Showing 383 open source projects for "encrypt"

View related business solutions
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    NaNaNote

    NaNaNote

    A free encryption notepad program,password manager and files transfer.

    NaNaNote is a free notepad program that encrypts note data with high security grade encryption. NaNaNote uses OpenSSL to encrypt data and store it in a Sqlite database file. Even though the text is the same, each stored time, the encrypted text will be unique. NaNaNote can export to a PDF or HTML file, which allows you to share content with others easily. With http extension system, you can send files by using NaNaNote (File Transfer Mode) to the other computer by drag and drop ,or send files to computer via web brower in phone. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    Encrypted Password Database

    Enterprise level password management and automation

    The Encrypted Password Database is an enterprise level application for storing authentication information and automating application password management.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    File Encoder Application

    File Encoder Application

    Java application for encryption

    Java application for encryption with a GUI. It is based in the XOR symetric encryption combined with a pseudorandom resorting of the bytes. Strenth and time to encrypt/decyrpt per MB adapted to size of input file. Multithread. zoom Multilanguage Dark mode JDK-17 compatibility It includes detailed documentation in English, Spanish and Catalan. You will find more about it at this web site: https://www.frojasg1.com:8443/downloads_web/web/html/encriptadorDeArchivos.html?origin=sourceforge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    DavUtils

    Powerful webdav client and sync tools with client-side AES encryption

    DavUtils is a collection of easy to use WebDAV client tools. The built-in client-side encryption allows you to encrypt and decrypt files on the fly with AES. Currently two command line tools are available: dav is a multipurpose WebDAV client that can be used like the standard unix tools ls, mkdir and rm. The other tool is dav-sync that can synchronize local files with a WebDAV server. It is very flexible and configurable and has advanced data safety features to prevent data loss. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 5
    Multron File Guardian

    Multron File Guardian

    A File Encrypter/Decrypter With Many/Hybrid Encryption Algorithms

    ...You can also set Symmetric Algorithm Key Size If you're about to share a file securely, then you may want to use one of Hybrid algorithms. You can compress your files before encryption. Authentication provided via Encrypt-then-MAC Method if you desire. You can also protect your notes with Multron NoteGuard utility. Argon2id With 4 Iteration rate | 256 MB Memory | 1 Parallelism (You can also set it) CBC Mode in Block ciphers Random IV For Each File. It has Screen Protection property that prevents screenshots It uses KEM to hybrid symmetric algorithms with asymmetric. 2.1.5 Changelogs: https://github.com/Ceasar128/MultronFguardian/releases/tag/mfgr_2.1.5n
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
     In-Browser-File-Encrypter

    In-Browser-File-Encrypter

    The source code of the In-Browser-File-Encrypter web app

    The In-Browser File Encrypter is a simple web application that enables you to securely encrypt your files directly in your browser using the AES-256 encryption algorithm in CBC mode. Check it out at: https://codepen.io/Northstrix/pen/xxvXvJL and https://northstrix.github.io/In-Browser-File-Encrypter/V1.0/web-app.html GitHub page: https://github.com/Northstrix/In-Browser-File-Encrypter The download shortcut: https://sourceforge.net/projects/in-browser-file-encrypter/files/V1.0%20%28Improved%20UI%29/V1.0%20%28Improved%20UI%29.zip/download Successfully tested in Google Chrome on Windows 11 and Fedora 40.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    cronBackUp

    cronBackUp

    DOWNLOAD RELEASE 1.2-0

    cronBackUp takes on the necessary task of backing up files and directories that you can't afford to loose. It uses daily, weekly and monthly backup scheduling to cover what you did today, a couple of weeks ago or four months ago. You have full control over incrementing, compressing, storing, encrypting and transferring to local or remote locations. All from one configuration file. 10 settings. Really there's only one mandatory setting, just list some path(s) for the script to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    VirtualHostAdd

    VirtualHostAdd

    Command-line tool for creating Apache virtual hosts on Debian 12.

    VirtualHostAdd is a command-line tool for Debian 12—and derived Linux distributions—designed to simplify the creation and configuration of virtual hosts on the Apache HTTP Server, for PHP and CGI-based applications. It automates the entire process, handling directory structure, Apache configuration, MPM and Apache modules handling, and file/directory permissions, reducing manual setup time and errors for developers and sysadmins.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Password-Manager

    Password-Manager

    Online keepass-like tool to manage password. client-side AES encrypt!

    v11.00 greatly enhanced security! This password manager can generate and store random strong passwords for users. Passwords are generated on users' browsers and then encrypted using AES256 (mode CBC). PBKDF2 with SHA512 is used for user identification check. In trusted computers, user can enable a PIN to login faster. PIN verification is complicated and involves both server and client. Though PIN is only 4 digits, it's still safe (server will disable PIN upon 3 errors) You can...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Access competitive interest rates on your digital assets.

    Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 10
    PCSecrets

    PCSecrets

    Encrypt and manage secret text data

    PCSecrets is a PC application that holds secret text data - protected by a master password and strong encryption. Use it as a password manager or just somewhere to hold any text data securely in one place. It can hold a second, hidden set of secrets that is undetectable and plausibly deniable. The program is also a PC counterpart of the Secrets for Android app. It uses the same data structure and provides synchronization that allows easy transfer of secrets between the two. For those who...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    fwknop

    fwknop

    Single Packet Authorization, Port Knocking

    fwknop stands for the "FireWall KNock OPerator", and implements an authorization scheme called Single Packet Authorization (SPA). This method of authorization is based around a default-drop packet filter (fwknop supports iptables and firewalld on Linux, ipfw on FreeBSD and Mac OS X, and PF on OpenBSD) and libpcap. SPA is essentially next-generation port knocking (more on this below). The design decisions that guide the development of fwknop can be found in the blog post "Single Packet...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    TigerSafe

    TigerSafe

    Free open source password manager

    ...It allows to store passwords in a file, without internet, by encrypting them with a single password. The user can then use a different password for every website he wants to use, and only has to remember a single password: the one used to encrypt/decrypt the file storing his passwords. It is highly recommended to do backups of the file storing passwords with TigerSafe, for example copy/paste it in USB flash drives, cloud drives like Google Drive, Dropbox... Indeed, users are solely responsible for their data. TigerSafe also enables you to store the 2-factor authentication mechanism mostly used by modern websites (TOTP 2FA) in a secure way. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Notetask - Task & Notes in Plaintext

    Notetask - Task & Notes in Plaintext

    A simple application for creating and organizing task lists, offering

    Notetask is a cross-platform application for managing task lists that include completion status, task description, and notes. Each task can have a due date and be marked as a favorite with a star. It uses its own storage text format based on Markdown. It is designed to help you quickly organize a large number of small routine tasks. You can enter tasks directly in the app or paste raw text from the clipboard — such as a list of requirements or ideas — then sort them into groups, set...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    AES-256 CBC File Encrypter

    AES-256 CBC File Encrypter

    Open source file encryption software

    An open-source software that enables you to encrypt your files using the AES encryption algorithm. GitHub page can be found at https://github.com/Northstrix/AES-256_CBC_File_Encrypter Made with the help of Perplexity If you find this project convenient, please leave a review to help others learn about it. Similar projects: https://sourceforge.net/projects/sta-file-encrypter/ https://sourceforge.net/projects/aes256-cbc-file-encrypter/
    Downloads: 5 This Week
    Last Update:
    See Project
  • 15
    transfer.sh

    transfer.sh

    Easy and fast file sharing from the command-line

    Easy and fast file sharing from the command-line. This code contains the server with everything you need to create your own instance. Transfer.sh currently supports the s3 (Amazon S3), gdrive (Google Drive), storj (Storj) providers, and local file system (local). For easy deployment, we've created a Docker container. For the usage with a AWS S3 Bucket, you just need to specify the following options, provider, aws-access-key, aws-secret-key, bucket, and s3-region. If you specify the...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 16
    pgsodium

    pgsodium

    Modern cryptography for PostgreSQL using libsodium

    pgsodium is an encryption library extension for PostgreSQL using the libsodium library for high-level cryptographic algorithms. pgsodium can be used a straight interface to libsodium, but it can also use a powerful feature called Server Key Management where pgsodium loads an external secret key into memory that is never accessible to SQL. This inaccessible root key can then be used to derive sub-keys and keypairs by key id. This id (type bigint) can then be stored instead of the derived key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    SuProtection

    SuProtection

    SuProtection , secure file encryption and password manager

    SuProtection , secure file encryption and password manager It provides an easy feature to encrypt files and passwords, as no one can decrypt files or passwords and view them because they are encrypted using a password and only you can see the files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    AES_plus_Serpent_in_CBC_mode

    AES_plus_Serpent_in_CBC_mode

    Open-source code that enables you to use AES + Serpent in CBC mode

    The AES_plus_Serpent_in_CBC_mode_for_microcontrollers repository contains code that enables you to encrypt your data using a combination of AES and Serpent encryption algorithms in CBC mode. In addition to that, the code in this repository enables you to verify the data integrity, thanks to the HMAC-SHA256. Attention! I didn't develop the libraries utilized by these sketches. I took them from the following repositories: https://github.com/zhouyangchao/AES https://github.com/peterferrie/serpent https://github.com/intrbiz/arduino-crypto All libraries are the properties of their respective owners. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    AES_plus_Blowfish_in_CBC_mode

    AES_plus_Blowfish_in_CBC_mode

    Open-source code that enables you to use AES + Blowfish in CBC mode

    The AES_plus_Blowfish_in_CBC_mode repository contains two sketches that enable you to encrypt your data using a combination of AES and Blowfish encryption algorithms in CBC mode. The only difference between them, from the functional point of view, is that one verifies the integrity of the decrypted data (plaintext) while the other doesn't. Copyright/Ownership/Licenses Attention! I didn't develop the libraries utilized by these sketches.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    haoel.github.io

    haoel.github.io

    Comprehensive guide on self-hosting proxies, VPNs and transparent gate

    ...It walks through buying and evaluating VPSes (regions, bandwidth, CN2/GIA lines), enabling kernel/network optimizations (BBR), and applying production practices like TLS certificates with Let’s Encrypt and using Cloudflare safely. The guide provides multiple deployment patterns (Dockerized gost / Shadowsocks / L2TP-IPSec, IKEv2 suggestions, and Cloudflare WARP integration), plus client configuration instructions for desktop and mobile (Clash, SwitchyOmega, Shadowrocket, etc.). Several transparent gateway patterns are explained: router/OpenWRT (Clash on the router), Raspberry Pi gateway, and a data-center NAT/EC2 NAT instance design with Clash for whole-VPC routing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    A Simple implementation of TCP reverse port forwarding just like 'ssh -R', but it doesn't multiplex TCP connections into one, neither it will encrypt the forwarded data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Crypt-LE

    Crypt-LE

    Let's Encrypt / Buypass / ZeroSSL and other ACME-servers clients

    Crypt-LE is a Perl module and command-line client that facilitates obtaining SSL certificates from Let's Encrypt and other ACME-compatible Certificate Authorities. It supports various verification methods and simplifies certificate management processes. ​
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    badpi-cyphering

    file/stream encryption/decryption/CRC based on PI compute algorithm

    Encryption/decryption/CRC algorithm base on PI calculation. The private Key is composed of : - a starting position nb (iterations before starting encrypt) - a loop nb (in-between iteration) - small spot nb for the position in floating number part Challenge is proposed in my website.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Sobbu

    Sobbu

    Encode-Decode Tool weaponized with Hash Encrypt & Hash Cracker

    Sobbu is a cryprography tool with various encode-decode algorithm weaponized with Hash encrypting and Hash cracker via Rainbow Table method. This tool used 4 different hash database to identify hash value. Currently available for Windows (CLI + GUI) and Linux (CLI) Latest version : 1.4 Available Encode-Decode algorithm : - Base32 - Base64 - Binary - Octal - Hex - ASCII - URL - HTML - ROT13 Available Hash encrypting and Hash cracking algorithm : - MD5 - SHA1 - SHA224 -...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Udp2raw-tunnel

    Udp2raw-tunnel

    Turns UDP traffic into encrypted UDP/fakeTCP/ICMP traffic

    A tunnel which turns UDP traffic into encrypted fakeTCP/UDP/ICMP traffic by using Raw Socket, helps you bypass UDP FireWalls(or unstable UDP environment). When used alone, Udp2raw tunnels only UDP traffic. Nevertheless, if you used udp2raw + any UDP-based VPN together, you can tunnel any traffic(include TCP/UDP/ICMP), currently, OpenVPN/L2TP/ShadowVPN and tinyfecVPN are confirmed to be supported. Linux host (including desktop Linux,Android phone/tablet,OpenWRT router,or Raspberry PI) with...
    Downloads: 14 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB