Showing 13 open source projects for "cryptography"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Smart Business Texting that Generates Pipeline Icon
    Smart Business Texting that Generates Pipeline

    Create and convert pipeline at scale through industry leading SMS campaigns, automation, and conversation management.

    TextUs is the leading text messaging service provider for businesses that want to engage in real-time conversations with customers, leads, employees and candidates. Text messaging is one of the most engaging ways to communicate with customers, candidates, employees and leads. 1:1, two-way messaging encourages response and engagement. Text messages help teams get 10x the response rate over phone and email. Business text messaging has become a more viable form of communication than traditional mediums. The TextUs user experience is intentionally designed to resemble the familiar SMS inbox, allowing users to easily manage contacts, conversations, and campaigns. Work right from your desktop with the TextUs web app or use the Chrome extension alongside your ATS or CRM. Leverage the mobile app for on-the-go sending and responding.
    Learn More
  • 1

    CyberCrypt

    .NET Library for Encryption/Decryption

    CyberCrypt: ----------------- .NET Library for Encryption/Decryption Usage: ---------- Encrypting file using AES (256 bits): CyberCrypt._AES256.EncryptFile("C:\example.txt", "YourPassword") Decrypting file using AES (256 bits): CyberCrypt._AES256.DecryptFile("C:\example.txt", "YourPassword") Hashing string using SHA512: CyberCrypt._SHA.SHA512Hash("A string that will be converted to SHA512 hash.")
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    NiseCrypt

    NiseCrypt is free encryption software

    NiseCrypt is a free encryption software, that anyone can use for any purpose, NiseCrypt supports 256bit AES encryption
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Simple File Encryptor - for Windows

    Simple File Encryptor - for Windows

    Encrypt files and folders or create your own encrypted text files.

    Simple File Encryptor (SFE) is a small, easy to use file and folder encryption app for windows. SFE provides 256bit AES password protected secure encryption for files. - Encrypting/Decrypting Text - Create and export secure encrypted text files. - Encrypting/Decrypting files or folders - Select any file type or folder to encrypt. Opt to compress before encryption and also to remove the unencrypted file after. - New Encrypt Box - A permanent secure folder on your hard drive. Drag...
    Leader badge
    Downloads: 8 This Week
    Last Update:
    See Project
  • 4
    AESEncryptor is a fast and simple utility to protect your files with the Advanced Encryptation Standard algorithm. It is safer than zip or rar files because a simple force-attack can reveal their password. A force-attack to an AES encriptation could delay millions of years. There are available the source code of the GUI, a CaptionProgressBar and the RijndaelCryptorProvider, the core of the application which can start a encriptation process in a simple code line. New Version released...
    Downloads: 0 This Week
    Last Update:
    See Project
  • eProcurement Software Icon
    eProcurement Software

    Enterprises and companies seeking a solution to manage all their procurement operations and processes

    eBuyerAssist by Eyvo is a cloud-based procurement solution designed for businesses of all sizes and industries. Fully modular and scalable, it streamlines the entire procurement lifecycle—from requisition to fulfillment. The platform includes powerful tools for strategic sourcing, supplier management, warehouse operations, and contract oversight. Additional modules cover purchase orders, approval workflows, inventory and asset management, customer orders, budget control, cost accounting, invoice matching, vendor credit checks, and risk analysis. eBuyerAssist centralizes all procurement functions into a single, easy-to-use system—improving visibility, control, and efficiency across your organization. Whether you're aiming to reduce costs, enhance compliance, or align procurement with broader business goals, eBuyerAssist helps you get there faster, smarter, and with measurable results.
    Learn More
  • 5
    mFileBinder

    mFileBinder

    An advanced file binder which binds multiple file of any type

    mFileBinder is an advanced file binder which binds multiple file of any type and merges into a single executable file. mFileBinder uses rijndael encryption algorithm to encrypt the file which can make Virus / Trojans Fully Undetectable. Set the drop location of all files and set the execution mode(Background,Foreground) of each file. Predefined set of ICON Package is included set your desired icon. Silently extracts and sequentially execute files.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 6

    Cryptkeeper

    Cryptkeeper Secuirty tool

    In this program you will find tools like : Rawdata tool , file encryption , text encryption , program updater , program protecter , password manager , program settings , defult settings , settings viewer and the last is the file hashing. the file hashing you can use 6 hashing types for the file encryption 1 since i ran out of time for it , and the text encryption has 17 different types 12 encrypt and 5 hashing types. some uses encryption keys and some dont. there are AES , 4DES...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 7
    A small encryption / decryption application that we are giving away free of charge. Version 1.0.00 - RSA only at the moment. But later versions will have a plug-in system for adding more algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Visual Basic 2010 Express Text Encryption Software.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Secure P2P Instant Messenger running on .NET Framework 2.0. Uses server to store user information (user name, password, email address, friends list, log in state, IP address) in encrypted form. Uses custom designed symmetric encryption algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Lightspeed golf course management software Icon
    Lightspeed golf course management software

    Lightspeed Golf is all-in-one golf course management software to help courses simplify operations, drive revenue and deliver amazing golf experiences.

    From tee sheet management, point of sale and payment processing to marketing, automation, reporting and more—Lightspeed is built for the pro shop, restaurant, back office, beverage cart and beyond.
    Learn More
  • 10
    Recolition is a simple file encryption program which uses AES as it's algorithm. It will encrypt exisiting files to the .encrypt file extension and then decrypt them back to thier original state.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    BcryptFE is a graphical frontend for controlling the bcrypt win32 command line utility. Written in vb.net 2008 and designed to allow easier encryption/decryption of multiple files and directories. Filenames can be hidden in an index file to stay private.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Bildsoft releases under GPL License the Blackhorse Algorythm, used by all its software. Blackhorse provides high-level encryption for any file. Blackhorse is very quick to encrypt/decrypt data, thanks to a particular technology.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    whbEncrypter is a very simple variable encryption program to encrypt and decrypt a file based on a passkey provided based on the user. It uses a simple encryption algorithm that I wrote for a school project. The passkey can also be the contents of a file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next