Level Up Your Cyber Defense with External Threat Management
See every risk before it hits. From exposed data to dark web chatter. All in one unified view.
Move beyond alerts. Gain full visibility, context, and control over your external attack surface to stay ahead of every threat.
Try for Free
Simplify Purchasing For Your Business
Manage what you buy and how you buy it with Order.co, so you have control over your time and money spent.
Simplify every aspect of buying for your business in Order.co. From sourcing products to scaling purchasing across locations to automating your AP and approvals workstreams, Order.co is the platform of choice for growing businesses.
This project is dedicated to creating encryption programs, along with their decryption counterparts. The encryptor will encrypt any file (that I've tested) and decrypt a file.
Szyfrator is a GUI application for Windows XP/Vista/7. It encrypts and decrypts text messages using the public RSA algorithm. It generates two 256 bit keys: public and private and was designed to be very easy to use.
Bildsoft releases under GPL License the Blackhorse Algorythm, used by all its software.
Blackhorse provides high-level encryption for any file.
Blackhorse is very quick to encrypt/decrypt data, thanks to a particular technology.
Cryptomni is a program which can encrypt and decrypt files using the one-time pad cipher. If a key is truly random, kept secret, and never reused, this encryption algorithm can be proven to be unbreakable.
Unlock call analytics that provide actionable insights with our call tracking software, empowering you to identify what's working and what's not.
Every customer interaction is vital to your business success and revenue growth. With Jiminny’s AI-powered conversation intelligence software, we take recording, capturing, and meticulous analysis of call recordings to the next level. Unlock call analytics that provide actionable insights with our call tracking software, empowering you to identify what's working and what's not. Seamlessly support your biggest objectives across the entire business landscape with our innovative call tracking system.
NoFault is a library written in C used to encrypt or decrypt data with XOR encryption. KNoFault, NoFault32 and CLNoFault are direct applications of the library, which is easy to use in your own programs.
Usage:
----------------------------------------------------
TreadAES.exe {key} {input_path} {output_path} {mode}
TreadAES.exe test
----------------------------------------------------
key = hexidecimal key e.g 0x00112233445566778899aabbccddeeff
input_path = input file
output_path = output file
mode = 'encrypt' or 'decrypt'
Note: paths are absolute
test mode will run unit tests only
Files are not to be overwritten
Author: Hayden Virtue 2012
Implementation of Nov 2001 Unclassfied AES standard http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf