Showing 73 open source projects for "learning linux command line"

View related business solutions
  • Achieve perfect load balancing with a flexible Open Source Load Balancer Icon
    Achieve perfect load balancing with a flexible Open Source Load Balancer

    Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.

    Boost application security and continuity with SKUDONET ADC, our Open Source Load Balancer, that maximizes IT infrastructure flexibility. Additionally, save up to $470 K per incident with AI and SKUDONET solutions, further enhancing your organization’s risk management and cost-efficiency strategies.
  • Top-Rated Free CRM Software Icon
    Top-Rated Free CRM Software

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
  • 1
    transfer.sh

    transfer.sh

    Easy and fast file sharing from the command-line

    Easy and fast file sharing from the command-line. This code contains the server with everything you need to create your own instance. Transfer.sh currently supports the s3 (Amazon S3), gdrive (Google Drive), storj (Storj) providers, and local file system (local). For easy deployment, we've created a Docker container. For the usage with a AWS S3 Bucket, you just need to specify the following options, provider, aws-access-key, aws-secret-key, bucket, and s3-region. If you specify the s3-region...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 2
    xxHash

    xxHash

    Extremely fast non-cryptographic hash algorithm

    xxHash is an extremely fast non-cryptographic hash algorithm, working at RAM speed limit. It is proposed in four flavors (XXH32, XXH64, XXH3_64bits and XXH3_128bits). The latest variant, XXH3, offers improved performance across the board, especially on small data. It successfully completes the SMHasher test suite which evaluates collision, dispersion and randomness qualities of hash functions. Code is highly portable, and hashes are identical across all platforms (little / big endian)....
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    aws-encryption-sdk-cli

    aws-encryption-sdk-cli

    CLI wrapper around aws-encryption-sdk-python

    This command line tool can be used to encrypt and decrypt files and directories using the AWS Encryption SDK. If you have not already installed cryptography, you might need to install additional prerequisites as detailed in the cryptography installation guide for your operating system. Installation using a python virtual environment is recommended to avoid conflicts between system packages and user-installed packages. For the most part, the behavior of aws-encryption-cli in handling files...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    Keybase client

    Keybase client

    Keybase Go library, client, service, OS X, iOS, Android, Electron

    Keybase is secure messaging and file-sharing. We use public key cryptography to ensure your messages stay private. Even we can’t read your chats. Keybase works for families, roommates, clubs, and groups of friends, too. Keybase connects to public identities, too. You can connect with communities from Twitter, Reddit, and elsewhere. Don’t live dangerously when it comes to documents. Keybase can store your group’s photos, videos, and documents with end-to-end encryption. You can set a timer on...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Passwordless authentication enables a secure and frictionless experience for your users | Auth0 Icon
    Over two-thirds of people reuse passwords across sites, resulting in an increasingly insecure e-commerce ecosystem. Learn how passwordless can not only mitigate these issues but make the authentication experience delightful. Implement Auth0 in any application in just five minutes
  • 5

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    ...-then-MAC (EtM), GCM, OCB, ChaCha-Poly1305, Schwaemm. Streaming AEAD. MAC functions: HMAC, Poly1305. Key derivation functions: PBKDF2, scrypt, Argon2, HKDF. Includes sample command-line tools: - 'digest' - for calculating and verifying file checksum(s) using any of the supported hash algorithms (similar to md5sum or RHash). - 'cryptor' - for file encryption using Serpent-256 algorithm in AEAD mode. Check out the cppcrypto web site linked below for programming documentation.
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6

    SHA256-in-C

    SHA-256 Algorithm Implementation in C

    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    BIP39-XOR

    BIP39-XOR

    Encrypt or decrypt 12, 15, 18, 21 or 24 BIP39 codewords array ("seed")

    Encrypt or decrypt 12, 15, 18, 21 or 24 BIP39 codewords array (so-called "seed phrase") using exclusive OR (XOR)/Vernam cipher (a.k.a. One Time Pad). If not input by a user, an encryption key is automatically generated at random. Encryption with such a key preserves integrity of BIP-39 checksums of all keys (that's distinct while also compatible with SeedXOR implementation).
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8

    zhcrypt

    Tiny front end to hcrypt.exe from project page Hcrypto

    Zhcrypt is simply a tiny front end to hcrypt.exe, one of the utilities found within the Hcrypto suite found on Sourceforge. Hcrypt.exe is a Windows command line utility that will encrypt and decrypt files offering a variety of common and uncommon algorithms, including AES-128, AES-192, AES-256, Blowfish, CAST-128, CAST-256, DES, TripleDES, DESX, GOST, DEA, KASUMI, MARS, MISTY1, Noekeon, RC2, RC5, RC6, SAFER-SK, SEED, Serpent, Skipjack, Square, TEA, Twofish, and XTEA
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    safelock-cli

    safelock-cli

    ⚡Fast files encryption CLI built with GO

    Fast files encryption (AES-GCM) package and command-line tool built for speed with Go ⚡ Examples: - Encrypt a path with default options > safelock-cli encrypt path_to_encrypt encrypted_file_path - Decrypt a file > safelock-cli decrypt encrypted_file_path decrypted_files_path - If you want it to run silently with no interaction > echo "password123456" | safelock-cli encrypt path_to_encrypt encrypted_file_path --quiet
    Downloads: 1 This Week
    Last Update:
    See Project
  • Red Hat Ansible Automation Platform on Microsoft Azure Icon
    Red Hat Ansible Automation Platform on Microsoft Azure

    Red Hat Ansible Automation Platform on Azure allows you to quickly deploy, automate, and manage resources securely and at scale.

    Deploy Red Hat Ansible Automation Platform on Microsoft Azure for a strategic automation solution that allows you to orchestrate, govern and operationalize your Azure environment.
  • 10

    file encrypt

    File encryption and decryption utility

    The fcrypt and fdecrypt programs provide a comprehensive symmetric encryption tool kit for encrypting and decrypting files.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11

    DavUtils

    Powerful webdav client and sync tools with client-side AES encryption

    DavUtils is a collection of easy to use WebDAV client tools. The built-in client-side encryption allows you to encrypt and decrypt files on the fly with AES. Currently two command line tools are available: dav is a multipurpose WebDAV client that can be used like the standard unix tools ls, mkdir and rm. The other tool is dav-sync that can synchronize local files with a WebDAV server. It is very flexible and configurable and has advanced data safety features to prevent data loss...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    SM4Crypt

    SM4Crypt

    Command-line GM/T 0002-2012 SM4-GCM Encryption Tool

    This project is licensed under the ISC License. Copyright © 2020-2021 ALBANESE Research Lab Source code: https://github.com/pedroalbanese/sm4crypt Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Ascon

    Ascon

    Command-line Ascon v1.2 Encryption Tool written in Go

    Ascon is a new family of authenticated encryption algorithms, submitted to the CAESAR competition for authenticated ciphers. The Ascon family was designed to be lightweight and easy to implement, even with added countermeasures against side-channel attacks. This project is licensed under the ISC License. Copyright © 2020-2022 ALBANESE Research Lab Source code: https://github.com/pedroalbanese/ascon Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    badpi-cyphering

    symetric crypto based on PI calculation.

    encryption/decryption/key generation/CRC. You may use as a library (header *.hpp files)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    MATTA

    MATTA

    Morse Code Utilitiies to convert text messages to & from sound files.

    This is a commandline utility that converts a WAV sound file containing morse code to English text. Pre-built binaries run on OSX, MsWindows, & GNU/linux. It is written in Ada, so can be rebuilt on any platform with an Ada compiler. The input wav file must be monaural, with a 16-bit signed integer encoding, and a sample rate of 8000 Hz. Either sox or audacity can easily transform to this format. The wav file is expected to be international morse code, preferrably clean and properly spaced...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    HashSum is a .NET port from GNU's md5sum and sha1sum. It supports: hash algorithm selection between MD5 and SHA1 (more could be added later) and compatibility between HashSum and GNU's checksum file format
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    antigift

    antigift

    antigift is simple cross-platform, files & folders encryption tool

    antigift could be used for encryption files & folders on USB-flash or HDD partition. Works on Linux (including Android), Windows, Mac OS X, FreeBSD, DragonFly BSD and other on OSes. Do not required installation. Include WIPE tool for wiping free space and tool for recovery forgotten key. See documentation at http://sourceforge.net/p/antigift/wiki/Home/ antigift простой и кросс-платформенный инструмент для шифрования файлов и папок(с ccrypt в качестве основы) Подробности см. на страничке с...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    NtrUtil

    A command line interface for encryption and decryption using the NTRU

    A command line interface for encryption and decryption using the NTRU cryptography algorithm. "NTRU is a public key cryptosystem that is considered unbreakable even with quantum computers. Commonly used cryptosystems like RSA or ECC, on the other hand, will be broken if and when quantum computers become available."-NTRU
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Application based on asymmetric cryptography (ECC) allows encrypt and decrypt files and generates digital signatures. Currently implemented algorithms include ECDSA and ECIES.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20

    Generic Hash and HMAC Program

    52 Hash Functions In One Program, plus each with HMAC or KMAC

    Hash and HMAC command line tool for 52 hash algorithms like sha1 sha224 sha256 sha384 sha512 and variants, sha3 and shake, md2 md4 md5 md6, rmd128 rmd160 rmd256 rmd320, whirl gost lash160 lash256 lash384 lash512 tiger2 and RFC 2104 HMAC support. Starting with V1.3.0, SHA3 is fully supported: sha3-224, sha3-256, sha3-384, sha3-512, and extendable output functions (XOFs) shake128, shake256 V1.4.2 supports KMAC (a stronger alternative to HMAC) for the SHA3 family, Base64 output for shake*. shake...
    Leader badge
    Downloads: 6 This Week
    Last Update:
    See Project
  • 21
    FinalCrypt

    FinalCrypt

    FinalCrypt - Unbreakable One-Time Pad Encryption

    Why FinalCrypt? 1. Most people choose Disk-Encryption as it's easier to unlock a whole drive, but Big-Brother or Malware can then also read all your files. Only use File-Encryption! 2. Most software uses recently broken AES encryption. 3. Soon The Shor's algorithm will instantly break all assymmetric encryption with Quantum Computers. 4. FinalCrypt uses Symmetric One Time Pad Encryption, which is the most unbreakable encryption there is. 5. FinalCrypt is the only "One Time Pad",...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    XORCrypter

    XORCrypter

    Little program for encryption-decryption.

    Little program that uses the bit XOR operation for encryptioning and decryptioning, for now, just text files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    xorenc

    xorenc

    A "XOR-based" data encryption tool.

    It performs simple XOR operation on files from a given key or by generating data from a given short password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Simple Cipher Algorithm

    Simple Cipher Algorithm

    Java Encryption Utility.

    Very simple to use symmetric Java encryption utility. Please write a review. Email me with any questions or problems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    v1pad

    One-time-pad encryption using a virtual pad

    v1pad is a command-line tool that encrypts and decrypts files using one-time-pad encryption. v1pad uses a virtual pad, meaning that the one-time pad is generated dynamically based on user input instead of being stored in a file. The name v1pad is an abbreviation for Virtual One-Time Pad.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next