Showing 1171 open source projects for "source"

View related business solutions
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 1
    Minarke Is Not A Real Kriegsmarine Enigma But it will allow you to communicate with one. Command line enigma machine emulator. Full M4 compatability, can be used to decode WWII U-boat messages, or send your own.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Use prime numbers and pseudorandom number generators to create pseudorandom permutations to "shuffle" bits of given data (passwords, logins, PINs, files, directories). It is designed to be very secure (I hope so).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    A self contained cross platform utility for encrypting (and decrypting) files using AES 256 (and SHA 256) for secure transportation or privacy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    jCryptPad stores text informationen hierarchical, e.g. passwords, important texts etc. The data is saved in a encrypted xml file. Encryption is done with the AES algorithm. Additionally a password generator and a text encryption editor is also included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Auth0 B2B Essentials: SSO, MFA, and RBAC Built In Icon
    Auth0 B2B Essentials: SSO, MFA, and RBAC Built In

    Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.

    Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
    Sign Up Free
  • 5
    Al2 is a language, close to C++ and Java, designed for use in mathematics and science, but is procedural unlike Mathematica and Maple. Like C++, class operators can be defined. Like Java, there is no need for header files. Aled is an interface to AL2.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Cypher is an encryption program that uses the AES (Rijndael) algorithm to encrypt and decrypt files. You can use Cypher to protect sensitive data from unwanted access.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    Thumbnail steganography creates a thumbnail from a source image and stores data in it by altering it's color channels. To decipher the data, a new thumbnail is made from the original image and the differences between the pixels are calculated.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Erinaceus is an esoteric two dimensional programming language which uses bitmaps as sourcecode. It is turing complete and able to modify itself. It has been created with the goal to create a language that can be hidden in pictures easily.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    OpenPGP Keyserver written in ASP.NET (C#) This keyserver is not designed to synchronise with other servers. Suitable for deployment within a windows based organisation where sharing keys with internet keyservers is not required/desirable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 10
    You need to remember only one master password. OpenSimSim will generate strong passwords for each one of your accounts. No more using the same password everywhere or using bulky password managers. Your passwords are just a few quick key-strokes away.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    A simple java library (1.5.* and higher versions) in order to crypt (or decrypt) a file using a password. The library accepts the following parameters: an input file, the operation to perform, and the user password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    XMLStore is a new project that cares about XML-based Databases Access with users Authentication and Authorization and more such as dead-lock accesses. It will be soon introduced to other kind of databases such as SQL,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Generate RSA key pairs of arbitrary length; convert text between formats or use keys to transform/crypt text. Supports decimal, hexadecimal, base64 and text input and output. Entirely ANSI C++; no external dependencies.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A JNI wrapper for the Microsoft Data Protection API
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    BlowfishVHDL - free fully synthesizable Blowfish encryption algorithm hardware implementation.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    A simple checksum verifier
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    A package of Rijndael, Twofish and Serpent encryption algorithms implemented in x86 assembly. Meant to learn basics of assembly, learn about the algorithms or to be used in a C program.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    KeyStone is an editor program for Java keystore files, licensed under the GPL. KeyStone may help make your life easier if you're working with symmetric cryptography in Java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Webswell Connect is a business integration tool based on WS web services, ebXML and AS2 standards. Installer includes ebXML Registry/Repository, universal Message Service Handler and Dispatcher and supporting software. Tech support at www.webswell.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    This project can be used to manage plugins in JAVA applications the framework provides checking of electronic signatures as well as hooks for user interaction (for example when certs are found that are not issued from a trusted authority
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Suite of services and tools for handling PKI requirements. The initial list of programs contains: 1) a viewer/encoding converter for X.509 certificates, 2) a viewer/editor/generator for PKCS#7 and 3) a viewer/editor/generator for various keystores types.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    This project provides a simple Java-based steganography tool that can hide a message inside a 24-bit colour image so that knowing how it was embedded, or performing statistical analysis, does not make it any easier to find the concealed information.
    Leader badge
    Downloads: 25 This Week
    Last Update:
    See Project
  • 23
    BruteNet is a system of the distributed brute force and distributed calculations built on user extensions capable to solve a great number of problems related to the partition on a lot of machines.With sample extention you can distribute brute md5-hash
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    A Win32 API based graphical desktop sharing system, it support LZMA compress, MD5 password check, 64bits file transfer, 8bits instruction fast protocol and windows's pack intelligence for reduce useless transfer band.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    A tool to hide a file into a image with no affects the size. It uses a steganography techinique that change the least significant bit in the RGB color systems of non compressed images to store the bits of the file to hide.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB