Showing 11 open source projects for "stable-diffusion-webui"

View related business solutions
  • Context for your AI agents Icon
    Context for your AI agents

    Crawl websites, sync to vector databases, and power RAG applications. Pre-built integrations for LLM pipelines and AI assistants.

    Build data pipelines that feed your AI models and agents without managing infrastructure. Crawl any website, transform content, and push directly to your preferred vector store. Use 10,000+ tools for RAG applications, AI assistants, and real-time knowledge bases. Monitor site changes, trigger workflows on new data, and keep your AIs fed with fresh, structured information. Cloud-native, API-first, and free to start until you need to scale.
    Try for free
  • Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place. Icon
    Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place.

    For healthcare Providers and Facilities

    Incredable streamlines and simplifies the complex process of medical credentialing for hospitals and medical facilities, helping you save valuable time, reduce costs, and minimize risks. With Incredable, you can effortlessly manage all your healthcare providers and their credentials within a single, unified platform. Our state-of-the-art technology ensures top-notch data security, giving you peace of mind.
    Learn More
  • 1
    Vigenère

    Vigenère

    A powerful tool for cracking the Vigenère cipher

    Vigenère is a program for encrypting and decrypting text using the Vigenère cipher. Built-in cryptanalysis tools make it possible to crack the cipher without needing the key — or even knowing its length.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    KeyKiller-Cuda

    KeyKiller-Cuda

    Solving the Satoshi Puzzle

    KeyKiller is a GPU-accelerated version of the KeyKiller project, designed to achieve extreme performance in solving Satoshi Nakamoto's puzzles using modern NVIDIA GPUs. KeyKiller CUDA pushes the limits of cryptographic key search performance by leveraging CUDA, thread-beam parallelism, and batch EC operations. The command-line version is open-source and free to use. For the paid advanced graphics version, please visit: https://gitlab.com/8891689/KeyKiller-Cuda/
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3

    file encrypt

    File encryption and decryption utility

    The fcrypt and fdecrypt programs provide a comprehensive symmetric encryption tool kit for encrypting and decrypting files.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4

    badpi-cyphering

    file/stream encryption/decryption/CRC based on PI compute algorithm

    Encryption/decryption/CRC algorithm base on PI calculation. The private Key is composed of : - a starting position nb (iterations before starting encrypt) - a loop nb (in-between iteration) - small spot nb for the position in floating number part Challenge is proposed in my website.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Rent Manager Software Icon
    Rent Manager Software

    Landlords, multi-family homes, manufactured home communities, single family homes, associations, commercial properties and mixed portfolios.

    Rent Manager is award-winning property management software built for residential, commercial, and short-term-stay portfolios of any size. The program’s fully customizable features include a double-entry accounting system, maintenance management/scheduling, marketing integration, mobile applications, more than 450 insightful reports, and an API that integrates with the best PropTech providers on the market.
    Learn More
  • 5
    Bigram Table Generator

    Bigram Table Generator

    A program to generate random reciprocal bigram tables

    A command-line program to encrypt/decrypt a message using a random reciprocal bigram table and write a bigram table to a text file. Executing the program without any command-line arguments starts bigram in message encryption/decryption mode. The program prompts for a password or passphrase and a message to encrypt/ decrypt. After the message is entered the ciphertext is displayed. Executing the program with command-line arguments causes bigram to generate a random bigram table to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Azrar

    Azrar

    Encryption addressing long-term data secrecy

    Most of today's cryptographic standards will be broken with tomorrow's computational power. Azrar is a user-friendly tool for the encryption/decryption of single files - preferably compressed archives - addressing long-term data secrecy. Thus, Azrar provides the possibility to use webspace for secure data transfer between two communication/transfer partners (encryption only, network transfer not yet included in current version). Data in encrypted files are secret/private indefinitely. To...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    kokla
    Simple tool for file encryption and folder content encryption with AES 256. Files can also be hashed with a SHA1 signature. A command line version is available as well as a GUI version. One other useful feature is to encrypt messages for emails.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Cypher is an encryption program that uses the AES (Rijndael) algorithm to encrypt and decrypt files. You can use Cypher to protect sensitive data from unwanted access.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    NoFault is a library written in C used to encrypt or decrypt data with XOR encryption. KNoFault, NoFault32 and CLNoFault are direct applications of the library, which is easy to use in your own programs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Smart Business Texting that Generates Pipeline Icon
    Smart Business Texting that Generates Pipeline

    Create and convert pipeline at scale through industry leading SMS campaigns, automation, and conversation management.

    TextUs is the leading text messaging service provider for businesses that want to engage in real-time conversations with customers, leads, employees and candidates. Text messaging is one of the most engaging ways to communicate with customers, candidates, employees and leads. 1:1, two-way messaging encourages response and engagement. Text messages help teams get 10x the response rate over phone and email. Business text messaging has become a more viable form of communication than traditional mediums. The TextUs user experience is intentionally designed to resemble the familiar SMS inbox, allowing users to easily manage contacts, conversations, and campaigns. Work right from your desktop with the TextUs web app or use the Chrome extension alongside your ATS or CRM. Leverage the mobile app for on-the-go sending and responding.
    Learn More
  • 10
    Encrypt-roller is a encryption/decryption package. The goal of the project is to incorporate multiple encryption schemes and mechanisms to provide security and validity for files being stored or transferred.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    BP-Tools

    BP-Tools

    Set of useful tools for payment service development

    The BP-Tools set consist from applications supporting EFT testing, benchmarking and transaction service development. BP-Tools suite currently consists of following three components: - BP-CCALC: Cryptographic Calculator - BP-CardEdit: Thales P3 Input/Output file editor - BP-EMVT: EMV Tool - BP-HCMD: Thales HSM Commander
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next