Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
This command line tool can be used to encrypt and decrypt files and directories using the AWS Encryption SDK. If you have not already installed cryptography, you might need to install additional prerequisites as detailed in the cryptography installation guide for your operating system. Installation using a python virtual environment is recommended to avoid conflicts between system packages and user-installed packages. For the most part, the behavior of aws-encryption-cli in handling files...
Petoron Local Destroyer (PLD)
Features:
10-pass default cryptographic overwrite (customizable)
Argon2id + AES-CFB entropy stream per session
No logs, no caching, no backups
Full CLI control (purge, wipe)
Clean TRASH/workflow
If you want your files to truly disappear — not just be deleted - PLD is the tool.
https://github.com/01alekseev/PLD
Petoron Crypto Archiver (PCA)
Key features:
AES-256-CFB encryption with unique IV per archive
Argon2id key derivation (256MB RAM / time_cost=3 / parallelism=4)
HMAC-SHA512 integrity and anti-tampering check
No compression, no fingerprinting, no trace of original data
Works with both single files and entire directories
Fully CLI-based, portable, and open format (.pca)
https://github.com/01alekseev/PCA
Simple python program to encrypt up to 255 character text into .png or .bmp images. VIEW the README for further instructions as well as image specifications.
Used pyinstaller to compile into an .exe
---Feedback is welcome ---
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Encryption with symmetric-key algorithm Kirmah
- generate keys with exotic chars
- redefine key length
- key mark to ensure decryption capabilities
- mix data
- fast with multiprocessing
- possible compression
- gui on gtk3
- cli tool
- python3
DEPENDENCIES :
========
python3, python-gobject, gobject-introspection, pygtk
3 modes are available to encrypt :
========
- compression (full / disabled or only final step)
- random...