Open Source Windows Cryptography Software - Page 42

Cryptography Software for Windows

View 1532 business solutions
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 1
    Finds Text in Delphi *.Pas files e.g. : button1.caption:='Hello' Replaces Text with a function call button1.caption:=TXT(0) {##Hello##} Generates a function „TXT“ with a String List with all found Texts at the beginning of your source.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Textcryption

    Textcryption

    Tiny application which allows encrypting basic text.

    Application which allows encrypting text. It is encrypted using own libraries. I think it is a very strong way to encrypt, specially if the text has more than 1 KB. The application reads encrypted bytes from disk, and writes encyrpted bytes to disk, so it never is saved in the hard disk decrypted. JDK-17 compatibility. You will find more about it at this web site: https://www.frojasg1.com:8443/downloads_web/web/html/encriptadorDeTexto.html?origin=sourceforge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Al2 is a language, close to C++ and Java, designed for use in mathematics and science, but is procedural unlike Mathematica and Maple. Like C++, class operators can be defined. Like Java, there is no need for header files. Aled is an interface to AL2.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    The goal of this project is to develop a network protocol (Peer Instant Messenger Protocol, PIMP) that creates a distributed, peer-to-peer network for the transmission of instant messages, along with a graphical client that will allow users to access the
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    This application provides, for everyone, a cryptographic implementaion of the RSA, AES and RC4 algorithms. Steganography is also supported, providing a secure transfert solution. The goal is to make all people access to this nice cryptographic world :)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    This is a java based encryption program that can encrypt any file you point it to.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    An anonymizing peer-to-peer file storage network, similar to Freenet and Gnutella - only better, of course.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    The Hopefully Uncomprehensible Shell, HUSH, is a secure shell client and programming library written in and for Java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    The MOTET Cipher & SE Scrambler

    The MOTET Cipher & SE Scrambler

    A tiny, fast encryption tool in C

    MOTET is a tiny, fast super-encipherment application written in C, featuring the new CSPRNG/stream ciphers MOTE and BEDBUG in each of their three variants, as well as the "gold standard" among ciphers, ISAAC. MOTET brings multiple levels of encryption, including a ciphertext-hash, a Vigenere mixing function, a choice of Caesar MOD or Caesar MIX ciphering on the primary key-stream, plus a deeply scrambled "outer shell" as a final super-encryption stage. A unique nonce IV guarantees that each ciphertext will differ radically from every other, even on the same message and identical key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 10
    The NEO Project uses the NEO-c (Network Exchange Operation for Charity) platform to participate in various computing challenges and projects, and donates any winnings to the charities specified by its users.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    This project has a theory of time that allows a computer program to decrypt information of the past, future, or alternate time-lines using a binary counter. Currently we have developed the binary counter now we are working on a production release.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The Polybius Square Encipher/Decipher

    The Polybius Square Encipher/Decipher

    The Polybius Square Encipher/Decipher Square 5x5, Removed Letter: 'W'

    Python package that allow you to encipher a plaintext, decipher a ciphertext, using The Polybius Square cryptography.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The Sharemind framework

    The Sharemind framework

    secure multiparty computation done right

    Sharemind is a secure multiparty computation system that allows you to process data without seeing it. IMPORTANT: The version available on this page is a seriously outdated version that is kept available as an educational tool. More recent versions with more features and better quality are available from http://sharemind.cyber.ee/.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    The VerFier

    The VerFier

    Online Spot for Your digital Identity. Sign any kind of File and Share

    This is free File Signer and File Verfier. Your Files can be verified by anyone online. Your digital identity is stored on the server. No files ever get uploaded to servers. 1. Sign any File (always sign a copy of File to prevent damage). 2. Create your free online identity publically/privately 3. Verify the file which has been signed by us.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    The Watermarks is a java library for images and text watermarking fingerprinting and tamper-proofing. The supported carrier formats for a watermark are JPEG and PDF. The project also aim to build a test environment to evaluate robustness of implemented a
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This package is a modest implementation of a non-alphanumeric encryption algorithm in java. But I'm kinda looking forward to creating a whole gui app implementing most well-known encryption tools, "the paranoid secret-coder special brainkiller"!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Thoughts is an electronic journal/diary program based on the .NET framework (C#). It allows entries to be saved locally and/or remotely via web service or directly to a database. The entries can also be encrypted prior to saving.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Thumbnail steganography creates a thumbnail from a source image and stores data in it by altering it's color channels. To decipher the data, a new thumbnail is made from the original image and the differences between the pixels are calculated.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    With Tiger Envelopes you can stop snoops from reading your email. Same email client. No extra steps. One click to install on Windows and Linux. Configures Outlook, Thunderbird, and KMail. Supports GPG, PGP, Bouncy Castle encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    This software implements the time stamp service. (mainly implements the Hierarchical Time-stamp Protocol. This protocol is proposed in a published paper which can be found in this package.)The code can help you to construct your time-stamp server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    TimeStampClient
    RFC 3161 time-stamping .NET client library and application. Please visit project website - https://github.com/disig/TimeStampClient - for more information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Tiny Secure-Password-Generator - Creates 5 "secure" passwords to choose from. Those passwords won't be found in any wordlist! Easy to use, working version available on any plattform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    TinyCrypt is a simple secure program for encrypting files. The core encryption code is only 76 lines of C code, based on the well known ARC4-D(768) algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    TinyObfuscate

    TinyObfuscate

    A tool for strings obfuscation tool in c++ by Michael Haephrati

    When you need encrypt/obfuscate strings in your program so that they don't just show up with a strings or hex tool when your executable is examined, this tool can be useful. See Code Project article: https://www.codeproject.com/Articles/1210398/Small-String-Obfuscator by Michael Haephrati
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    openssl is well-known allover the world,but it is huge,complex.our target is develop a tinytls,it is small,simple,good understanding,and usually for embedded system.But it can support most openssl features.You can add some other features easily.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB