Showing 8 open source projects for "string encryption"

View related business solutions
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    PureBasic Shamir Secret Sharing

    PureBasic Shamir Secret Sharing

    Open-source PureBasic implementation of the Shamir Secret Sharing

    PureBasic Shamir Secret Sharing is an open-source, self-contained and educational implementation of the Shamir Secret Sharing Scheme, written entirely in PureBasic. Shamir Secret Sharing is a cryptographic method that splits a secret into multiple parts (shares), such that any combination of at least T shares can reconstruct the original secret, while any number of shares fewer than T reveals no usable information. This implementation operates over the finite field GF(257), allowing...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Hash Latch
    The hash latch generates keys in a manner similar to how some cryptocurrencies are mined. It takes a string and brute-forces a prefix for it so that the hash of the string with the prefix has a certain number of leading zeroes. But that alone would've been too easy to hack. To prevent an attacker from forging the keys by generating a new prefix: the hash latch doesn't output the keys in the plaintext. Instead, it encrypts the key and outputs the ciphertext. That means that instead of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    CKK Encryption

    Fast and unbreakable encryption

    Any comments or question should be directed to the Discussion section of this website. I'll respond to any post directed there. Still in alpha stage. We take a file/stream and break it down to 8bit ASCII "0-255" values. We then take those values and combine with individual 8bit ASCII values of the password/pass phrase. We loop thru the file combining 1 byte with 1 byte from "password phrase" in a continuous loop. We then write all odd results then even results to a file, array or string...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    TinyObfuscate

    TinyObfuscate

    A tool for strings obfuscation tool in c++ by Michael Haephrati

    When you need encrypt/obfuscate strings in your program so that they don't just show up with a strings or hex tool when your executable is examined, this tool can be useful. See Code Project article: https://www.codeproject.com/Articles/1210398/Small-String-Obfuscator by Michael Haephrati
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5

    CyberCrypt

    .NET Library for Encryption/Decryption

    CyberCrypt: ----------------- .NET Library for Encryption/Decryption Usage: ---------- Encrypting file using AES (256 bits): CyberCrypt._AES256.EncryptFile("C:\example.txt", "YourPassword") Decrypting file using AES (256 bits): CyberCrypt._AES256.DecryptFile("C:\example.txt", "YourPassword") Hashing string using SHA512: CyberCrypt._SHA.SHA512Hash("A string that will be converted to SHA512 hash.")
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Cryptkeeper

    Cryptkeeper Secuirty tool

    ...some uses encryption keys and some dont. there are AES , 4DES , RC2 , RC4 , MD5 , SHA1 , SHA2 , SHA3 , SHA4 , XoR , Crypt , HeX , BINARY , Rijndael 256 , Obfuscation String , RSA , BASE64. The password manager anything saved WILL NOT BE ENCRYPTED so it is smart to protect the program from others not using it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Yoda's Protector
    Yoda's Protector is a free, open source, Windows 32-bit software protector.
    Downloads: 18 This Week
    Last Update:
    See Project
  • 8
    NAC is a collection of tools for cryptography. The goal is to provide simple-to-use crypto tools (like an OTP, String and number generator, public key algorithm...) you can use under Linux, Windows...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB