25 projects for "shadowsocks-windows" with 2 filters applied:

  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • Secure File Transfer for Windows with Cerberus by Redwood Icon
    Secure File Transfer for Windows with Cerberus by Redwood

    Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.

    Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
    Try for Free
  • 1
    antigift

    antigift

    antigift is simple cross-platform, files & folders encryption tool

    antigift could be used for encryption files & folders on USB-flash or HDD partition. Works on Linux (including Android), Windows, Mac OS X, FreeBSD, DragonFly BSD and other on OSes. Do not required installation. Include WIPE tool for wiping free space and tool for recovery forgotten key. See documentation at http://sourceforge.net/p/antigift/wiki/Home/ antigift простой и кросс-платформенный инструмент для шифрования файлов и папок(с ccrypt в качестве основы) Подробности см. на страничке с русской документацией http://sourceforge.net/p/antigift/wiki/rus/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    cppcrypto provides optimized implementations of cryptographic primitives. Hash functions: BLAKE, BLAKE2, Echo, Esch, Groestl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, SHAKE, Skein, SM3, Streebog, Whirlpool. Block ciphers: Anubis, Aria, Camellia, CAST-256, Kalyna, Kuznyechik, Mars, Serpent, Simon, SM4, Speck, Threefish, Twofish, and Rijndael (AES) with all block/key sizes. Stream ciphers: HC-128, HC-256, Salsa20, XSalsa20, ChaCha, XChaCha. Encryption modes: CBC, CTR. AEAD modes:...
    Leader badge
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    Advanced Onion Router
    Advanced Onion Router is a portable client for the OR network and is intended to be an improved alternative for Tor+Vidalia+Privoxy bundle for Windows users. Some of the improvements include UNICODE paths, support for HTTP and HTTPS proxy protocols on the same Socks4/Socks5 port with HTTP header filtering that generates fake identity-dependent headers every time the identity is changed (proxy chains are also supported), support for NTLM proxies, a User Interface that makes Tor's options and actions more accessible, local banlist for forbidden addresses, private identity isolation, a point-and-click process interceptor that can redirect connections from programs that don't support proxies, also giving them fake information about the local system and support for .onion addresses. ...
    Downloads: 138 This Week
    Last Update:
    See Project
  • 4

    GoodCrypto private server

    Secure mail + Tor gateway

    Protect your company's email and browsing with your GoodCrypto private server. * Protects email metadata and resists traffic analysis * Automatic encryption, decryption, and key management * All private keys stay on *your* server * Users don't change their email or browser software * Blocks web malware * Runs on your private server * Completely decentralized
    Downloads: 2 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 5
    MicroZip

    MicroZip

    Create,extract and encrypt ZIP,GZIP,TAR,BZIP2,TAZ files on Java mobile

    MicroZip is a powerful file compression and encryption utility for mobile phones which allows you to create and extract compressed archives in multiple formats and encrypt sensitive information with powerful AES-256 encryption. MicroZip can create and extract ZIP,TAR,TGZ,TBZ2 archives and extract many other formats as JAR,GZ,BZ2,TBZ,WAR,BZIP2,GZIP,Z,TAZ,CBZ etc. MicroZip allows you to extract selected files without extracting the whole ZIP archive. MicroZip also supports encrypted ZIP...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 6

    RuSimpleCrypt

    A tool to encrypt files in Russian.

    ...Only for the Windows operating system. Integration with Explorer context menu does not. AES encryption of 256 bits. based on sourceforge.net/projects/oss-simplecrypt/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Word Cipher - Encryption/Decryption tool

    Word Cipher - Encryption/Decryption tool

    Encryption/Decryption tool for words/hash/digits/encoded text

    Word Cipher - KRIEG Technologies Developed by: Northumber, KRIEG Technologies This application is developed for encode/decode words and translate them into commons encryption languages but also ancient ciphering language.You can encrypt/decrypt words or text or digits into: ----- Text Ciphering ----- Albam Latin (Temurah) Atbash Latin (Temurah) Avgad Latin (Temurah) Caesar Cipher Flipped Text ----- Text Rotation ----- ROT5 (Digits) ROT13 (Text) ROT18 (Text &...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    BEDBUG CSPRNG & Stream Cipher

    BEDBUG CSPRNG & Stream Cipher

    A family of FLEA-inspired CSPRNGs and Stream Ciphers

    BEDBUG is a small, fast, cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It exhibits uniform distribution, mixes rapidly (with worst-case avalanche better than 16-bits), has no detected bias, and comes in three variants: BEDBUG128, with an internal state array of 128+3 32-bit words; BEDBUG256, with an internal state of 256+3 words; and BEDBUG512 with a 512+3-word state. The former permit seeding with a key of up to 4096 or 8192 bits, the latter with a...
    Downloads: 13 This Week
    Last Update:
    See Project
  • 9
    The MOTET Cipher & SE Scrambler

    The MOTET Cipher & SE Scrambler

    A tiny, fast encryption tool in C

    MOTET is a tiny, fast super-encipherment application written in C, featuring the new CSPRNG/stream ciphers MOTE and BEDBUG in each of their three variants, as well as the "gold standard" among ciphers, ISAAC. MOTET brings multiple levels of encryption, including a ciphertext-hash, a Vigenere mixing function, a choice of Caesar MOD or Caesar MIX ciphering on the primary key-stream, plus a deeply scrambled "outer shell" as a final super-encryption stage. A unique nonce IV guarantees that...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    A pronounceable password generator plugin for KeePass. NOTE: This project has been discontinued. It hasn't been worth it to maintain the project for a while now, so no more updates will be made to the plugin. The algorithm this plugin uses is based off FIPS-181 which was withdrawn by NIST a while back. The proliferation of password managers that seamlessly run on multiple platforms (some of which are free) has also removed almost all advantages of using randomly generated pronounceable...
    Downloads: 17 This Week
    Last Update:
    See Project
  • 11
    Mystery

    Mystery

    software cryptographic data protection

    Software tool for cryptographic protection of data is used to encrypt and decrypt files. Signature and check for dokumemntov and text files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Bigram Table Generator

    Bigram Table Generator

    A program to generate random reciprocal bigram tables

    A command-line program to encrypt/decrypt a message using a random reciprocal bigram table and write a bigram table to a text file. Executing the program without any command-line arguments starts bigram in message encryption/decryption mode. The program prompts for a password or passphrase and a message to encrypt/ decrypt. After the message is entered the ciphertext is displayed. Executing the program with command-line arguments causes bigram to generate a random bigram table to...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    Azrar

    Azrar

    Encryption addressing long-term data secrecy

    Most of today's cryptographic standards will be broken with tomorrow's computational power. Azrar is a user-friendly tool for the encryption/decryption of single files - preferably compressed archives - addressing long-term data secrecy. Thus, Azrar provides the possibility to use webspace for secure data transfer between two communication/transfer partners (encryption only, network transfer not yet included in current version). Data in encrypted files are secret/private indefinitely. To...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    FileManESI

    FileManESI

    File manager software

    FileMan is a file manager software that allow users to apply multiple functions to all kinds of files such as : AES encryption/decryption, zip archiving, file spliting/merging , file comparison.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    PasswordBox

    PasswordBox

    A console-mode program that will keep all your passwords safe

    ...This program is written by Mateusz Viste, and uses the AES implementation of Chris Brown to handle all encryption/decryption processes. PasswordBox is available for the following operating systems: DOS, Windows, Linux. Remember, that if you forget your master password, you will have no way to recover the database content. Usage: pbox [--help] [--dump] --help displays a help screen (any unsupported parameter will display it, too) --dump lists all the data of your encrypted database onscreen
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16

    DAL4j

    Data Access Layer 4 Java

    Welcome to Data Access Layer for Java (DAL4j) a set of command line tools and framework used to reverse engineer a MySQL or SQLServer database schema into a set of JPA Entity Beans. DAL4j can be useful for scenarios where there is an existing database schema but a technology other that JPA is used to interact with the database. DAL4j can provide an easy way to migrate your code base from other technologies such as JDBC or Hibernate to JPA. The beans generated can be 1 or two types:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    KonEncriptación

    KonEncriptación

    Encryption tool for Dropbox

    It's a new, free distribution encryption software that provides Dropbox users with additional security for their sensitive information. Encrypt and securely share your files with other KonEncriptación users via Dropbox. KonEncriptación is fully integrated with Dropbox and is easy to use, thus allowing you to exploit all its features from the start.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    Command-line strong encryption tools including: triple cascaded encryptor, multiple hash calculator and multiple block cipher encryptor. Supports AES, Serpent, Twofish, SHA-512, RIPEMD-160, MD5 and other algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Encrypting Safe
    This is free Java desktop application to keep your note in safe from others using the Encrypting Decrypting symmetric key algorithm, it's easy to transfer your note form source to another in confidential manner.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    A very powerful and secure encryption supporting multilevel algorithm hierarchy encryption(bit level),supports infinite length keys and equation creation utility(secondary key) for the utmost security.Support for multiple algorithms.All OS support(ja
    Downloads: 2 This Week
    Last Update:
    See Project
  • 21
    mp3stegz is an application that apply steganographic (steganography) algorithm in mp3 files. mp3stegz will maintain original mp3 file's size and sound quality. The hidden message is compressed(zlib) and encrypted(Rijndael).
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project
  • 22
    An original bruteforce-based encryption/decryption system. BBE was originally conceived to chat with encrypted text on IRC. mIRC and X-Chat support BBE via script addon. BBE can also encrypt MIME encoded files. Blowfish encryption is currently supported.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    1. project name eXPimenttk (e-SecureOffice) 2.Language Java (req. - at least j2re) 3.target platform - Cross-platform software 4.problem we want to sole- Encryption, Decryption software, File eraser, Messenger, Mailer,Remailer,FireWall 5 target - user
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    A cross platform implementation of ECDSA (elliptic curve digital signature algorithm) interface to the aSuretee Token.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    BP-Tools

    BP-Tools

    Set of useful tools for payment service development

    The BP-Tools set consist from applications supporting EFT testing, benchmarking and transaction service development. BP-Tools suite currently consists of following three components: - BP-CCALC: Cryptographic Calculator - BP-CardEdit: Thales P3 Input/Output file editor - BP-EMVT: EMV Tool - BP-HCMD: Thales HSM Commander
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB