Generate interest, access liquidity without selling, and execute trades seamlessly. All in one platform.
Geographic restrictions, eligibility, and terms apply.
Get started with Nexo.
AI-generated apps that pass security review
Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
JSRSA is a Javascript/PHP implementation of RSA algorithm which help you to simulate SSL-Like secure data transmission over the net as easy as possible !
A very powerful and secure encryption supporting multilevel algorithm hierarchy encryption(bit level),supports infinite length keys and equation creation utility(secondary key) for the utmost security.Support for multiple algorithms.All OS support(ja
Semeir is a Encryption algorithm, Capable of block encryption. It is written in pure C. It is platform independent, and is promising for Embedded systems. Intended as an alternate, yet secure data encryption cipher.
wlfXchanger is a point-to-point communication software which enable developers to cooperate in a secure way, using an asymmetric encryption system (Public Key Cryptography).
Secure Addressbook is based on the JavaScript implementation of Wheeler & Needham's Block TEA (Tiny Encryption Algorithm) by Chris Veness. It allows maintaining secure records even the on shared hosting server, as data en/decrypted at browser only.
Flash/PHP adaptation of the XTEA encryption algorithm. Allows encryption/decryption of sensitive data using 128-bit key. May be used for network data (HTTP) or offline for implementations like secure CD-ROM projects.
This the the kernel patches on USB storage device driver, the patches are used to handle data encryption/decryption on Lexar Media JD Secure/JD Lightning devices.
An elliptic curve based encryption system for secure and private communications at the network level. Public key encryption is used to automatically negotiate keys for AES encryption links between all nodes in use. Dev version uses orinoco drivers.
AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
Open Source file encryption, written to learn about cryptograpy, programming, etc. And hopefully come up with some new encryption techniques that might benefit the public.
sectar: a program that creates encrypted tape archives(tar files), using the AES algorithm Rijndael. Encryption exported under exemption TSU 740.13.
Was star, now sectar.
Easy Encryptor is a cross-platform encryption program designed to be of high secure standard, and easy to use even for users with no knowledge of cryptography algorithms.
Set of useful tools for payment service development
The BP-Tools set consist from applications supporting EFT testing, benchmarking and transaction service development. BP-Tools suite currently consists of following three components:
- BP-CCALC: Cryptographic Calculator
- BP-CardEdit: Thales P3 Input/Output file editor
- BP-EMVT: EMV Tool
- BP-HCMD: Thales HSM Commander