Open Source Windows Cryptography Software - Page 48

Cryptography Software for Windows

View 1532 business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    Flash/PHP adaptation of the XTEA encryption algorithm. Allows encryption/decryption of sensitive data using 128-bit key. May be used for network data (HTTP) or offline for implementations like secure CD-ROM projects.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    faas is a federated authentication and authority server
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    A Collaborative Attack on Complexity to Create a New Global Way of Life
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    file digest

    A command-line utility for calculating and verifying file checksums.

    Digest is a command-line utility which can be used to calculate and verify checksums of any files, similar to md5sum or RHash, but using modern hash algorithms. Supported algorithms: BLAKE, BLAKE2, Grøstl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, Skein, SM3, Streebog, Whirlpool. Usage: digest [-c] <algorithm> <filename(s)> For example, if you want to calculate the checksums using skein512/256 algorithm, use this command: digest skein512/256 * > checksums.skein To verify the checksums: digest -c skein512/256 checksums.skein You can get a full list of supported algorithms and test the performance of different algorithms on your PC using the command: digest test <iterations> <filename> This will calculate hash sum of <filename> multiple times (number of times is specified by <iterations>) and output the results with precise timings. Note: if you have a 64-bit operating system, use 64-bit binary of the utility, because it is significantly faster for large files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 5
    FPWDMAN is a password manager in C++ for both Linux and Windows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Galloper is a tool set to assist in pseudo anonymous analysis on data from multiple distrusting sources without the need for a trusted third party.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    nbbfgyy
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    gestorCertificats

    Gestor Certificats Digitals

    Gestor Certificats Digitals on es permet: - Veure les dades dels certificats. - Canviar la contrasenya dels certificats. - Canviar el tipus de certificat. Els certificats soportats són: - X509. - PKCS12.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A giFT (http://gift.sourceforge.net) plugin to connect to the MUTE (http://mute-net.sourceforge.net) network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 10
    Allows to transparently encrypt repository contents with AES 256. The main advantage is that no additional software needed to be installed in untrusted location. Files are automatically encrypted on the fly when doing git push from trusted location.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    gpkcs11 is an free implementation of the PKCS#11 Interface standard for cryptographics token. It includes one software-only token and will aid in writing support for hardware token. It also includes a test suite that will be extended to serve as a compreh
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Originally made to crack /etc/passwd files from *nix utilizing the GPU. Uses GLSL and OpenGL. Acts as a parallel to John the Ripper, but for the GPU. Supports both ATI and nVidia, anywhere OpenGL can run.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The gruft library is a fast implementation of several cryptographic functions in JavaScript: MD5, SHA-1, SHA-256, Tiger/192, AES-Rijndael.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Software repository of the hack://src project. Includes security related software for crypto, vulnerability/patch notification & management, and ultra low level system access for stealth forensics & intrusion detection or malware removal.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    hackercrypt
    keeps SMS, emails , social networking messages , notes and any other text safe from thieves , hackers and snoopers. Simply paste copied text from any application , or save it to a file for later us
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Command-line strong encryption tools including: triple cascaded encryptor, multiple hash calculator and multiple block cipher encryptor. Supports AES, Serpent, Twofish, SHA-512, RIPEMD-160, MD5 and other algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Set of tools and libs for managing structured data in a very flexible way: Imp./Exp. ASCII, XML, SQL, PS, Tex/LaTex, RTF GUI: X-Windows, MS-Windows Interface to C++, DBs, Perl, PHP, Java, TCP/IP LISP-like interpreter written in C++ using C-LIB
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Secrets is a complete, standalone, personal encryption solution that works much like PGP (Pretty Good Privacy). With Secrets you can encrypt information before emailing it to a friend or coworker, or before storing it on a removable disk. Secrets is buil
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    iCrypt is an easy to use gui program written in 100% pure python. It implements the Crypto and ezPyCrypto modules to provide secure RSA public key encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    iTelliHashCSV

    iTelliHashCSV

    Cryptographic Hashing Application for CSV Files

    iTelliHashCSV is a cryptographic “one-way” hashing application designed to securely protect sensitive or private information from disclosure. Proper use of this program allows organizations, businesses, and individuals (i.e., the data owners) to share complete/intact datasets containing sensitive data with others without actually disclosing the sensitive or private information. Additionally, if such datasets are subsequently modified or enhanced through value-added services or products provided by other organizations or individuals and then returned, the data owner retains the ability to “re-map” the hashed sensitive data values back to their original values.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Ikedectypt is a perl script to decrypt IKEv1 packets in libpcap formatted trace file. You can use Ethereal(http://www.ethereal.com) to analyze decrypted trace. Key information(first initialization vector, skeyid_e) is needed to be supplied by user.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Secure Java Instant Messenger. Supports asymmetric key encryption of messages. will support multiple protocols (Jabber initially) and multiple UIs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    inKey

    inKey - small & strong encryption utility (> 800 000 bit).

    inKey - small encryption utility with big encryption block (> 800 000 bit). This program can protect very sensitive data, such e-mail, which has size up to 100 kilobytes, but processing speed might be too small with the bigger size of source data. ProcessingTime(data) = O(data ^ 2); USE IT ONLY TO PROTECT SMALL FILES (~ 100 Kb or a bit bigger). You can use "PaperBack" to print your 100 Kb encrypted *.iK file to A4 paper and get strong encrypted digital letter. https://sourceforge.net/projects/paperback P.S. "inKey 6.0" encryption used in http://sourceforge.net/projects/absolutelysafechat/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    The goal of this project is to design and write comercial quality software and aplications with fully respect to free software (like in "free speach"). The software designed by us will target various fields: from scientific applications to multimedia an
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    innocence-java

    Replace text with POS equivalent text, in a reversible fashion.

    Program takes (currently) english text sentences, and replaces each word in a given sentence with another word having the same Part of Speach (POS) tag. This creates a new sentence containing none of the original words. This new sentence can then be transmitted to a remote user, and using the same software, "de-crypted" into yielding the original sentence. The software relies on having a known "seed" value for the random number generator, which is known only by the sender and receiver. It also relies on the sender and receiver having a shared (identical) vocabulary file. The project contains code to test input sentences for inclusion of words in the current vocabulary, and can create entries for new words as needed. The vocabulary has a "MD-5 hash" value to make sure that the share vocabulary file is identical for both sender and receiver. The software also contains a "bad-words" list of words that should never be generated in the text to be sent.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB