Protect your company's email and browsing with your GoodCrypto private server.
* Protects email metadata and resists traffic analysis
* Automatic encryption, decryption, and key management
* All private keys stay on *your* server
* Users don't change their email or browser software
* Blocks web malware
* Runs on your private server
* Completely decentralized
this simple program implements the Vigenere cipher in python
For details of this cipher see;
http://en.wikipedia.org/wiki/Vigenere_cipher
This cipher can be broken by frequency analysis, this is a toy project, and should not be used in situations where security is important.
...To further correct this, I modified the padding when it's less than the block size.
I hold no guarantee of the security of this algorithm, USE AT YOUR OWN RISK. I have had no 3rd party analysis done on the algorithm to date, but research is welcome, and a challenge is even provided in CHALLENGE.txt.
Kojoney is an easy of use, secure, robust and powerfull Honeypot for the SSH Service written in Python. With the kojoney daemon are distributeds other tools such as kip2country (IP to Country) and kojreport, a tool to generate reports from the log fi
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
CryptoHawk can calculate hashes (md2,md4,md5,sha-1,sha-256 and hmac). It can also perform cryptanalysis like frequency analysis for substutition cipher and exhaustive key search for rotation cipher, as well as searching internet databases for md5 hashes.
Live Security/Forensics Linux Distribution, built from scratch and packed full of tools useful for vulnerability analysis, penetration tests, and forensic analysis.
The Secure Remote Log Monitor (SRLM) project provides client and server
utilities that collect application or system log files from multiple systems over an untrusted network onto a central server for analysis and action.