Showing 65 open source projects for "sha3-256"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 1
    Cryptomator

    Cryptomator

    Multi-platform transparent client-side encryption for your cloud files

    Cryptomator is a free and open source project that offers multi-platform, transparent client side encryption of your files in the cloud. It works with just about any cloud storage service; is totally transparent so you can work with your files how you normally would; and secure with a 256-bit key length AES encryption. It’s also simple and easy to use with no need for different accounts, key management, cloud access grants or cipher configurations.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 2
    Coffee GB

    Coffee GB

    Gameboy emulator in Java 8

    ... possible to run some code on it. I had neither the cartridge nor the GPU emulation yet, so even the simplest game wouldn’t be an option. However, when the original Gameboy starts, it executes a simple 256-bytes program, a kind of firmware displaying the Nintendo logo and self-testing the system. That was exactly the thing I was looking for - after just 3 days I had an application running the Gameboy code!
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    AES-256 CBC File Encrypter

    AES-256 CBC File Encrypter

    Open source file encryption software

    An open-source software that enables you to encrypt your files using the AES encryption algorithm. GitHub page can be found at https://github.com/Northstrix/AES-256_CBC_File_Encrypter Made with the help of Perplexity If you find this project convenient, please leave a review to help others learn about it. Similar projects: https://sourceforge.net/projects/sta-file-encrypter/ https://sourceforge.net/projects/aes256-cbc-file-encrypter/
    Downloads: 4 This Week
    Last Update:
    See Project
  • 4
    FrostWire

    FrostWire

    Search, Download, Play, Share on Bittorrent and the cloud

    ...) ● Android 7.0 or later 256 MB of RAM (512 MB Recommended) An active internet connection
    Leader badge
    Downloads: 659 This Week
    Last Update:
    See Project
  • Top-Rated Free CRM Software Icon
    Top-Rated Free CRM Software

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
    Get started free
  • 5
    mendelson AS2

    mendelson AS2

    Implementation of the EDIINT AS2 protocol (RFC 4130)

    mendelson AS2 is a JAVA-based open source EDIINT AS2 solution. Logging- and configuration GUI (SWING), async & sync MDN, signatures, encryption, SSL, web interface, pluggable into any servlet container, TP manager, compression, optional profiles: MA, FN
    Leader badge
    Downloads: 157 This Week
    Last Update:
    See Project
  • 6
    mendelson OFTP2

    mendelson OFTP2

    Implementation of the OFTP2 protocol (RFC 5024)

    The mendelson OFTP2 is a JAVA-based open source OFTP2 solution. It contains a logging- and configuration GUI (SWING) and supports encryption, digital signatures, message compression, SSL, certificate exchange, message routing, mail notification
    Leader badge
    Downloads: 77 This Week
    Last Update:
    See Project
  • 7
    jDiskMark

    jDiskMark

    Java Disk Benchmark Utility

    ...://sourceforge.net/projects/jdiskmark/files/jDiskMark-0.5.1.msi/download Verify your download with SHA-256 Hash: D8EE4181D42B0CEF4806BF903EE9EF44722DB54C6C7F9EEBAC8BE119BB7AF753 Instructions to verify file SHA-256 signature: https://sourceforge.net/p/jdiskmark/wiki/%20Verifying%20SHA-256%20Hash%20on%20Windows%20with%20PowerShell/ ZIP releases: * v0.5-v0.5.1 requires Java 21 * v0.1-v0.4 requires Java 8 NOTE: run as administrator or w sudo to automatically drop disk cache
    Downloads: 20 This Week
    Last Update:
    See Project
  • 8
    Kisekae UltraKiss

    Kisekae UltraKiss

    Kisekae UltraKiss is a full featured integrated development environmen

    UltraKiss is a computer program that implements the Kisekae Set system, KiSS, a Japanese graphics system originally developed to facilitate costume changes on virtual dolls. UltraKiss was developed to help artists build their KiSS sets. It is a full featured viewer for all KiSS dolls, games, and visual applications. It is also a complete graphical development environment for creating KiSS applications. It fully implements the FKiSS event driven programming language up to and including...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    fileaxy

    fileaxy

    Fileaxy does file sync, de-duplication, image matching & bulk preview

    Fileaxy is a file de-duplication, organization, synchronization, and bulk previewing tool which utilizes a new user interface for local file management. Using content hashing or machine vision algorithms, Fileaxy can detect identical files as well as similar names, images, videos, or fonts and correlate those to others based on naming conventions. Optionally integrates with ImageMagick, GraphicsMagick, FFmpeg, and Mac Sips file decoding with a simple button click. Fileaxy opens NO network...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    FileHashler

    FileHashler

    cross-platform (Java) file encryption and archiving tool

    Java based API (library) and console utility for cross-platform file and directory encryption and archiving. Encrypts single files up to 9.2 EB length. Directories can be encrypted as sets of single files in a single action. Uses Twofish (CBC) and SHA-256. Security level is strong and benefits from the PWS3 (Password Safe) encrypted file format. The level can be lowered to 128-bit key-length (normally 256).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    KeyHolder password manager

    KeyHolder password manager

    Store your passwords in an offline encrypted file!

    Need a JDK to run, download it here: https://www.oracle.com/java/technologies/downloads/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The program allows you to generate the hashes with the chosen algorithm (MD2, MD5, SHA-1, SHA-256, SHA-384 and SHA-512) of a single file or an entire folder (you can choose to scan the folder recursively or not recursively). It supports drag and drop of files and folders. The hash can be exported to text files. Compiled with openjdk 8. Usage: param 1: exclude symbolic links (0 or 1) [mandatory], param 2: exclude hidden files (0 or 1) [mandatory], param 3: folders to exclude [optional...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Halimede

    Halimede

    Halimede Certificate Authority

    Halimede is a simple to use Certificate Authority. It supports multiple CA (Certificate Authorities) from a single interface, with each CA is stored within it's own datastore instance. Halimede supports a large range of public key ciphers, including RSA, DSA, ECDSA (NIST/SEC/ANSI X9.62/Brainpool Curves), EdDSA (ED25519/ED448), GOST R34.10, DSTU 4145-2002 and numerous Post-Quantum Ciphers including Rainbow, SPHINCS-256, XMSS/XMSS-MT and qTESLA for X509 Certificate generation. Halimede...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Novel Insight Inner Circle

    Novel Insight Inner Circle

    Graphical message and file encryption tool

    Novel Insight Inner Circle is a message and file encryption tool for Windows. The software is developed in Java and requires 64bit Java JRE. The encryption uses AES-256 twice so it is harder to crack than the industry standard pure AES 256bit implementation (theoretical key size is 512 bit). The software writes encrypted data in ASCII text format which can be cut'n'pasted to messaging apps or to emails and back to Inner Circle when decrypting data. IMPORTANT: The software requires new...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Crispy Synced Notes

    Crispy Synced Notes

    A note taking program with WebDAV sync

    An note taking program with WebDAV sync capabilities. It works on a local (and WebDAV) directory and shows the items (text/image/binary) in a tree view. Any changes are reflected in the file system directly. Features: - group notes and images in a tree structure (using folders) - can work on any directory on your machine - technically works like a file browser with inline text editing - synchronizes with any WebDAV server (optionally using SSL/TLS) - allows one-way and two-way...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 16
    PCSecrets

    PCSecrets

    Encrypt and manage secret text data

    PCSecrets is a PC application that holds secret text data - protected by a master password and strong encryption. Use it as a password manager or just somewhere to hold any text data securely in one place. It can hold a second, hidden set of secrets that is undetectable and plausibly deniable. The program is also a PC counterpart of the Secrets for Android app. It uses the same data structure and provides synchronization that allows easy transfer of secrets between the two. For those who...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    JNIZ music notation audio to midi

    JNIZ music notation audio to midi

    music composition and notation software, audio to midi converter

    Jniz is a piece of software designed for musicians as a support tool to the musical composition. It allows you to build and to harmonize several voices according to the rules of classical harmony. Sound/audio-to-Midi converter: real-time conversion of any monophonic sound (voice, instrument etc.) into notes / tones. Jniz is a free proprietary piece of software. You do not have the right to sell, distribute Jniz or use its sources under penalty of law. You will infringes on the Jniz staff...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    AES Everywhere

    AES Everywhere

    Cross Language AES 256 Encryption Library

    AES Everywhere is Cross Language Encryption Library that provides the ability to encrypt and decrypt data using a single algorithm in different programming languages and on different platforms. This is an implementation of the AES algorithm, specifically CBC mode, with 256-bit key length and PKCS7 padding. It implements OpenSSL-compatible cryptography with randomly generated salt.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    SSHTOOLS

    SSHTOOLS

    Java SSH API

    This project now hosts the third-generation of Java SSH API, Maverick Synergy. This API builds on the Maverick Legacy commercial APIs and delivers a new API in a unified client/server framework. This API is available to the community under the LGPL open source license. This update includes ed25519 support, support for the new OpenSSH private key file format and stronger key exchange algorithms. The project continues to host both the original API and legacy applications created around...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 20
    IP-Chat

    IP-Chat

    UDP based desktop chatting app which supports AES-256 bit encryption.

    Simple Encrypted chat application built with Java. It uses AES-256 bit block cipher algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    tournament

    tournament

    Gestion de tournoi / Tournament management

    Tournament est une gestion de tournois écrit en java/SWT. Le but est de proposer une interface simple de gestion de poules et/ou d'éliminations. Tournament is a tournament management written in Java / SWT. The aim is to provide a simple interface for managing round robins and / or eliminations. Installation/Install https://sourceforge.net/p/swttournament/installation/Installation/ Si un graphiste passe sur cette page, un petit coup de main pour mon splash screen. Merci !! need...
    Downloads: 15 This Week
    Last Update:
    See Project
  • 22
    GMR Digital Signature System

    GMR Digital Signature System

    GMR digital signature system

    Private keys are insecure in cloud server infrastructure. Chrome: right click - translate into English! https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2018/Spectre-NG_18052018.html System that creates key pairs and digital signatures and is based on the presumed difficulty of prime factorization. Please install on a virtual machine with Linux! Windows is not supported! German: System, das Schlüsselpaare und digitale Signaturen erstellt, und auf der vermuteten...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    CrococryptFile

    CrococryptFile

    An encryption tool for creating file archives

    ... file dump. =Crypto Suites= For a full list of and details about supported crypto suites, please visit the CrococryptFile Homepage. Examples: - Password-based encryption (following PBKDF2) with AES-256, Twofish, Serpent, ... - Public key encryption using GPG/OpenPGP, Windows Keystore/CAPI with RSA/X.509 certificates - Cloaked (headerless) Password-based Encryption (AES-Twofish-256 cascaded) - ...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 24

    Binary Stream Editor

    A stream editor in java that can handle text/binary formats

    ... by default, has 256 single-byte characters. Data in the buffer is available as a charsequence to the commands for stuff like regex matching etc. The output can be redirected to a file, and an output encoding can be specified.The commands can also store/retrive arbitrary data for later use in a map. Evaluation of expressions in commands is done using Apache Jexl, and custom functions can also be used. Sample java usage and sample command line usage examples are included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    JBrute

    JBrute

    Open Source Security tool to audit hashed passwords.

    JBrute is an open source tool written in Java to audit security and stronghold of stored password for several open source and commercial apps. It is focused to provide multi-platform support and flexible parameters to cover most of the possible password-auditing scenarios. Java Runtime version 1.7 or higher is required for running JBrute. Supported algorithms: MD5 MD4 SHA-256 SHA-512 MD5CRYPT SHA1 ORACLE-10G ORACLE-11G NTLM LM MSSQL-2000 MSSQL-2005 MSSQL-2012 MYSQL-322 MYSQL...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next