Showing 8 open source projects for "administrator - command shell"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 1
    Tomb

    Tomb

    the Crypto Undertaker

    Tomb is a minimalistic command-line tool for creating and managing encrypted “tombs,” which are files that act as mountable, private storage vaults. Under the hood it uses Linux dm-crypt with LUKS for strong, disk-level encryption, and separates the key material from the vault itself to improve security workflows. Keys can be protected with passphrases and even hidden via steganography inside innocuous files, giving you options for concealment and off-device storage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    BIP39-XOR

    BIP39-XOR

    Encrypt or decrypt 12, 15, 18, 21 or 24 BIP39 codewords array ("seed")

    Encrypt or decrypt 12, 15, 18, 21 or 24 BIP39 codewords array (so-called "seed phrase") using exclusive OR (XOR)/Vernam cipher (a.k.a. One Time Pad). If not input by a user, an encryption key is automatically generated at random. Encryption with such a key preserves integrity of BIP-39 checksums of all keys (that's distinct while also compatible with SeedXOR implementation).
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    antigift

    antigift

    antigift is simple cross-platform, files & folders encryption tool

    antigift could be used for encryption files & folders on USB-flash or HDD partition. Works on Linux (including Android), Windows, Mac OS X, FreeBSD, DragonFly BSD and other on OSes. Do not required installation. Include WIPE tool for wiping free space and tool for recovery forgotten key. See documentation at http://sourceforge.net/p/antigift/wiki/Home/ antigift простой и кросс-платформенный инструмент для шифрования файлов и папок(с ccrypt в качестве основы) Подробности см. на...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    SES Super-Encypherment Scrambler

    SES Super-Encypherment Scrambler

    SES brings back the uncrackable onetime pad, with a digital twist.

    SES brings back the uncrackable onetime pad, with a digital twist. It is well known that a random key of message-length is the only provably unbreakable cipher. SES uses cryptographic strength pseudo-random keys of message-length for its many encipherments, in addition to offering true one-time pad capability for the intrepid. SES is built on ISAAC, Bob Jenkins' unbroken CSPRNG, a fast and simple stream cipher placed in the Public Domain in 1996. SES now gives you the ability to...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 5
    The MOTET Cipher & SE Scrambler

    The MOTET Cipher & SE Scrambler

    A tiny, fast encryption tool in C

    MOTET is a tiny, fast super-encipherment application written in C, featuring the new CSPRNG/stream ciphers MOTE and BEDBUG in each of their three variants, as well as the "gold standard" among ciphers, ISAAC. MOTET brings multiple levels of encryption, including a ciphertext-hash, a Vigenere mixing function, a choice of Caesar MOD or Caesar MIX ciphering on the primary key-stream, plus a deeply scrambled "outer shell" as a final super-encryption stage. A unique nonce IV guarantees that...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    MLCrypt

    Simple, lightweight, standalone command-line single file encryption.

    Simple, lightweight, cross-platform (Windows / Linux / ARM6 Linux), cross-arch (x32 / x64), standalone command line file encryption program. GnuPG is probably the best application for cross-platform encryption. However, its usage on Windows PCs may be inconvenient (installation administrator rights; large executable size for perhaps just a one-time file decryption, complicated command-line switches for stronger encryption). NCrypt would fulfill this task, but does not operate on 64-bit Windows - MLCrypt was created because of this. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    OOS Software Distribution

    OOS Software Distribution

    Various programs accessed through a shell developed by a teenager.

    OOS, or Ozzy's Operating System, is simply a Shell that is currently under development. This "Shell" is not yet standalone; Meaning, it uses some platform-dependent code, and requires the Bash shell to work properly. It currently is only available for mac, but any of you can compile it for your Linux machines. Included with this shell are 3 nonbuiltin programs, which you can install during the installation of the "Operating System." OOS Mimics a UNIX Shell in every way I can think of, and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    ENIGMA 2000

    ENIGMA 2000 is a reliable file encrypter for DOS shell

    ENIGMA 2000 is a symmetric cryptographic algorithm developed in C++ for Windows, to encrypt any file. It is not optimized for speed processing but it is extremly reliable. Tests state that a huge input file just with zeros, will return an output file whose frequency analysis is white noise. It uses six phases to encrypt any file and the phases sequence depends on the password. On phase 5, it uses the Rubik's cube paradigm to encrypt the data. It's extremly reliable and the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB