Open Source Windows Cryptography Software - Page 6

Cryptography Software for Windows

View 1532 business solutions
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 1
    Simple File Encryptor - for Windows

    Simple File Encryptor - for Windows

    Encrypt files and folders or create your own encrypted text files.

    Simple File Encryptor (SFE) is a small, easy to use file and folder encryption app for windows. SFE provides 256bit AES password protected secure encryption for files. - Encrypting/Decrypting Text - Create and export secure encrypted text files. - Encrypting/Decrypting files or folders - Select any file type or folder to encrypt. Opt to compress before encryption and also to remove the unencrypted file after. - New Encrypt Box - A permanent secure folder on your hard drive. Drag files in and they are instantly encrypted. SFE is a reliable and totally free (no ads or banners) file encryption solution for Windows. Check out these youtube demo's http://www.youtube.com/watch?v=pBr4e-E8pt0 http://www.youtube.com/watch?v=-W1oq-Ej3Zo&feature=youtu.be Check out the new FAQ page http://www.turnssoft.com/faq1.html Check out the feedback and reviews on the Turnssoft website: http://www.turnssoft.com/your-feedback1.html
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project
  • 2
    Stegcore

    Stegcore

    A cross-platform crypto-steganography toolkit

    Stegcore combines cryptography and steganography to hide encrypted data inside ordinary files. It encrypts your payload before embedding it, so the hidden content is unreadable even if someone extracts it, and invisible to anyone who doesn't know it's there. Unlike basic steganography tools that hide data without encrypting it, Stegcore ensures the payload is cryptographically protected at rest. Unlike pure encryption tools, the payload isn't even visible. Designed for journalists, security researchers, red teamers, digital forensics professionals, and CTF participants.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3
    sIRC is a Secure IRC Communications Program, using MD5 Checksums and RC4 Cipher encryption.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4
    User AES-128 bit encryption in counter mode of operation. supports interactive mode of operation and command line mode of operation.
    Downloads: 5 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 5

    The ASN.1 Compiler

    Go to github.com/vlm/asn1c for the latest version.

    This ASN.1 compiler turns ASN.1 specifications into C code. The asn1c is shipped together with conformant BER/DER/XER/PER codecs. The X.509, GSM TAP3, MEGACO, RRC and LDAP encoding and decoding examples are part of the source code distribution. NOTE: THE asn1c PROJECT HAS LARGELY MOVED TO GITHUB: http://github.com/vlm/asn1c
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    BWTC32Key

    BWTC32Key

    A file compressor with AES256CTR and Base32768 binary-to-text encoding

    BWTC32Key is a program I wrote that compresses data, then optionally encrypts it, and then outputs a Base32768 representation as the final output
    Downloads: 4 This Week
    Last Update:
    See Project
  • 7
    L2Acc is a packet sniffer for Lineage 2 (C4) game that uses WinPCap. It tracks the private shop prices and provides market evolution, scans the inventory and calculates its value, recipe budgets, allows recipe search and price estimation.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 8
    MD5-utils
    MD5-utils is a script for MD5 hash function manipulations. It can crypt one or more word(s) and try to crack one or more hash(es) using online servers.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 9
    Mailcrypt is an Emacs Lisp package which provides a simple interface to public key cryptography with PGP [and now GnuPG!]. Mailcrypt makes strong cryptography a fully integrated part of your normal mail and news handling environment
    Downloads: 4 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 10
    MyPGP

    MyPGP

    PGP graphical user interface

    MyPGP provides a graphical user interface for pgp encryption and signing. It is fully compatible with OpenPGP, and GnuPG. It relies on BouncyCastle libraries for the cryptographic primitives. It uses file system folders to store keys, either single or key rings, organized as a nested tree of folders. It can also create lists of keys for bulk operations.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 11
    Shellfish is a Windows Shell namespace extension that provides drag-n-drop cryptography for the desktop. Shellfish aims to provide robust security that's seamlessly integrated with the shell, while maintaining as small a footprint as possible.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 12
    This project is a C++ library which allows incorporating DKIM into an existing MTA or other application. It provides full support for signing, verifying, and SSP. It is compliant with RFC 4871.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13

    JCryptor

    JCryptor is an encrypting tool based on the Caesar-cipher.

    JCryptor uses the Caesar-cipher to encrypt keystrokes on-the-fly. It can also be used to decrypt an encrypted text easily. Caesar-cipher is a simple encryption algorithm, developed by Julius Caesar, to encrypt his correspondence with Cicero in the ancient world. Therefore it uses a simple character substitution method to replace a given character by another. A keyshift of thirteen is called ROT13. ROT13 can be decrypted by encrypting it again with ROT13. Even today this simple method is used by authorities to protect documents from unintentional reading. --UPDATE-- [25.01.14] Release 1.0 (final) -- Bugfixes [05.05.12] Release 0.2 -- implements polyalphabeticel substitution
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14

    OTP-Crypto-Tool

    Symetric file encryption based on OTP implemented as XOR encryption

    OTP (One Time Pad) In case you have any questions, contact me at: crypto-munition@gmx.de When used correctly, the OTP is an information-theoretically secure and demonstrably non-breakable encryption. The encryption process is implemented as symmetrical file encryption based on XOR encryption. The integrated pseudo-random generator serves only to illustrate and check the functionality. The use of this generator for REAL OTPs is not recommended. For REAL OTPs, hardware-based key generators (e.g. thermal noise of a pn junction, transistor or diode), white noise (e.g. out of tune radio) or other stochastic decay processes should be used. If used correctly, it cannot be decrypted by any intelligence service.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 15
    Command-line strong encryption tools including: triple cascaded encryptor, multiple hash calculator and multiple block cipher encryptor. Supports AES, Serpent, Twofish, SHA-512, RIPEMD-160, MD5 and other algorithms.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 16
    MD5 Hash Calculator for VB6 (Module). You can add the module to your project.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    Ank Zipper

    Ank Zipper

    A free and easy-to-use password protected file archiver

    Ank Zipper provides you with a lightweight, Java-based application designed to provide security to your documents. Ank Zipper can compress both files and folders and create password-protected archives, in order to prevent unauthorized access to important files. Additionally, it can be used for extracting or simply browsing ZIP files.It includes AES(Advanced Encryption Standard) algorithm to encrypt/decrypt file(s). Ank Zipper is a cross-platform software that can be used on any platform that features Java compatibility (e.g. Mac OS X, Linux, Windows).
    Downloads: 3 This Week
    Last Update:
    See Project
  • 18
    Libecc is an Elliptic Curve Cryptography C++ library for fixed size keys in order to achieve a maximum speed. The goal of this project is to become the first free Open Source library providing the means to generate safe elliptic curves.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 19
    Certificate create and sign tool

    Certificate create and sign tool

    Easy create and sign x509 certificates and generate RSA key pairs

    With this tool you can create and sign x509 certificates, certificate request, create self-signed certificates, RSA private and public keys with simple and intuitive GUI. This program is using OpenSSL.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 20
    CryptoDock

    CryptoDock

    CryptoDock is a tool that hosts various crypto. algorithms.

    CryptoDock is free multi-platform application written in Java that hosts various hash and modern cryptographic algorithms you can use to protect your sensitive data on your computer. Available cryptographic algorithms: 1. NLSE-1 2. One Time Pad 3. AES Available hashing algorithms: 1. MD5 2. SHA-1 3. SHA-256 4. SHA-512 IMPORTANT: In order to run CryptoDock you need to have Java installed on your computer. Java is free and can be downloaded from - http://www.java.com/
    Downloads: 3 This Week
    Last Update:
    See Project
  • 21
    PCA

    PCA

    binary encryption archiver

    Petoron Crypto Archiver (PCA) Key features: AES-256-CFB encryption with unique IV per archive Argon2id key derivation (256MB RAM / time_cost=3 / parallelism=4) HMAC-SHA512 integrity and anti-tampering check No compression, no fingerprinting, no trace of original data Works with both single files and entire directories Fully CLI-based, portable, and open format (.pca) https://github.com/01alekseev/PCA
    Downloads: 3 This Week
    Last Update:
    See Project
  • 22
    Pechkin

    Pechkin

    lightweight bitmessage client

    Pechkin.v0.3.2 Copyright 2017 Fenenko Aleksandr. Licensed Apache License, Version 2.0; This is lightweight bitmessage client writing in java. Supported platform: Android,Linux,Windows PS: If you liked this programm, buy the author a coffee https://www.buymeacoffee.com/fenenkoG
    Downloads: 3 This Week
    Last Update:
    See Project
  • 23
    PureBasic Shamir Secret Sharing

    PureBasic Shamir Secret Sharing

    Open-source PureBasic implementation of the Shamir Secret Sharing

    PureBasic Shamir Secret Sharing is an open-source, self-contained and educational implementation of the Shamir Secret Sharing Scheme, written entirely in PureBasic. Shamir Secret Sharing is a cryptographic method that splits a secret into multiple parts (shares), such that any combination of at least T shares can reconstruct the original secret, while any number of shares fewer than T reveals no usable information. This implementation operates over the finite field GF(257), allowing correct handling of all byte values (0–255) without loss, making it compatible with any type of string or binary-compatible data. Main Features Complete implementation of Shamir Secret Sharing Arithmetic over GF(257) Compatible with all character strings Robust Lagrange interpolation Safe modular inverse computation Shares encoded in hexadecimal (3 characters per byte) Clear, well-commented source code ⚠️ Disclaimer This project is intended for educational and demonstration
    Downloads: 3 This Week
    Last Update:
    See Project
  • 24
    SoftHSM for Windows

    SoftHSM for Windows

    SoftHSM installer for MS Windows

    Binary builds and MSI installers of SoftHSM for MS Windows platform. Please visit project website - https://github.com/disig/SoftHSM2-for-Windows - for more information.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 25
    TextCodec can encode texts using simple algorithm and then decode them by using statistical language data.
    Downloads: 3 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB