From dev environments to AI training, choose preset or custom VMs with 1–96 vCPUs and industry-leading 99.95% uptime SLA.
Compute Engine delivers high-performance virtual machines for web apps, databases, containers, and AI workloads. Choose from general-purpose, compute-optimized, or GPU/TPU-accelerated machine types—or build custom VMs to match your exact specs. With live migration and automatic failover, your workloads stay online. New customers get $300 in free credits.
Try Compute Engine
Go from Data Warehouse to Data and AI platform with BigQuery
Build, train, and run ML models with simple SQL. Automate data prep, analysis, and predictions with built-in AI assistance from Gemini.
BigQuery is more than a data warehouse—it's an autonomous data-to-AI platform. Use familiar SQL to train ML models, run time-series forecasts, and generate AI-powered insights with native Gemini integration. Built-in agents handle data engineering and data science workflows automatically. Get $300 in free credit, query 1 TB, and store 10 GB free monthly.
Emojis of Death is a down and dirty
browser app, written in HTML.
It's HTML, so it will work on anything a web browser can run on.
It's purpose is to hide text strings in emojis,
which you can then text or email.
An encoded emoji can hold quite a bit of text.
The receiver will need Emojis of Death as well, to decode the emoji.
The file's small size makes it perfect for your phone.
Some email and text services don't work with this,
so try it.
Address to hash160 is an efficient multi-threaded tool designed to decode various cryptocurrency addresses (such as Bitcoin BTC,Bitcoin Cash BCH, Litecoin LTC, Bitcoin Gold BTG, etc.) to extract hash160 values. It is often used in research such as brainflayer, keyhunt, BitCrack, ecloop, keyhunt cuda, etc.
A spreadsheet to aid in detecting ransomware-corrupted files
...The purpose of the file hash comparison is to identify files whose contents have changed. For example, the files on an up-to-date data drive may be compared against the files previously found on that data drive, or on a backup drive.
Identifying changed files may be useful as a precaution against ransomware. The Support tab (above) links to a blog post discussing uses of the spreadsheet for that purpose. See also https://raywoodcockslatest.wordpress.com/2022/04/10/ransomware-spreadsheet/
A flat-file database program written in bash shell and awk scripts.
Fields.awk allows users to create and work with small-to-medium databases on their home computers or a mobile device with bash shell terminal emulator. It runs on any OS compatible with bash shell, including Linux, FreeBSD, MacOSX, and Android.
Certain optional features (printing/encryption) are dependent on external utilities such as lp or ccrypt.
Go from idea to deployed AI app without managing infrastructure. Vertex AI offers one platform for the entire AI development lifecycle.
Ship AI apps and features faster with Vertex AI—your end-to-end AI platform. Access Gemini 3 and 200+ foundation models, fine-tune for your needs, and deploy with enterprise-grade MLOps. Build chatbots, agents, or custom models. New customers get $300 in free credit.
An Android application for encryption and decryption
It is a simple android application for encryption and decryption of files using passphrase. Supported API levels are in the range 10 (min) and 17 (max).
To encrypt a file, what you need is to share the file to "DCrypt" and enter a passphrase. To decrypt the file, you have to share the encrypted file to the application and enter the passphrase. Obviously the passphrase for encryption and decryption should be the same.