Showing 31 open source projects for "command-line"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Context for your AI agents Icon
    Context for your AI agents

    Crawl websites, sync to vector databases, and power RAG applications. Pre-built integrations for LLM pipelines and AI assistants.

    Build data pipelines that feed your AI models and agents without managing infrastructure. Crawl any website, transform content, and push directly to your preferred vector store. Use 10,000+ tools for RAG applications, AI assistants, and real-time knowledge bases. Monitor site changes, trigger workflows on new data, and keep your AIs fed with fresh, structured information. Cloud-native, API-first, and free to start until you need to scale.
    Try for free
  • 1
    aws-encryption-sdk-cli

    aws-encryption-sdk-cli

    CLI wrapper around aws-encryption-sdk-python

    This command line tool can be used to encrypt and decrypt files and directories using the AWS Encryption SDK. If you have not already installed cryptography, you might need to install additional prerequisites as detailed in the cryptography installation guide for your operating system. Installation using a python virtual environment is recommended to avoid conflicts between system packages and user-installed packages.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    transfer.sh

    transfer.sh

    Easy and fast file sharing from the command-line

    Easy and fast file sharing from the command-line. This code contains the server with everything you need to create your own instance. Transfer.sh currently supports the s3 (Amazon S3), gdrive (Google Drive), storj (Storj) providers, and local file system (local). For easy deployment, we've created a Docker container. For the usage with a AWS S3 Bucket, you just need to specify the following options, provider, aws-access-key, aws-secret-key, bucket, and s3-region.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3

    ProxyCrypt

    Encrypted volumes through command line

    ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Encryption and decryption are made on the fly, allowing you to use encrypted volumes like normal ones. Designed for paranoids and advanced users, it is also fast, very lightweight, open source and easy to recompile. See the features below. It works as a "proxy" for the AIM driver or the ImDisk driver.
    Downloads: 16 This Week
    Last Update:
    See Project
  • 4
    safelock-cli

    safelock-cli

    ⚡Fast files encryption CLI built with GO

    Fast files encryption (AES-GCM) package and command-line tool built for speed with Go ⚡ Examples: - Encrypt a path with default options > safelock-cli encrypt path_to_encrypt encrypted_file_path - Decrypt a file > safelock-cli decrypt encrypted_file_path decrypted_files_path - If you want it to run silently with no interaction > echo "password123456" | safelock-cli encrypt path_to_encrypt encrypted_file_path --quiet
    Downloads: 0 This Week
    Last Update:
    See Project
  • G-P - Global EOR Solution Icon
    G-P - Global EOR Solution

    Companies searching for an Employer of Record solution to mitigate risk and manage compliance, taxes, benefits, and payroll anywhere in the world

    With G-P's industry-leading Employer of Record (EOR) and Contractor solutions, you can hire, onboard and manage teams in 180+ countries — quickly and compliantly — without setting up entities.
    Learn More
  • 5
    KeyKiller-Cuda

    KeyKiller-Cuda

    Solving the Satoshi Puzzle

    KeyKiller is a GPU-accelerated version of the KeyKiller project, designed to achieve extreme performance in solving Satoshi Nakamoto's puzzles using modern NVIDIA GPUs. KeyKiller CUDA pushes the limits of cryptographic key search performance by leveraging CUDA, thread-beam parallelism, and batch EC operations. The command-line version is open-source and free to use. For the paid advanced graphics version, please visit: https://gitlab.com/8891689/KeyKiller-Cuda/
    Downloads: 6 This Week
    Last Update:
    See Project
  • 6
    Crypt Tool

    Crypt Tool

    A simple password manager for Windows based on OpenSSL

    A simple password manager for Windows based on OpenSSL (included). Allow encryption, decryption of messages, passwords, files and images with AES 256 CBC algorithm. Integrated FTP(S) client. Console based commands, random password generator. Stand alone application need no installer, runable from USB sticks. Working with Windows 7-11 (OpenSSL 1.1.1s 32 Bit) Read Wiki for more details.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 7
    Address_Decode

    Address_Decode

    Decode various cryptocurrency addresses

    Address to hash160 is an efficient multi-threaded tool designed to decode various cryptocurrency addresses (such as Bitcoin BTC,Bitcoin Cash BCH, Litecoin LTC, Bitcoin Gold BTG, etc.) to extract hash160 values. It is often used in research such as brainflayer, keyhunt, BitCrack, ecloop, keyhunt cuda, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    SafeBox

    SafeBox

    The Best file security app.

    A free and Open-Source File Encryption and Decryption app with GUI (Graphical User Interface) and CLI (Command Line Interface) that help you to protect your privacy well using AES (Advanced Encryption System) with your own password and get a single (portable )encrypted file that can share across internet or unsafe places with peace of mind without any data collection or any extra/hidden processes, It also can keep and encrypt the original file name within the file then while decryption (if you ticked the option) it can recover the original file name. ...
    Downloads: 16 This Week
    Last Update:
    See Project
  • 9
    This software adds OpenSSL encryption and decryption commands to the menu that pops up when you right-click on a file or folder in Windows XP/Vista/7/8/10 (32-bit or 64-bit). To encrypt or decrypt a file or folder, just right-click on it and select the desired command.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 10
    MATTA

    MATTA

    Morse Code Utilitiies to convert text messages to & from sound files.

