Open Source Windows Cryptography Software - Page 29

Cryptography Software for Windows

View 1532 business solutions
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 1
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Libmkeys is a C++ class library implementing the MIKEY(Multimedia Internet KEYing) protocol as described in RFC 3830.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    LightCrypto is C cryptography library. It contains Big Number Library, basic crypto algorithms (3DES, DSA, RSA, ECDSA, etc), Internet Voting Scheme, and many more. Current librarie's binary is less than 1MB and it can even be smaller by user config.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Lite Security Module LSM PKCS11

    Lite Security Module: a daemon to handle PKCS11 Secure Boxes

    Lite Security Module: a daemon to handle Secure Boxes (files containing cryptographic keys, X509 certificates and data objects), accessible through a PKCS#11 library, supporting non-certified (lite) Software or Hardware Security Modules (www.clizio.com)
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    Lizard Cart CMS offers an easy way for people with limited HTML experience to manage the content and products of their websites.It uses PHP/MySql/Java Script comes complete with a WYSIWYG online editor.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    LockPhix provides a solid base to build a full encryption suite. LockPhix consists of three tools: FileVault an en-/decryption tool, ScreenLock a way to lock your PC and PasswordSafe a tool to safely store passwords.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Looking to secure your files but don't want to pay for an expensive program? LockedFolder will take files that you add and encrypt them, thus requiring a password to restore them. Perfect for adding to a disk or CD and transporting them between people!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Logical Security is a suite of programs that enhance one's security. Currently, the following functions have been implemented: hashing,encryption,memory dumping,secure file deletion.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Blinded digital cash mint, walletware, tools, and open protocols.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 10
    Designed to use what is known about users via the /etc/passwd file on unix/linux systems to generate a dynamic dictionary or csv file of more accurate guesses as to what their possible password may be, to look for bad password protection practices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    MD5 Encryptor

    MD5 Encryptor

    MD5 Encryptor

    MD5 Encryptor
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The MD5Revolution is a small tool to calculate the MD5 checksum of entered strings. More features and additionally information about the tool, can be found under: http://md5r.x303.cc/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Java implementation of MIKEY (Multimedia Internet KEYing, RFC 3830).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    MLCrypt

    Simple, lightweight, standalone command-line single file encryption.

    Simple, lightweight, cross-platform (Windows / Linux / ARM6 Linux), cross-arch (x32 / x64), standalone command line file encryption program. GnuPG is probably the best application for cross-platform encryption. However, its usage on Windows PCs may be inconvenient (installation administrator rights; large executable size for perhaps just a one-time file decryption, complicated command-line switches for stronger encryption). NCrypt would fulfill this task, but does not operate on 64-bit Windows - MLCrypt was created because of this. The program's primary aim is cascade encryption: create an encrypted outer layer over an existing compressed and encrypted archive file. (Each encryption layer should have a different complex password.) MLCrypt.zip contains all the executables: Linux, Windows, Raspberry Pi.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    MOTE CSPRNG & Stream Cipher

    MOTE CSPRNG & Stream Cipher

    A family of small-state CSPRNGs and Stream Ciphers

    MOTE is a fast, small-state, cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. MOTE exhibits uniform distribution, mixes extremely rapidly, has no detected bias, and comes in three variants: MOTE8, with an internal state array of 8+4 32-bit words; MOTE16, with an internal state of 16+4 words; and MOTE32 with a 32+4-word state. The former permit seeding with a key of up to 256 or 512 bits, the latter with a 1024-bit key. Reduced to essentials, MOTE is only 5 lines of code: Ten arithmetic and bitwise operations in all. It's called MOTE because a PRNG can't be made much smaller (or faster) without introducing bias or severely reducing avalanche. MOTE alternates its shift and rotation constants unpredictably, and has passed the most stringent industry-standard tests for randomness and security, including NIST & DIEHARD.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    md5 hash bruteforce for MPI clusters with mpich2 architecture
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    MSCashe

    MSCashe

    Bruteforce domain cached passwords on CUDA.

    A application for bruteforce domain cached (MS Cashe) passwords on Windows. Work on CUDA.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    MSLK provides the precompiled Win32 binaries of some excellent porject with a GPL or similar open source license. Here will keep updated.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    MToken

    MToken

    MToken - Tokens processing system (Security)

    Tokens processing system (Security)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    MUSASH provides a utility to digest text, file and a byte char. It also able to compare two files, compare file, text and char to a hash. It also allows user to search for a string that evaluates to a hash given. Supported algo: MD5, SHA1 and SHA2 family
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    MandelHash

    MandelHash

    MD5 hash used to position and color two overlaid Mandelbrot sets.

    I'm using an MD5 hash of a username and password field to generate some entropy which is used to generate color pallets and positions / scaling of two Mandelbrot sets. These two images are overlaid to create interesting pictures which represent the entered credentials. I'm interested in all things security, this is mostly just for fun, but could possibly be used to help users identify mistakes in their password entry prior to submission and enforce a tighter failed password lockout policy. Please enjoy with a modern HTML5 enabled browser.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Maroniecoder

    Maroniecoder

    Encrypt a text through a list of encryption methods

    I came to the conclusion that this program is not worth the time for further development. Use different Encryption methods with parameters to en- or decrypted a text through the list With downloadable source-code since 1.3 You need to have Java installed http://www.oracle.com/technetwork/java/javase/downloads/index.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    The Martus (TM) Bulletin System is used by human rights and social justice groups to track violations. This Java program is as easy to use as email. Bulletins can be encrypted or searched, and can be backed up to a remote server. See www.martus.org.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    MathX

    MathX

    Fixed-length Arithmetic-types library

    MathX is a fixed-length arithmetic-types written in pure c++ templates. The goal is to provide signed-integer, unsigned-integer, IEEE-754 float-point and fixed-point types, all with specific number of bits. To this moment, only signed-integer and unsigned-integer are completed for little-endain architecture. Any compiler that support c++03 or c++11 can successfully compile MathX. Refer to README for more information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    The Mav.Crypt tool will be upgraded to many different encryption methods. At the Moment, the only method is ROT13, but we are developing some other technics and a new Algorithm. More Infos shortly at the Project Web Page.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB