Showing 242 open source projects for "using"

View related business solutions
  • Retool your internal operations Icon
    Retool your internal operations

    Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.

    Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
    Build an app in Retool
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • 1
    AESTextCrypt

    AESTextCrypt

    Encrypt and decrypt text using AES 256 bit encryption

    AESTextCrypt is an easy-to-use open source tool for text encryption and decryption. Primarily intended for use with email, use it wherever you need to protect text from prying eyes. The encrypted text can be copy/pasted into any text-handling application (e.g. email) instead of plain text. Convenience buttons are provided for clipboard operations. AESTextCrypt uses AES-256 bit encryption which is the strongest available encryption scheme. It also employs bcrypt, which implements...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    Digital signing using a Smart Card

    Java code that enables you to sign documents using a smart card.

    With this library, you'll be able to access a smart card and extract its information. If the smart card contains a key store, you can use it to create digital signatures. This library currently implements signing of PDF documents using the Belgian eID.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    Bigram Table Generator

    Bigram Table Generator

    A program to generate random reciprocal bigram tables

    A command-line program to encrypt/decrypt a message using a random reciprocal bigram table and write a bigram table to a text file. Executing the program without any command-line arguments starts bigram in message encryption/decryption mode. The program prompts for a password or passphrase and a message to encrypt/ decrypt. After the message is entered the ciphertext is displayed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    innocence-java

    Replace text with POS equivalent text, in a reversible fashion.

    Program takes (currently) english text sentences, and replaces each word in a given sentence with another word having the same Part of Speach (POS) tag. This creates a new sentence containing none of the original words. This new sentence can then be transmitted to a remote user, and using the same software, "de-crypted" into yielding the original sentence. The software relies on having a known "seed" value for the random number generator, which is known only by the sender and receiver. It also relies on the sender and receiver having a shared (identical) vocabulary file. The project contains code to test input sentences for inclusion of words in the current vocabulary, and can create entries for new words as needed. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5
    Azrar

    Azrar

    Encryption addressing long-term data secrecy

    ...To achieve long-term data secrecy, Azrar differs from other approaches in terms of not to rely on effective computational deficiencies. It combines a one-time pad with a stream cipher method using the strong cryptographic hash function (family) Skein. Azrar fulfills business requirements for secure data transfer and supports several operating systems natively. It does not use a runtime environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    QPass password manager
    QPass is easy to use, open source password manager application with built-in password generator. You can store in it's database such data as passwords and logins which will be encrypted using AES-256 with PBKDF2(number of iterations set by user). Each entry can include additional information about entry such as name, url adress and description.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 7
    PiShare

    PiShare

    RetroShare binaries compiled for Raspberry Pi

    compiled RetroShare binaries, and packaged for Raspberry Pi using Debian 7.0 Wheezy ARMHF known Raspbian If you want to compile it yourself, download the source-tarball, it is only ~7MB big, or pull the code repository with SubVersioN. compiling takes up to 2-3 hours. or install the .deb files with dpkg -i "retrosharefilename".deb if necessary make a "apt-get update && apt-get upgrade" to update your system for all how to start it in a detached screen session: screen -t retroshare -dmS RetroShare retroshare -display :0 If you run headless, i suggest to use X11VNC to control it remote. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    EnigmaGPG Community

    EnigmaGPG Community

    Sending encrypted data through internet web applications.

    Enigma GPG Community allows you to encrypt / sign text and attachments using plugins in browsers, to send encrypted information via any Internet application that can only be understood by the intended recipient ensuring the authenticity, privacy and confidentiality of messages between the sender and receiver . Note the utility that can achieve this project because it aims to meet the global need for privacy on the web.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    TACACS+ protocol client library and PAM module in C. This PAM module support authentication, authorization (account management) and accounting (session management)performed using TACACS+ protocol designed by Cisco.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Zendesk: The Complete Customer Service Solution Icon
    Zendesk: The Complete Customer Service Solution

    Discover AI-powered, award-winning customer service software trusted by 200k customers

    Equip your agents with powerful AI tools and workflows that boost efficiency and elevate customer experiences across every channel.
    Learn More
  • 10

    Simplest Text Encrypter

    A simple example of polyalphabetic cipher in Java.

    Cryptography fascinates everyone. A variety of encryption techniques and ciphers are used to code important data. A polyalphabetic cipher is one of the simplest cipher one can make. This is a Java program to implement polyalphabetic cipher. [How the cipher encodes?] Input Data: helloaf Key: love l - 12th letter in Alphabet o - 15th letter in Alphabet v - 22nd letter in Alphabet e - 5th letter in Alphabet Now: h(l) e(o) l(v) l(e) o(l) a(o) f(v) Further: h(+12)...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Vigenere Dictionary Attack

    Vigenere brute force / dictionary cracking tool

    This is a tool that uses a combination between a brute force and dictionary attack on a Vigenere cipher. At present, keys are generated using brute force (will soon try passwords generated from a dictionary first). Each key is then used to decode the encoded message input. The output is analysed and then put into a ranking table. Outputs will be ranked on a variety of factors (at present, only number of dictionary words in output are counted). For the future: Better key generation, trying combinations of dictionary words with numbers. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 12
    A pure java library to operate on OpenPGP cards directly using javax.smartcard apis with no need of external dlls/frameworks (such as pkcs11 or opensc-java). Includes sample OpenPGP card edit application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    EAESCrypt

    Extended AES Cryptography

    EAEScrypt is a utility that is designed to protect sensitive data using secure encryption. It uses the Advanced Encryption Standard (AES) as published by the Federal Information Processing Standards Publications (FIPS PUBS) and issued by the National Institute of Standards and Technology (NIST). The official version of AES allows only 128-bit, 192-bit or 256-bit keys, and EAESCrypt is fully compliant with FIPS-197 when using these values.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Cyberbit

    Cyberbit

    Visual Cryptography and Bit-Plane Complexity Segmentation in Python

    ...The vessel images can be 8-bit gray-level images or 24-bit deep true-color images. Anyone who can correctly spot the two vessels and knows the dimensions of the image containing the secret message will be able to decrypt the secret message using the Cyberbit application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    EncryptionTool

    EncryptionTool

    Multi purpose encryption tool.

    Can check password strength. Encrypt text files with SHA1 & MD5 hash algorithms using AES encryption system. Using a given buffer size for reading and writing and a procentage of the said buffer for encryption, memory and cpu usage optimization can be achieved.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    yeo

    command-line steganography application

    designed to hide messages in jpg and png images without the requirement for any plain-text files. uses aes256 on data, using an sha256 hash of the password as the encryption key. rotates the password by 1 character, and uses an sha256 hash of that for the random seed for the image pointer access. security and invisibility of data is currently being peer-reviewed (since ~2014). At this point it looks like no vulnerabilities have been identified yet.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    samizdat

    Kerberized Messaging Toolkit for Java

    Samizdat is a toolkit for Java for building Kerberos secured distributed, message-oriented applications. The toolkit contains base classes that simplifies the management of Kerberos login contexts as well as flexibly sign and seal messages between principals using the Java GSS API. The toolkit contains Transformation classes for Kerberizing JMS traffic as well as a super-lean HTTP based protocol stack that supports both Synchronous (RPC) and Asynchronous modalities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    GPG-Crypter
    GPG-Crypter is a graphical front-end to GnuPG(GPG) using the GTK3 toolkit and GPGME library. It has been developed to provide an easy access to GPG encryption and decryption. It supports encryption and decryption of text entered into the program's input fields. It also supports file encryption and decryption.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 19
    Certificate Helper
    Certificate-helper is a utility desktop application written in Java designed and created to assist (mainly developers) in creating and viewing keystores and digital certificates. This is done via a user interfaces implemented in Swing.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    OhCrypt Encryption Tool
    OhCrypt lets you easily encrypt and decrypt files using some of the most popular algorithms, like AES, Blowfish and Serpent. With OhCrypt, you can secure your data with a password-based encryption algorithm through a clean and simple interface. It demonstrates state of the art of cryptology techniques, such as password hashing and salt. Ohcrypt also features self-extractable and self-destructive encrypted files
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    textcrypter

    textcrypter

    textcrypter is an encryption tool using vigenere cipher algorithm

    Textcrypter is an encryption tool using vigenere cipher algorithm. Vigenere use the same key/password to encrypt and decrypt a file (symmetric key cryptosystem). Result of the encryption process is a ciphertext in hexa number.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    The Polybius Square Encipher/Decipher

    The Polybius Square Encipher/Decipher

    The Polybius Square Encipher/Decipher Square 5x5, Removed Letter: 'W'

    Python package that allow you to encipher a plaintext, decipher a ciphertext, using The Polybius Square cryptography.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Encryptron

    Encryptron

    An encryption software using C# 4.0

    First of all, let us understand the need for an encryption software. Just think of you sending a message of extreme confidentiality, someone else fetches it and goes through it. A breach in the security! We can’t allow that to happen. So, virtually every data send over a network is encrypted now-a-days. Let’s look at this now: Vdmbnld!`f`ho...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    My Text is Treasure
    It is a simple password manager for your PC and Smartphone. It works like a text editor and uses a strong cryptography algorithm to generate the end file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    MandelHash

    MandelHash

    MD5 hash used to position and color two overlaid Mandelbrot sets.

    I'm using an MD5 hash of a username and password field to generate some entropy which is used to generate color pallets and positions / scaling of two Mandelbrot sets. These two images are overlaid to create interesting pictures which represent the entered credentials. I'm interested in all things security, this is mostly just for fun, but could possibly be used to help users identify mistakes in their password entry prior to submission and enforce a tighter failed password lockout policy. ...
    Downloads: 0 This Week
    Last Update:
    See Project