Showing 27 open source projects for "ref-n-write"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 1
    PureBasic Shamir Secret Sharing

    PureBasic Shamir Secret Sharing

    Open-source PureBasic implementation of the Shamir Secret Sharing

    PureBasic Shamir Secret Sharing is an open-source, self-contained and educational implementation of the Shamir Secret Sharing Scheme, written entirely in PureBasic. Shamir Secret Sharing is a cryptographic method that splits a secret into multiple parts (shares), such that any combination of at least T shares can reconstruct the original secret, while any number of shares fewer than T reveals no usable information. This implementation operates over the finite field GF(257), allowing...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2

    ProxyCrypt

    Encrypted volumes through command line

    ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Encryption and decryption are made on the fly, allowing you to use encrypted volumes like normal ones. Designed for paranoids and advanced users, it is also fast, very lightweight, open source and easy to recompile. See the features below. It works as a "proxy" for the AIM driver or the ImDisk driver. AIM driver is included in the full package. See the documentation for more informations...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3

    CKK Encryption

    Fast and unbreakable encryption

    ...We then take those values and combine with individual 8bit ASCII values of the password/pass phrase. We loop thru the file combining 1 byte with 1 byte from "password phrase" in a continuous loop. We then write all odd results then even results to a file, array or string "your choice". I'm not a mathematician "not even sure what they are" but I think the results equal n exp 256 + n exp 256 + n exp 256 * n exp 2,147,483,647. Again, not a mathematician. This project was written using VS 2019 Community Edition. C# .NET Framework 4.7.2 I have included a sample program or change the source to fit your needs. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Simple Cipher Algorithm

    Simple Cipher Algorithm

    Java Encryption Utility.

    Very simple to use symmetric Java encryption utility. Please write a review. Email me with any questions or problems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 5
    Advanced Onion Router
    Advanced Onion Router is a portable client for the OR network and is intended to be an improved alternative for Tor+Vidalia+Privoxy bundle for Windows users. Some of the improvements include UNICODE paths, support for HTTP and HTTPS proxy protocols on the same Socks4/Socks5 port with HTTP header filtering that generates fake identity-dependent headers every time the identity is changed (proxy chains are also supported), support for NTLM proxies, a User Interface that makes Tor's options and...
    Leader badge
    Downloads: 160 This Week
    Last Update:
    See Project
  • 6
    .../CryptolinN.sh -------- Console: java -jar CryptolinN.exe --help N = version number
    Downloads: 5 This Week
    Last Update:
    See Project
  • 7

    Simple Site Protection

    Secure login system for php frameworks, applications ansd sites

    This project has moved to https://github.com/julesbl/ssp and is now PHP7 complient and works in composer. The objective of these routines is to supply a secure login system to be wrapped round php applications and websites so that developers do not need to write their own. These libraries have been hardened against most web type attacks. Now has internationalisation and multiple languages.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    NCrypted

    NCrypted - simple file encryption software with GPU support

    NCrypted is a simple file encryption software. It is implemented on top of AES 128-bit algorithm. This software was designed to be as simple as possible, so you won't find any fancy, flashy gui elements or complicated advanced options. You can also use it directly from command line. NCrypted can automatically detect and take advantage of your NVidia graphics card to speed up the file processing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Simple Cipher Decoder

    Simple Cipher Decoder

    Decrypts and encrypts substitution, transposition and vigenere ciphers

    Change log 1.01: 1)Error fixed on clicking solve and arrow buttons in the vigenere decoder 2)Error fixed when number of columns exceeds text length in substiution cipher 3)Can now handle variable block length when changing columns 4)Multiple identicle conversion values onn the frequency analysis page now not allowed This project is near its final stages but there may still be improvements to be made. If you could write some form of review or send me an email with advice I would greatly appreciate it. This is a series of three simple programs that will allow you to easily encrypt and decrypt text using any combination of substitutions, transpositions, vigenere ciphers or caesar shifts. The programs will not completely solve the ciphers for you haowever they will make it very clear to see how to solve them and ensure that there is no need for tedious manual work.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10
    Wordpie Python Based Brute Force

    Wordpie Python Based Brute Force

    Python Based Brute Force Password Cracking Assistant By Clownsec

    ...If you see the need to repair or change something by all means do so, but share your findings. *HONK* Usage: wordpie.py [-h] [-o OUTPUT] [-min MIN_SIZE] [-max MAX_SIZE] [-N] [-L] [-U] [-S] [-A] [-v] Generate a wordlist with all possible combinations of letters including: -L (Lowercase Letters) -U (Uppercase Letters) -N (Numbers) -S (Special Characters) -A (All Characters, Numbers, and Letters) -min (Minimum Size) -max (Maximum Size) -o outputfile.gz or -o stdout By default -o filename.gz to create a GZ compressed text file of all the words. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Bigram Table Generator

    Bigram Table Generator

    A program to generate random reciprocal bigram tables

    A command-line program to encrypt/decrypt a message using a random reciprocal bigram table and write a bigram table to a text file. Executing the program without any command-line arguments starts bigram in message encryption/decryption mode. The program prompts for a password or passphrase and a message to encrypt/ decrypt. After the message is entered the ciphertext is displayed. Executing the program with command-line arguments causes bigram to generate a random bigram table to print to screen or save to disk depending on whether the -f filename argument was given. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    EnigmaGPG Community

    EnigmaGPG Community

    Sending encrypted data through internet web applications.

    ...Also applies to any web application that allows text input by the user such as social networks, blogs, forums, etc. Very easy in three steps: Send Messages: 1 - Write a messages 2 - With the right mouse button, select enigma cipher 3 - Send the encrypted message Recieve Messages: 1 - Select the message 2 - With the right mouse button, select enigma decrypt Support Tickets: https://sourceforge.net/p/enigmagpg/tickets/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    Substitution Cipher Decryption

    Decrypt messages encrypted with a substitution cipher

    ... • Easy location of corresponding characters in the ciphertext and the substituted text by selection. • Fast frequency analysis for single letters, bigrams, trigrams and quadgrams (more N -grams can be made available by adding a single line of code). • Showing the most common letters (bi-/trigrams) in the ciphertext compared to the most common letters (bi-/trigrams) in the British English language. • Easy assignment and change of the substitution letters. • Auto assignment of the 10 first letters.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    The project Jaulp is jet another utility library project written in Java. It contains utility classes for Date ,Calendar, Collections, Resources, Files, IO for Random data, and many more. This is the last version for this project.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    QFileHasher
    A program to calculate and verify checksums of multiple files with wizard-like GUI. Supports 12 hashes: CRC32, MD2, MD4, MD5, SHA1, SHA2, RIPEMD,Whirlpool, ED2K, AICH, Tiger, TTH. Allows processing of nested directories and updating of checksum files
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This project is a C++ library which allows incorporating DKIM into an existing MTA or other application. It provides full support for signing, verifying, and SSP. It is compliant with RFC 4871.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 17
    A distributed and dynamically threaded password cracker. Completely cross-platform using Qt 4.3. Utilizes 1 server and N clients to distribute password cracking across N machines, each of which can utilize N CPUs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Stegeek is very simple tool, that takes several files,encrypt, and mix them into one file. Also add some redundancy. The result is, that we have one archive and N keys. It should not be possible to guess N, if you have archive and up to N-1 keys.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    An implementation of Shoup's "Practical Threshold Signature" in Java. This is an (n,k)-threshold signature system: at least k parties out of n must independently sign a piece of data to produce a valid group signature.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    CivilAction lets you create a Choose Your Own Adventure type story that can be played on Java enabled cell phone. A desktop application lets you write story files. People run the story on their phone. Make a 'Tresure hunt' or 'Amaze Race' type game.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Java Crypt Framework (JCryptFX) is a java-based education project for de-/encrypting streams. It has a implementation of DES and TripleDES in it but the framework user can write own cryptography algorithms and stream types for it - includes a console app
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    The algorithm allows any kind of weights (costs, frequencies), including non-numerical ones. The {0, 1, ..., n-1} alphabet is used to encode message. Built tree is n-ary one.The algorithm is based on a set of template classes : Cell(SYMBOL, WEIGHT), Node(
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    The goal of this project is to design and write comercial quality software and aplications with fully respect to free software (like in "free speach"). The software designed by us will target various fields: from scientific applications to multimedia an
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    The Leeter is an easy-to-use and convinient program to easily write hardly understandable text. While this is mainly not the intention of normal chatters it may be a nice joke to try out on friends. Provides 5 different options to scramble up your text.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    The functional objective is to provide a simple secure socket infrastructure for client/server apps. The usability objective is to allow inexperienced developers to deploy the system and write "Hello World" with a single page of documentation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB