IDA releases under the files link. See project wiki for more information.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 10
    Juggernaut v1000 Beta v1.2

    Juggernaut v1000 Beta v1.2

    Juggernaut v1000 Anti-Cryptography

    Juggernaut v1000 can crack MD4, MD5, MD6, SHA1, SHA256, SHA384, SHA512, HMAC-MD5, HMAC-SHA1 and also all the Base-64 version of them in minutes... but the cracking process depends in your password wordlist/dictionary.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Project Naranja will uses Padlock Security of VIA EPIA mini-ITX motherboards in order to provide a toolkit to set up and use encrypted filesystems with Linux. NOTE: Files are now hosted at Google Code: http://code.google.com/p/naranja/
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    Live Security/Forensics Linux Distribution, built from scratch and packed full of tools useful for vulnerability analysis, penetration tests, and forensic analysis.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    Alist is a program that collects hardware and software information about systems and stores it in a database for users to browse and search via a Web interface. The program consists of three parts: a client portion that collects the information, a daemon
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    BoCrypto encrypts/decrypts files using one-time-pad keys. Mersenne Twist PRNG is utilized for the key stream. Features enc/dec benchmarking as well as 'duress' key generation. OTP encryption is the only unbreakable encryption, if implemented correctly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    This software is a set of tools that hides C source code in txt files. Also the software is able to restore the txt files to C source code again. This work is based on the tool c2txt2c by Leevi Martilla. Csteg needs a book file in txt format to hide C so
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Set of perl scripts to analyse and check expiration of user certificates in Microsoft Windows Certification Authority. Output is in HTML with list of expiration state of latest user certificates. Expirated are marked. List can be sent by e-mail.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    CommCA - A Community-driven Certificate Authority for distribution of free X.509 digital certificates for personal email and server use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Cryptix is an international volunteer effort to produce robust, open-source cryptographic software libraries. Cryptix products are free, both for commercial and non-commercial use and are being used by developers all over the world.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    DES Cracker is a small perl script that cracks DES encrypted passwords.Currently there is only a brute force implementation where phrases are generated. Later version will have a possibility to use word lists for cracking.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    In DeCrypto you will find a collection of scripts for helping decrypt messages. Eventully I am going to put these scripts together into a nice interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    The Entropy Gathering Daemon is a portable perl script which provides a source of randomness on systems that lack an in-kernel /dev/random. GnuPG, OpenSSH, and the OpenSSL toolkit can use EGD to seed their random number generators.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    EnigmaLike
    EnigmaLike is an Enigma-like encoding tool for text files that encodes word-by-word using a dictionary/code book/encryption reel set-up. EnigmaLike is written using PerlTk and has instructions in PDF format. For Linux.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    The FreePKI project aims to create practical, interoperable & free code and services for Certificate and Registration Authorities based on the X.509 standard, including nearly zero-cost ID verification through a PGP-like web of trust scoring system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    GNet Server - Network compression client/server software. Compresses data over slow networks to save on the cost of bandwidth. Server is developed for Unix and Windows platforms, The client will run on Windows based PCs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    GnuPG::Interface is a Perl module interface to interacting with GnuPG. It implements a rich set of filehandle communications with GnuPG and includes a key object organization structure, with information gathered from GnuPG's with-colons option.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next