Showing 43 open source projects for "text to"

View related business solutions
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • 1
    SOPS

    SOPS

    Simple and flexible tool for managing secrets

    sops is an editor of encrypted files that supports YAML, JSON, ENV, INI and BINARY formats and encrypts with AWS KMS, GCP KMS, Azure Key Vault, age, and PGP. For the adventurous, unstable features are available in the develop branch, which you can install from source. To use sops as a library, take a look at the decrypt package. We rewrote Sops in Go to solve a number of deployment issues, but the Python branch still exists under python-sops. We will keep maintaining it for a while, and you...
    Downloads: 12 This Week
    Last Update:
    See Project
  • 2
    Emojis of Death
    Emojis of Death is a down and dirty browser app, written in HTML. It's HTML, so it will work on anything a web browser can run on. It's purpose is to hide text strings in emojis, which you can then text or email. An encoded emoji can hold quite a bit of text. The receiver will need Emojis of Death as well, to decode the emoji. The file's small size makes it perfect for your phone. Some email and text services don't work with this, so try it.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3

    FTC

    Symmetric File and Text Encryption

    FTC cascades choice of Aria-256, AES-256, Camellia-256, SM4, or ChaCha20 for file and text encryption, the keystream generation is extremely robust I don't make cute interfaces, it just works.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 4
    Vigenère

    Vigenère

    A powerful tool for cracking the Vigenère cipher

    Vigenère is a program for encrypting and decrypting text using the Vigenère cipher. Built-in cryptanalysis tools make it possible to crack the cipher without needing the key — or even knowing its length.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5
    garysfm

    garysfm

    An advanced file manager with qss themes and iso and folder previews

    garysfm which stands for Gary's File Manager is a file manager with some advanced features. Those features include bulk renaming and folder image previews. I has rather advanced search functions, tab browsing with persistence between launches. It remembers your folder sorting and view options in icon view. It also remembers your active tabs between sessions. It has progress dialog while doing large operations like copying large files, and folders with many files. python version works on...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 6
    MATTA

    MATTA

    Morse Code Utilitiies to convert text messages to & from sound files.

    ...Tonal frequency or wpm-speed does not seem to matter. Now includes an inverse commandline app, txt2wav that creates a morse code WAV file from English text. The proper command to extract the archive and maintain the directory structure is "7z x filename".
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    mystic-crypt is designed as a Java library that can be used for simple and complex encryption and decryption. The source code for the library is available under https://github.com/astrapi69/mystic-crypt For demonstration what the library can do there is a graphical client: The source code for the ui is available under https://github.com/astrapi69/mystic-crypt-ui
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8

    XOR Encryptor/Decryptor

    Encrypts and decrypts files using XOR operation.

    Encrypts and decrypts files using XOR operation.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 9

    S-DES Crypto App

    Encryption/Decryption demonstration app using the S-DES algorithm

    ...The GUI pops up that allows entering a 10-bit encryption/decryption key in binary (0, 1 digits) and the plaintext/ciphertext in the same form (8-bit). Executing the algorithm, decription of the encoding/decoding functionality is provided in the three main text boxes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • eProcurement Software Icon
    eProcurement Software

    Enterprises and companies seeking a solution to manage all their procurement operations and processes

    eBuyerAssist by Eyvo is a cloud-based procurement solution designed for businesses of all sizes and industries. Fully modular and scalable, it streamlines the entire procurement lifecycle—from requisition to fulfillment. The platform includes powerful tools for strategic sourcing, supplier management, warehouse operations, and contract oversight. Additional modules cover purchase orders, approval workflows, inventory and asset management, customer orders, budget control, cost accounting, invoice matching, vendor credit checks, and risk analysis. eBuyerAssist centralizes all procurement functions into a single, easy-to-use system—improving visibility, control, and efficiency across your organization. Whether you're aiming to reduce costs, enhance compliance, or align procurement with broader business goals, eBuyerAssist helps you get there faster, smarter, and with measurable results.
    Learn More
  • 10
    Ciphey

    Ciphey

    Decrypt encryptions without knowing the key or cipher

    ...Ciphey uses a custom-built artificial intelligence module (AuSearch) with a Cipher Detection Interface to approximate what something is encrypted with. And then a custom-built, customizable natural language processing Language Checker Interface, which can detect when the given text becomes plaintext.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 11
    Novel Insight Inner Circle

    Novel Insight Inner Circle

    Graphical message and file encryption tool

    ...The encryption uses AES-256 twice so it is harder to crack than the industry standard pure AES 256bit implementation (theoretical key size is 512 bit). The software writes encrypted data in ASCII text format which can be cut'n'pasted to messaging apps or to emails and back to Inner Circle when decrypting data. IMPORTANT: The software requires new OpenJDK 16 (Not Oracle's J2RE 1.8) to run. Install, for example, AdoptOpenJDK for Windows. NOTE: By using encryption twice the implementation is (in theory) vulnerable to Meet-In-The-Middle attack reducing key size to 256bit but the attack still requires 2^256 bytes of memory making it impossible in practice.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    XORCrypter

    XORCrypter

    Little program for encryption-decryption.

    Little program that uses the bit XOR operation for encryptioning and decryptioning, for now, just text files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    BitShade

    BitShade

    AES Cipher, Base64 encoder, SHA calculator

    BitShade is a graphic utility to encrypt/decrypt with AES, base64 encode/decode, calculate the SHA checksum. It is cross platform, written in Java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    ET-Explorer

    replacement for the standard windows explorer.

    This application is a replacement for the standard windows explorer. When I began working with Windows 7 I noticed that some of the features I liked from XP were missing. After trying many freeware replacements and not finding any of them having all the features I needed, I decided to develop my own explorer replacement.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15

    fields.awk

    A flat-file database program written in bash shell and awk scripts.

    Fields.awk allows users to create and work with small-to-medium databases on their home computers or a mobile device with bash shell terminal emulator. It runs on any OS compatible with bash shell, including Linux, FreeBSD, MacOSX, and Android. Certain optional features (printing/encryption) are dependent on external utilities such as lp or ccrypt.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    Ncrypt

    Text and image encryption and decryption software

    ...The software only works in the scope of text files with a maximum of 150 characters, and image files with a maximum size of 128 x 128.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    approach to encryption and decryption involves two strings. The first is an encryption / decryption string which we will allow to be up to 128 lower case alphabetical characters in length. The second string is a line of text from a file that is to be encrypted or decrypted. the basic strategy for encrypting data is based on mapping alphabetical characters to specific values, then doing some simple mathematical operations to create a new value.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Shaget

    An application for getting SHA and MD5 checksums from an file.

    Shaget is an application made in C# for getting SHA (SHA1, SHA256 and SHA512) and MD5 sums from an file. You can verify if the sums are correct and save the full log to an text file. This application does not encrypt or decrypt files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Word Cipher - Encryption/Decryption tool

    Word Cipher - Encryption/Decryption tool

    Encryption/Decryption tool for words/hash/digits/encoded text

    Word Cipher - KRIEG Technologies Developed by: Northumber, KRIEG Technologies This application is developed for encode/decode words and translate them into commons encryption languages but also ancient ciphering language.You can encrypt/decrypt words or text or digits into: ----- Text Ciphering ----- Albam Latin (Temurah) Atbash Latin (Temurah) Avgad Latin (Temurah) Caesar Cipher Flipped Text ----- Text Rotation ----- ROT5 (Digits) ROT13 (Text) ROT18 (Text & Digits) ROT47 ----- Text to Number ----- Binary Hexadecimal ----- Text Encoding ----- Base 64 HTML Entities ----- Text Hashing ----- AES MD5 SHA1 (160 bit) SHA256 SHA384 SHA512 Word Cipher is a free-distributed software.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20

    uCrypto

    A simple, yet useful encryption/decryption program.

    A small, portable utility that can be used to encrypt a text and decrypt a text, using your own passphrase for each of them.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Search Me

    Search Me

    Rich search software for Microsoft windows

    Search Me v1.2.0 ___ 12/10/2014 Search Me software is a windows search utility that let the user find what she/he wants fast. You can customize your search. You can select the size limit, file attribute, and/or file date. .NET 4 is required If you have any questions, feedback, or you want to report a but don't forget to contact me from help menu.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    SES Super-Encypherment Scrambler

    SES Super-Encypherment Scrambler

    SES brings back the uncrackable onetime pad, with a digital twist.

    ...SES is built on ISAAC, Bob Jenkins' unbroken CSPRNG, a fast and simple stream cipher placed in the Public Domain in 1996. SES now gives you the ability to efficiently cipher text of arbitrary length or files of any size or type. Use it with confidence. To achieve complete one-on-one privacy, SES traverses several levels en route to its output. The more words in your key-phrase, the more layers of encipherment SES applies. It is part Vigenere, part onetime pad, part cryptographic hash, not to mention the essential scrambler element, each component driven by ISAAC, with all key-derivation and stretching relying on Keccak in 512-bit configuration.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    ISC - The ISAAC Stream Cipher

    ISC - The ISAAC Stream Cipher

    ISC lets you encrypt & decrypt text and files of any type up to 4GB

    ...ISAAC is fast - especially when optimised - and portable to most architectures in nearly all programming and scripting languages. After more than 20 years of existence ISAAC has not been broken, and the little program you have here allows you to use it to encrypt and decrypt text of arbitrary length, files of any type, on a key-phrase of any complexity. ISC is a symmetric key encryption system, which means that both the sender and recipient of a message must possess the key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Mystery

    Mystery

    software cryptographic data protection

    Software tool for cryptographic protection of data is used to encrypt and decrypt files. Signature and check for dokumemntov and text files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Bigram Table Generator

    Bigram Table Generator

    A program to generate random reciprocal bigram tables

    A command-line program to encrypt/decrypt a message using a random reciprocal bigram table and write a bigram table to a text file. Executing the program without any command-line arguments starts bigram in message encryption/decryption mode. The program prompts for a password or passphrase and a message to encrypt/ decrypt. After the message is entered the ciphertext is displayed. Executing the program with command-line arguments causes bigram to generate a random bigram table to print to screen or save to disk depending on whether the -f filename argument was given. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next