Showing 29 open source projects for "gnu linux"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 8 Monitoring Tools in One APM. Install in 5 Minutes. Icon
    8 Monitoring Tools in One APM. Install in 5 Minutes.

    Errors, performance, logs, uptime, hosts, anomalies, dashboards, and check-ins. One interface.

    AppSignal works out of the box for Ruby, Elixir, Node.js, Python, and more. 30-day free trial, no credit card required.
    Start Free
  • 1
    shadowsocks-libev

    shadowsocks-libev

    Bug-fix-only libev port of shadowsocks

    Shadowsocks-libev is a lightweight secured SOCKS5 proxy for embedded devices and low-end boxes. Shadowsocks-libev is written in pure C and depends on libev. It's designed to be a lightweight implementation of shadowsocks protocol, in order to keep the resource usage as low as possible. Snap is the recommended way to install the latest binaries. You can build shadowsocks-libev and all its dependencies by script. The latest shadowsocks-libev has provided a redir mode. You can configure your...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2

    Largest Generic Hash and HMAC Program

    57 Hash Functions In One Program, plus each with HMAC or KMAC

    FEHASHMAC is the largest collection of publicly known hash algorithms integrated into a command-line utility. FEHASHMAC contains a set of known test vectors and results for each algorithm such that the correct implementation for each hardware platform and compiler version can directly be verified. Currently 57 hash algorithms like sha1 sha224 sha256 sha384 sha512 and variants, sha3 and shake, all SHA3 finalists and blake3, md2 md4 md5 md6, rmd128 rmd160 rmd256 rmd320, whirl gost lash160...
    Leader badge
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    haveged is a daemon that feeds entropy into the linux /dev/random pool using a random number generator based upon the HArdware Volatile Entropy Gathering and Expansion algorithm.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4

    NCrypted

    NCrypted - simple file encryption software with GPU support

    NCrypted is a simple file encryption software. It is implemented on top of AES 128-bit algorithm. This software was designed to be as simple as possible, so you won't find any fancy, flashy gui elements or complicated advanced options. You can also use it directly from command line. NCrypted can automatically detect and take advantage of your NVidia graphics card to speed up the file processing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5

    xxteac - XXTEA Encrypter/Decrypter

    xxteac - XXTEA Encrypter/Decrypter

    This xxteac program utilizes the "Corrected Block TEA" encryption/decryption algorithm by Roger Needham and David Wheeler. The original algorithm has been slightly modified to allow arbitary length passwords / password files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Use of Michael Rabin's Information Dispersal Algorithm to provide secure, dispersed storage in a networked environment. For full download, please get both Math-FastGF2 and Crypt-IDA releases under the files link. See project wiki for more information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Secure Hash Algorithm variant of the nist maintained Secure Hash Algorithm. this is a 1024 bit digest. Comments suggestions always welcome. Rick Removed old downloads as they are long outdated. The update is the last version I worked on. Algorithm is based on the SHA2 digest. I may work on an updated version for c++11
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Alkindus is an automated solver for short monoalphabetic substitution ciphers without word divisions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    openSMS4 was created by tao.tang316 and implemented in C, which is an open source implementation of the SMS4 encryption algorithm (including simple checking codes).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Secure File Transfer for Windows with Cerberus by Redwood Icon
    Secure File Transfer for Windows with Cerberus by Redwood

    Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.

    Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
    Try for Free
  • 10
    Ramos - McCain - RSA. Cryptographic tool based on the widely-known RSA public-key algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    IKEv2
    Encrypted Message Exchange by using Diffie-Hellman key exchange algorithm and Advanced Encryption Standard(AES) encryption algorithm with Cipher-block chaining(CBC) mode using User Datagram Protocol(UDP)port server-client application in C, Ansi-style
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Rinecrypt uses the Gladman implentation of the AES algorithm Rijndael and a SHA256 hash among other things, to encrypt/decrypt a file with a user supplied passsword.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The IEEE 1619 Committee open-source reference implementations of encryption algorithms, plus testing and certification suites, for each encryption algorithm included in the standard.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    This its a simple project of the RSA algorithm. The purpose of this project isn't to develop an impressive program, it's an easy understand of the algorithm and the C programing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    The PowerCiph Data Encryption Algorithm is a versatile, yet simplistic, encryption algorithm/protocol. The ultimate goal of the algorithm is simplicity, compactness, and a lack of prerequisites.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Brute is a brute force hash cracker, it allows the user to specify how many threads he want running simultaneously. It is fast, and modular, all the hash algorithm dependent code lies in a module (a shared library). Modules available: MD5; SHA256; SHA512
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Semeir is a Encryption algorithm, Capable of block encryption. It is written in pure C. It is platform independent, and is promising for Embedded systems. Intended as an alternate, yet secure data encryption cipher.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    The Mav.Crypt tool will be upgraded to many different encryption methods. At the Moment, the only method is ROT13, but we are developing some other technics and a new Algorithm. More Infos shortly at the Project Web Page.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Pseudo Random Number Generator (PRNG) frontend using libtomcrypt. It simply writes pseudorandom data (using sober-128, fortuna, yarrow or rc4 algorithm) on standard output. The output may be encoded to base64, base85 or hex or just left binary.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Figaro's Password Manager (FPM) is a GNOME application that allows you to securely store & categorize your passwords, which are encrypted using the blowfish algorithm. It can launch applications using the host names, user names, and passwords you supply.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 21
    Real-Time Proactive Secret Sharing Library for RTAI is an implementation of the Shamir's secret sharing scheme and Herzberg's proactive secret sharing algorithm. The library uses a port of GNU GMP in order to make multiple precision arithmetic operatio
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Convolutional Hashing Algorithm. Provably secure hashing algorithm based on worst case assumptions on cyclic-lattices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    CryptoServer is the daemon for handling Sign-Verify, Encryption-Dencryption, Envelop-Openenvelop based on OpenSSL including the SEED symmetric algorithm (Korean Standard Symmetric Algorithm). It's interface is just tcp/ip socket and very easy to handle
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    This is an experimental program that encrypt/decrypt/divide/join files. This program uses a new algorithm made by me, this algorithm is experimental and I working on it, every day this algoritm will be better.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    A simple but fully-featured implementation of the simple Caesar Cipher encryption algorithm, specifically 'rot13' - Caesar with a factor of 13. Supports file and tty input/output, internationalisation, and also includes a shared library.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB