With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Gen AI apps are built with MongoDB Atlas
Build gen AI apps with an all-in-one modern database: MongoDB Atlas
MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
Rcrypto is the encryption and decryption software for windows XP,vista and 7 to keep your data secure from unauthorized users. It uses the highly secure algorithm to encrypt every byte of the file.
Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.
Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
Cumulus4j is an encryption plug-in for DataNucleus. Applications can thus use JDO or JPA to persist their data into every common database. Using the Bouncy Castle cryptography libs, it provides strong encryption via AES, TwoFish or other algorithms.
My first attempt at a one-way hashing class/algoritm, built as a python class. It produces variable length hash from a message block of the size you want. The resulting hash will be ~2x the message block in size, and should provide for at least as many bits of security as the block itself.
I updated this, with a different hash than original, since I found a potential collision on some blocks, not but specific to that challenge. To further correct this, I modified the padding when it's...
Program can hash data from keyboard, file or CD/DVD by Adler32, CRC32, CRC64, GOST, HAVAL, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, TIGER or Whirlpool algorithm.
ENIGMA 2000 is a reliable file encrypter for DOS shell
ENIGMA 2000 is a symmetric cryptographic algorithm developed in C++ for Windows, to encrypt any file.
It is not optimized for speed processing but it is extremly reliable. Tests state that a huge input file just with zeros, will return an output file whose frequency analysis is white noise.
It uses six phases to encrypt any file and the phases sequence depends on the password.
On phase 5, it uses the Rubik's cube paradigm to encrypt the data.
It's extremly reliable and the...
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
mcrypt, and the accompanying libmcrypt, are intended to be replacements for the old Unix crypt, except that they are under the GPL and support an ever-wider range of algorithms and modes.
HTTPBrute is used to calculate HTTP Digest Access Authentication as per RFC 2617. The tool will be able to perform brute force attacks to retrieve a lost password for a given Authentication response. MD5 is the only hashing algorithm implemented.
TinyCrypt is a simple secure program for encrypting files. The core encryption code is only 76 lines of C code, based on the well known ARC4-D(768) algorithm.
A program that encrypts multiple files. It uses new encryption algorithms, such as a Three-Block Feistel chiper, ArchFurry's algorithm and a new hash function. Licensed under the ISC.
CryptAPI is a C# library that contains unimplemented algorithms in the .NET framework (NT, NTLM, BlowFish, DES and MD5) linking and emulating the crypt() unix function re-programmed in C#. The main purpose is to provide backward compatiblity.
XTEA (eXtended Tiny Encryption Algorithm) support for db4o open source object database. XTEA is a block cipher that operates on a 64-bit block size with a 128-bit key. An extremely tiny but very fast encryption algorithm (with cycles less than 32 rounds)
This is free Java desktop application to keep your note in safe from others using the Encrypting Decrypting symmetric key algorithm, it's easy to transfer your note form source to another in confidential manner.
A small encryption / decryption application that we are giving away free of charge.
Version 1.0.00 - RSA only at the moment.
But later versions will have a plug-in system for adding more algorithms.
A formally verified implementation of cryptographic algorithms using the SPARK programming language. For the complete library proofs of the absence of run-time errors are available. Some of its subprograms include proofs of partial correctness.
JCrypTool moved to GitHub! See https://groups.google.com/d/topic/jcryptool-developers/nauEXL6vsbk/discussion for more information and visit our new project home at https://github.com/jcryptool
ShredBitz is a free and simple file shredder tool that can wipe selected files from any hard disk drive. ShredBitz is written in the java programming language and uses a custom written algorithm for shredding.
ShredBitz is a very powerful tool.
A Javascript implementation of the Blowfish Encryption Algorithm described by Bruce Shneier circa 1993. Blowfish is a keyed, symmetric block cipher common in cipher suites and was placed, by Mr. Shneier, in the public domain.