One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
Try Free
Build Securely on Azure with Proven Frameworks
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Java Crypt Framework (JCryptFX) is a java-based education project for de-/encrypting streams. It has a implementation of DES and TripleDES in it but the framework user can write own cryptography algorithms and stream types for it - includes a console app
AwesomeScripts Zolter is a program started by AwesomeScripts dedicated at providing security to developers on the net. Developers who want to obfuscate their codes can now do it free and instantly. Visit http://zolter.xavt.com/ for more information.
The SSTCP protocol permits to establish a simple TCP/IP connexion across multiple AES secured channel. Simple but (/so?) secured and strong cryptographic methods are used. OpenSSTCP is the LGPL implementation of the SSTCP protocol.
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
whbEncrypter is a very simple variable encryption program to encrypt and decrypt a file based on a passkey provided based on the user. It uses a simple encryption algorithm that I wrote for a school project. The passkey can also be the contents of a file.
This is a collection of vb class modules written in native Visual Basic. They provide the following functionality: Processing of very large integer numbers, hashing algorithms, prime number handling and an implementation of the RSA algorithm.
Hasher is a .NET class library to help programmers implement standard hashing and checksum algorithms into their own software. Written entirely in C#, Hasher providers a uniform interface to easily use any of the algorithms contained within this library
PRE4J (Partial RDF Encryption API for Jena) is a lightweight API for encrypting selected RDF graph elements. PRE4J provides cryptographic extensions to the Jena Semantic Web Framework.
CryptoHawk can calculate hashes (md2,md4,md5,sha-1,sha-256 and hmac). It can also perform cryptanalysis like frequency analysis for substutition cipher and exhaustive key search for rotation cipher, as well as searching internet databases for md5 hashes.
Secure File Transfer for Windows with Cerberus by Redwood
Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.
Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
Password manager with no master password. This program is yet another password manager, but with a twist: it uses Windows' DPAPI to encrypt your passwords and thus avoids requiring yet another (master) password.
Tiny Secure-Password-Generator - Creates 5 "secure" passwords to choose from. Those passwords won't be found in any wordlist! Easy to use, working version available on any plattform.
This application provides, for everyone, a cryptographic implementaion of the RSA, AES and RC4 algorithms. Steganography is also supported, providing a secure transfert solution. The goal is to make all people access to this nice cryptographic world :)
Cryptographically secure your files with asymmetric and symmetric keys, as well as password based encryptions and file/text checksums. Use upto 6 different keys to encrypt/decrypt and get checksums using MD2, MD5, SHA1, CRC32, etc..
"mASN1" - mini ASN.1 framework is a light ASN.1 framework written in C# for .NET
framework. It can be used for creating classes that model ASN.1 types and
are capable of encoding/decoding themselves to BER/DER codes. PER support is planned.
Quickly encrypt and decrypt your files with Petri. View encrypted text and image files containing your passwords or other sensitive information. Petri is written in Java and therefore runs on any operating system supporting the Java Runtime Environment.
Logical Security is a suite of programs that enhance one's security. Currently, the following functions have been implemented: hashing,encryption,memory dumping,secure file deletion.
SecretBox is an open-source, high-safety password manager for Windows/Linux/J2ME devices. You can build the passwords list conveniently in PC side, encrypt it by a master password, and upload to your mobile phone.
Ascii based Encryption/Decrypt Software. Allows you to Encrypt/Decrypt Ascii and Ascii based files. Passwords can be of any length. Simple and easy User Interface. Allows other VB6 developers to encrypt in thier programs. (v2 only)
BoCrypto encrypts/decrypts files using one-time-pad keys. Mersenne Twist PRNG is utilized for the key stream. Features enc/dec benchmarking as well as 'duress' key generation. OTP encryption is the only unbreakable encryption, if implemented correctly.
Java Based Cryptographic P2P Messaging Client, is based on a client-server architecture. The Client is made in SWING. The server is text based. Server keeps tabs on presense and the users public keys. Presentation: http://varun.accosted.net/talks.php
KINEC Is Not Encrypted Chat is a client/server chat program designed to keep you secure. It uses strong algorithms for encryption and authentication and will not compromise security.
Ikedectypt is a perl script to decrypt IKEv1 packets in libpcap formatted trace file.
You can use Ethereal(http://www.ethereal.com) to analyze decrypted trace.
Key information(first initialization vector, skeyid_e) is needed to be supplied by user.
Generate and retrieve passwords for different websites that you may register. Web based (php) for easy retrieval. Customizable with favorite user id, password length and key! Simple and safe password retriever out there! Please CHECK the Project Website.