15 projects for "cryptography" with 2 filters applied:

  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • The most trusted software in construction Icon
    The most trusted software in construction

    HCSS is the gold standard software solution for winning, planning, and managing construction projects by connecting the office to the field.

    HCSS provides easy-to-use software built for construction companies that want to win more work, work smarter, and boost profits. For nearly 40 years, we've helped heavy civil contractors, infrastructure builders, and utility companies improve operations, from estimating and project management to field tracking, equipment maintenance, and safety. Tools like HeavyBid, HeavyJob, and HCSS Safety are built for the field and designed to work together, giving your team real-time visibility, tighter cost control, and better job outcomes. With 45+ accounting integrations and customizable APIs, HCSS fits seamlessly into your tech stack. We regularly update our software based on feedback from real crews, ensuring it fits the way your team works. Backed by award-winning 24/7/365 support and a proven implementation process, HCSS helps reduce risk, cut inefficiencies, and deliver fast ROI. If you're ready to grow your business and gain a competitive edge, HCSS is the partner that gets you there.
    Learn More
  • 1
    Moscrack is a perl application designed to facilitate cracking WPA keys on a cluster of computers. This is accomplished with any one of Mosix clustering software, ssh, rsh or Pyrit connectivity to nodes. Cluster nodes can run any Un*x variant (includ
    Downloads: 12 This Week
    Last Update:
    See Project
  • 2
    L-GRID
    ...This is a "double-clickable" jar file, or you can run it from the command line using: java -jar LGRID_Client_XX.jar NOTE: To Install JCE Unlimited Strength Jurisdiction Policy Files If needed, you should install the Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    samizdat

    Kerberized Messaging Toolkit for Java

    Samizdat is a toolkit for Java for building Kerberos secured distributed, message-oriented applications. The toolkit contains base classes that simplifies the management of Kerberos login contexts as well as flexibly sign and seal messages between principals using the Java GSS API. The toolkit contains Transformation classes for Kerberizing JMS traffic as well as a super-lean HTTP based protocol stack that supports both Synchronous (RPC) and Asynchronous modalities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    A modern secure, robust, multithreaded, exception aware, internationalisable, portable GUI toolkit library designed for mission-critical work in C++ and Python forked from the FOX library. Replicates the Qt API in many places.
    Leader badge
    Downloads: 1 This Week
    Last Update:
    See Project
  • One verification platform to secure the whole user journey Icon
    One verification platform to secure the whole user journey

    Handle every identity verification need in a single dashboard. Verify users, businesses or transactions, all while managing cases and deterring fraud.

    Sumsub is a full-cycle verification platform that secures every step of the user journey. With Sumsub’s customizable KYC, KYB, AML, Transaction Monitoring and Fraud Prevention solutions, you can orchestrate your verification process, welcome more customers worldwide, meet compliance requirements, reduce costs and protect your business.
    Learn More
  • 5
    a number of clients try to find a secret key by calculating the encryptions to all possible keys of a given key range and comparing them to the encryptin of the secret key until a matching one is detected....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    BruteNet is a system of the distributed brute force and distributed calculations built on user extensions capable to solve a great number of problems related to the partition on a lot of machines.With sample extention you can distribute brute md5-hash
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    This program try to crack any md5 hash , but not using one cpu, using the power of distributed computing to get better results in less time
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    distDES is a Java RMI-based application which manages load balancing on heterogeneous clusters. Development will extend the theoretical initial implementation to include clustered Rainbow Table generation and encryption algorithm collision detection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Quantitative information engineering systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • The POS System for Specialty Retailers. Icon
    The POS System for Specialty Retailers.

    Omnichannel POS and inventory management designed for multi-store apparel, footwear, sports, and gift merchants.

    Established in 1992 in NYC, Runit is THE cloud-based Retail Management and Point of Sale (POS) system for high-end apparel, footwear, sporting goods and gift retail chains. Combining a flexible platform with highly personalized 24x7 service, we will enable you to integrate processes across your stores, warehouses, websites and third party online channels.
    Learn More
  • 10
    Peer Agent is a system that enable a group of users to carry out automated complex interaction via email services without relying on a trusted third party.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    OceanStore is an architecture for a global-scale file system which uses erasure coding, cryptography, and Byzantine agreement to provide available, highly durable storage in a peer-to-peer environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The goal of Operation Project X is to crack the 2048-bit RSA private encryption key Microsoft uses to sign Xbox media, by using distributed computing. This key could be used by Xbox owners to run homebrew code on their machines.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    Infranet is a system that attempts to circumvent web censorship by allowing clients to surreptitiously request sensitive content via cooperating Web servers distributed across the global Internet.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    The NEO Project uses the NEO-c (Network Exchange Operation for Charity) platform to participate in various computing challenges and projects, and donates any winnings to the charities specified by its users.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    mBuddy is a project with the initial goal of allowing users of mobile devices (Java, J2ME) the option to find others based on interests, diet & other factors. Objectives are to allow intelligent, conditional, secure exchange of contact info, A/V & more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next