    ...Tonal frequency or wpm-speed does not seem to matter. Now includes an inverse commandline app, txt2wav that creates a morse code WAV file from English text. The proper command to extract the archive and maintain the directory structure is "7z x filename".
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    badpi-cyphering

    file/stream encryption/decryption/CRC based on PI compute algorithm

    Encryption/decryption/CRC algorithm base on PI calculation. The private Key is composed of : - a starting position nb (iterations before starting encrypt) - a loop nb (in-between iteration) - small spot nb for the position in floating number part Challenge is proposed in my website.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    zhcrypt

    Tiny front end to hcrypt.exe from project page Hcrypto

    Zhcrypt is simply a tiny front end to hcrypt.exe, one of the utilities found within the Hcrypto suite found on Sourceforge. Hcrypt.exe is a Windows command line utility that will encrypt and decrypt files offering a variety of common and uncommon algorithms, including AES-128, AES-192, AES-256, Blowfish, CAST-128, CAST-256, DES, TripleDES, DESX, GOST, DEA, KASUMI, MARS, MISTY1, Noekeon, RC2, RC5, RC6, SAFER-SK, SEED, Serpent, Skipjack, Square, TEA, Twofish, and XTEA
    Downloads: 7 This Week
    Last Update:
    See Project
  • 13

    NtrUtil

    A command line interface for encryption and decryption using the NTRU

    A command line interface for encryption and decryption using the NTRU cryptography algorithm. "NTRU is a public key cryptosystem that is considered unbreakable even with quantum computers. Commonly used cryptosystems like RSA or ECC, on the other hand, will be broken if and when quantum computers become available."-NTRU
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    XOR Encryptor/Decryptor

    Encrypts and decrypts files using XOR operation.

    Encrypts and decrypts files using XOR operation.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 15

    commons-crypt

    A library for easy use of symmetric encryption and decryption in java

    A library for easy use of symmetric encryption and decryption in java. Encrypt and decrypt with one line of code using common algorithms like AES. Requires Java 7 or later.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    SQUEEZER

    SQUEEZER

    Squeezer framework, build serverless dApps

    ...Quick intuitive code deployments by using a special mechanism that will deploy smart contracts and dApp services where code changed. Silent deployments, no interruption for the current functionality (really useful on production). One single command to simultaneously deploy all available functions on your project where code changed from the last deployment. Test your code locally on a simulated functions platform for a faster development cycle.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    BTCore

    A Collection of Useful Java/Swing Code

    NEWEST FEATURE ---------- Added one line ".zip" extraction to Util class! Added one line ".zip" extraction from URL (web) and one line file download from URL! BTCore is a library that was designed to be used with all of Banotech's software. It includes a tremendous amount of code snippets and classes that have been boiled down to allow ease of use by everyone. BTCore is, and always will be FREE.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    approach to encryption and decryption involves two strings. The first is an encryption / decryption string which we will allow to be up to 128 lower case alphabetical characters in length. The second string is a line of text from a file that is to be encrypted or decrypted. the basic strategy for encrypting data is based on mapping alphabetical characters to specific values, then doing some simple mathematical operations to create a new value.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    NCrypted

    NCrypted - simple file encryption software with GPU support

    ...This software was designed to be as simple as possible, so you won't find any fancy, flashy gui elements or complicated advanced options. You can also use it directly from command line. NCrypted can automatically detect and take advantage of your NVidia graphics card to speed up the file processing.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 20
    VCipher

    VCipher

    A Social Media Encryption/Decryption Tool

    VCipher is a unique encryption and decryption tool.The code is not unique rather it is quite simple as it uses Vigenère cipher algorithm but the idea is quite unique.It is created to be used as an extra layer of protection for social networking sites,so even if someone's account is hacked it will take them so expertise to read those messages.And if used correctly it can also be made uncrackable if used correctly.This is a CLI(Command Line Interface) there is a web version too. VCipher Web : http://vcipherweb.co.nf/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    SES Super-Encypherment Scrambler

    SES Super-Encypherment Scrambler

    SES brings back the uncrackable onetime pad, with a digital twist.

    SES brings back the uncrackable onetime pad, with a digital twist. It is well known that a random key of message-length is the only provably unbreakable cipher. SES uses cryptographic strength pseudo-random keys of message-length for its many encipherments, in addition to offering true one-time pad capability for the intrepid. SES is built on ISAAC, Bob Jenkins' unbroken CSPRNG, a fast and simple stream cipher placed in the Public Domain in 1996. SES now gives you the ability to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    JCRYPT Java Web Service Client

    JCRYPT Java Web Service Client

    JCRYPT - JMasters Encryption/Decryption Service

    The JCRYPT client make it easy and convenience to consume JCRYPT Web Service which enables encryption/decryption of your data with intuitive command line tool or Java API both packed as single very small jar file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    ISC - The ISAAC Stream Cipher

    ISC - The ISAAC Stream Cipher

    ISC lets you encrypt & decrypt text and files of any type up to 4GB

    ISAAC is a cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It was developed by Bob Jenkins from 1993-1996 and placed in the Public Domain. ISAAC is fast - especially when optimised - and portable to most architectures in nearly all programming and scripting languages. After more than 20 years of existence ISAAC has not been broken, and the little program you have here allows you to use it to encrypt and decrypt text of arbitrary length, files of any...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Bigram Table Generator

    Bigram Table Generator

    A program to generate random reciprocal bigram tables

    A command-line program to encrypt/decrypt a message using a random reciprocal bigram table and write a bigram table to a text file. Executing the program without any command-line arguments starts bigram in message encryption/decryption mode. The program prompts for a password or passphrase and a message to encrypt/ decrypt. After the message is entered the ciphertext is displayed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    ArcThemALL!
    It supports files and folders multi-compression (UPX, ZIP, 7Z) and archives extraction (several formats). It includes an intelligent UPX compression mode, self-extracting archive creation, encryption/decryption, external compressors and much more.
    Downloads: 33 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next