This xxteac program utilizes the "Corrected Block TEA" encryption/decryption algorithm by
Roger Needham and David Wheeler.
The original algorithm has been slightly modified to allow arbitary length passwords / password files.
A program to generate random reciprocal bigram tables
A command-line program to encrypt/decrypt a message using a random reciprocal bigram table and write a bigram table to a text file.
Executing the program without any command-line arguments starts bigram in message encryption/decryption mode. The program prompts for a password or passphrase and a message to encrypt/ decrypt. After the message is entered the ciphertext is displayed.
It supports files and folders multi-compression (UPX, ZIP, 7Z) and archives extraction (several formats). It includes an intelligent UPX compression mode, self-extracting archive creation, encryption/decryption, external compressors and much more.
Small cryptographic commandline tool for LINUX and OpenBSD (x86) completely in 32-Bit Assembly Language.
ORDO encrypt/decrypt files (max. size 2 GB) with AES-128-Algorithm (Rijndael) in CBC-Mode (Cipher-Block-Chaining).
No libs are included, only system-calls are used.
ORDO is under BSD License.
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Welcome to Data Access Layer for Java (DAL4j) a set of commandlinetools and framework used to reverse engineer a MySQL or SQLServer database schema into a set of JPA Entity Beans.
DAL4j can be useful for scenarios where there is an existing database schema but a technology other that JPA is used to interact with the database. DAL4j can provide an easy way to migrate your code base from other technologies such as JDBC or Hibernate to JPA.
Simple tool for file encryption and folder content encryption with AES 256. Files can also be hashed with a SHA1 signature. A commandline version is available as well as a GUI version. One other useful feature is to encrypt messages for emails.
BcryptFE is a graphical frontend for controlling the bcrypt win32 commandline utility. Written in vb.net 2008 and designed to allow easier encryption/decryption of multiple files and directories. Filenames can be hidden in an index file to stay private.
Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
Cryptomni is a program which can encrypt and decrypt files using the one-time pad cipher. If a key is truly random, kept secret, and never reused, this encryption algorithm can be proven to be unbreakable.