Showing 19 open source projects for "jd-core"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    aws-encryption-sdk

    aws-encryption-sdk

    AWS Encryption SDK

    ...Then you encrypt and decrypt your data using straightforward methods provided by the AWS Encryption SDK. The AWS Encryption SDK does the rest. Without the AWS Encryption SDK, you might spend more effort on building an encryption solution than on the core functionality of your application.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 2
    kcptun

    kcptun

    A stable and secure tunnel based on KCP with N:M multiplexing and FEC

    ...Available for ARM, MIPS, 386 and AMD64. kcptun is shipped with builtin packet encryption powered by various block encryption algorithms and works in Cipher Feedback Mode, for each packet to be sent, the encryption process will start from encrypting a nonce from the system entropy, so encryption to same plaintexts never leads to a same ciphertexts thereafter. kcptun made use of ReedSolomon-Codes to recover lost packets, which requires massive amount of computation, a low-end ARM device cannot satisfy kcptun well. To unleash the full potential of kcptun, a multi-core x86 homeserver CPU like AMD Opteron is recommended. If you insist on running under some ARM routers, you'd better turn off FEC and use salsa20 as the encryption method.
    Downloads: 37 This Week
    Last Update:
    See Project
  • 3
    AWS Encryption SDK for Java
    ...Then you encrypt and decrypt your data using straightforward methods provided by the AWS Encryption SDK. The AWS Encryption SDK does the rest. Without the AWS Encryption SDK, you might spend more effort on building an encryption solution than on the core functionality of your application. By default, the AWS Encryption SDK generates a unique data key for each data object that it encrypts.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 4
    Qtum

    Qtum

    Qtum Core Wallet

    Qtum is a decentralized blockchain project built on Bitcoin's UTXO model, with support for Ethereum Virtual Machine-based smart contracts, and secured by a proof of stake consensus model. It achieves this through the revolutionary Account Abstraction Layer which allows the EVM to communicate with Qtum's Bitcoin-like UTXO blockchain. Welcome to the Qtum Ignition Main Network. This is the main network where the tokens hold value and should be guarded very carefully. If you are testing the...
    Downloads: 3 This Week
    Last Update:
    See Project
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • 5
    Aviator Predictor

    Aviator Predictor

    Aviator hack: seed-inspection of aviator crash predictor & aviator app

    Our downloadable SHA256 analysis tool powers the Aviator predictor, Aviator predictor app, and aviator crash predictor. Available for desktop, it’s designed for research, fairness verification, and safe demo testing Demo-focused aviator predictor tools — seed-inspection helpers (SHA-512 / SHA-256), AI-assisted summaries, and demo bot templates for aviator crash predictor, Start in demo mode to test safely. Disclaimer: Provided for analytical and testing purposes only. No predictive...
    Leader badge
    Downloads: 870 This Week
    Last Update:
    See Project
  • 6
    bitResurrector

    bitResurrector

    Bitcoin private key recovery tool with Bloom Filter & CUDA

    ...The engine exploits specific entropy vulnerabilities (CVE-2013-7372) and uses a 9-echelon statistical filter to segregate mathematical "corpses" from potentially valid keys. Technological Stack: - Zero-Latency Bloom Filter: Real-time matching against 58M+ active addresses (Loyce Club data). - Turbo Core: C++/AVX-512 optimization with processor affinity. - GPU Mode: Massive parallel computation via NVIDIA CUDA. - Memory Management: Zero disk I/O lag using mmap (Memory-Mapped Files). BitResurrector is a closed-source, proprietary tool for researchers and professionals.
    Leader badge
    Downloads: 22 This Week
    Last Update:
    See Project
  • 7
    PetoronHash2

    PetoronHash2

    PH2 Permutation-based cryptographic post-quantum hash library with duplex construction (C++20)

    PetoronHash2 (PH2) is a standalone ARX-based sponge construction that combines: A 4096-bit internal permutation core A sponge/duplex architecture with explicit capacity separation An extendable-output function (XOF) Memory-hard (HARD) and burn (BURN) modes A structured tagged absorb scheme A parameterized architecture suitable for hashing, KDF, and stress-oriented derivation PH2 is designed as a wide-state cryptographic primitive with explicit domain separation and configurable output length. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    1654 — encryption system

    1654 — encryption system

    1024-bit encryption system (functional safe or disk) | С++20

    ...Key Characteristics Vault-oriented model Encrypted data is treated as a sealed container-safe with explicit operations, not as a password-wrapped file. Dependency-free design The entire cryptographic surface is auditable in-tree. PetoronHash as the cryptographic core All key material derivation, diffusion, and internal transformations are driven by PetoronHash 1024-bit wide internal state The architecture uses a wide internal state to increase diffusion depth and structural safety margins. https://github.com/01alekseev/1654 Petoron | Ivan Alekseev | MIT license
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Mkpass

    Mkpass

    Mkpass - Command line Secure Password Generator

    ...And while most password managers include a generator, there are times I need one outside of that. The code is written in java so it should run on any OS that supports it. Lastly, the idea and core code came from a Wikipedia article. I just took this and expanded upon it. https://en.wikipedia.org/wiki/Random_password_generator This is a single executable JAR file. While you will need Java installed, there is no need to install this program. Just download the JAR file, please it somewhere convenient, and execute it from the command line: java -jar mkpass.jar See home page for additional details and usage instructions. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    Ciphey

    Ciphey

    Decrypt encryptions without knowing the key or cipher

    Fully automated decryption/decoding/cracking tool using natural language processing & artificial intelligence, along with some common sense. You don't know, you just know it's possibly encrypted. Ciphey will figure it out for you. Ciphey can solve most things in 3 seconds or less. Ciphey aims to be a tool to automate a lot of decryptions & decodings such as multiple base encodings, classical ciphers, hashes or more advanced cryptography. If you don't know much about cryptography, or you want...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 11
    Bias :: Versatile Information Manager
    Bias is a cross-platform versatile information management application / Organizer
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    QR-CERT. Free PKI Certificate Authority

    QR-CERT. Free PKI Certificate Authority

    PKI & Card Management System to issue and manage tokens & certificates

    The QR-CERT software is a specialized package of applications dedicated for the development of a Public Key Infrastructure system as well as the cards personalization and management system. The software contains a number of functional modules, enabling a flexible selection of functionalities for implementation. The software is dedicated for large organizations and corporate environments, with a PKI infrastructure and microprocessor cards. The QR-CERT is a solution both for the companies...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Eristic Cryptographic Toolkit

    Eristic Cryptographic Toolkit

    Open source 8 bit random number generator

    The Eristic Cryptographic Toolkit based on the CRC (Chaotic Random Core).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Crypto

    A powerful data encrypting tool.Encrypt data inside files.

    Crypto encrypts data inside any file.Not only the data is encrypted but also hidden.You can choose any type of file and hide your valuable data inside it.But the host file's size does not increase.So none can notice that you have Gigabytes of secret data inside a tiny 10kb text file.Try it now.Totally free.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    ActiveLock is an open-source copy protection, software licensing framework for all development enviroments supporting COM+ architecture. Core DLL available in VB2008 and VB6. Samples in C++, C#, Excel/Access VBA and keygens in PHP, ASP.NET available.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16

    tickets

    pythonic kerberosish ticket system: easy to use, easy to subclass

    ...Values 'data' and 'entropy' may consist of arbitrary objects which are transparently pickled(serialized), optionally gzipped and of course securely signed. Specific implementations are included: FormTicket: provides core implementation of state-less Cross Site Request Forgery protection. Other use cases include ticketing object param values pointing at URL:s or services in HTML-objects such as Flash or Java Applets. This adds server-side choises to be made while preventing users from using arbitrary values. Severe testing is done and will be mandatory for core and every specific implementation. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    TinyCrypt is a simple secure program for encrypting files. The core encryption code is only 76 lines of C code, based on the well known ARC4-D(768) algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    This is a simpe Implementation of an The 128-bit AES Encryption Algorithm core in 16-Bit ASM
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    BlowfishVHDL - free fully synthesizable Blowfish encryption algorithm hardware implementation.
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB