Showing 17 open source projects for "string encryption"

View related business solutions
  • Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure Icon
    Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure

    Native application identity and user-based security for your Azure cloud

    Gain integrated visibility across all traffic in a single pass. Deploy Palo Alto Networks VM-Series to determine application identity and content while automating security policy updates via rich APIs.
    Get a free trial
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    JavaScript Obfuscator

    JavaScript Obfuscator

    A powerful obfuscator for JavaScript and Node.js

    JavaScript Obfuscator is a Node.js library and CLI that transforms readable JavaScript into hardened, difficult-to-reverse code. It applies techniques such as identifier mangling, string array extraction/encoding, control-flow flattening, dead-code injection, and numeric literal transformations to disguise intent. Advanced options include self-defending code, domain locking, debug/console protection, and property key transformation, allowing you to tailor defenses to your threat model. The...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    PureBasic Shamir Secret Sharing

    PureBasic Shamir Secret Sharing

    Open-source PureBasic implementation of the Shamir Secret Sharing

    PureBasic Shamir Secret Sharing is an open-source, self-contained and educational implementation of the Shamir Secret Sharing Scheme, written entirely in PureBasic. Shamir Secret Sharing is a cryptographic method that splits a secret into multiple parts (shares), such that any combination of at least T shares can reconstruct the original secret, while any number of shares fewer than T reveals no usable information. This implementation operates over the finite field GF(257), allowing...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Hash Latch
    The hash latch generates keys in a manner similar to how some cryptocurrencies are mined. It takes a string and brute-forces a prefix for it so that the hash of the string with the prefix has a certain number of leading zeroes. But that alone would've been too easy to hack. To prevent an attacker from forging the keys by generating a new prefix: the hash latch doesn't output the keys in the plaintext. Instead, it encrypts the key and outputs the ciphertext. That means that instead of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Koperek.VCL

    Fast file copier, experimental archiver and encrypter for Windows 95+

    Copy handler written in Windows 98 era ~ 2002 written to by used by myself. To speed up file copy operations, thanks to bigger buffer size. Work as simple shell extension (Send To). Source files to be copied are always passed as string list via Clipboard. Destination directories passed via program parameters list. Note - you could copy multiple sources into multiple places at once! You will be able to: - Copy files - Move files and entire directories - Delete directories - Encrypt...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 5
    .Net Core for Delphi/Lazarus

    .Net Core for Delphi/Lazarus

    The best library to work with the .Net Core from Delphi and Lazarus.

    The .Net Core for Delphi/Lazarus (dotNetCore4Delphi) is a .Net Core Runtime Library for Delphi which helps Delphi/Pascal developers work with .Net Core. It is designed to provide a way to interact with .Net Core applications from Delphi/Pascal. What dotNetCore4Delphi can do: - Access .Net Core Framework Class Library. - Access Third Party .Net Core Libraries. - Access Your .Net Core Libraries. - etc Competitive Advantages: - Cross-platform framework that runs on Windows, Linux and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Open Source Data Quality and Profiling

    Open Source Data Quality and Profiling

    World's first open source data quality & data preparation project

    This project is dedicated to open source data quality and data preparation solutions. Data Quality includes profiling, filtering, governance, similarity check, data enrichment alteration, real time alerting, basket analysis, bubble chart Warehouse validation, single customer view etc. defined by Strategy. This tool is developing high performance integrated data management platform which will seamlessly do Data Integration, Data Profiling, Data Quality, Data Preparation, Dummy Data...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Anak Krakatoa Defined Crypt

    Anak Krakatoa Defined Crypt

    Uma implementação diferente do algorítmo de Virgenère

    ...Isso seria o ideal, mas infelizmente ele utilizava todos os 256 caracteres do conjunto ASCII, quer dizer, ele também incluía em seus cálculos todos os caracteres de controle (DEL, CR, LF, ACK, etc.). Esse componente, foi INTEIRAMENTE convertido e otimizado a partir do JavasScript VIRGENERE ENCRYPTION criado por Francisco Ryan Tolmasky (opossum@mailcity.com) e usa uma tabela fixa contendo pares de caracteres comuns em meu idioma, nunca saindo desse intervalo evitando assim o aparecimento de caracteres indesejados na string criptografada resultante
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    approach to encryption and decryption involves two strings. The first is an encryption / decryption string which we will allow to be up to 128 lower case alphabetical characters in length. The second string is a line of text from a file that is to be encrypted or decrypted. the basic strategy for encrypting data is based on mapping alphabetical characters to specific values, then doing some simple mathematical operations to create a new value.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    PortaBase

    A Portable Database

    A personal database application for Maemo devices as well as PCs running Linux/UNIX, Mac OS X, and Windows. It can be used as a shopping list, password manager, media inventory, financial tracker, TODO list, address book, photo album, and more.
    Downloads: 4 This Week
    Last Update:
    See Project
  • Compliant and Reliable File Transfers Backed by Top Security Certifications Icon
    Compliant and Reliable File Transfers Backed by Top Security Certifications

    Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.

    Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
    Start Free Trial
  • 10

    CyberCrypt

    .NET Library for Encryption/Decryption

    CyberCrypt: ----------------- .NET Library for Encryption/Decryption Usage: ---------- Encrypting file using AES (256 bits): CyberCrypt._AES256.EncryptFile("C:\example.txt", "YourPassword") Decrypting file using AES (256 bits): CyberCrypt._AES256.DecryptFile("C:\example.txt", "YourPassword") Hashing string using SHA512: CyberCrypt._SHA.SHA512Hash("A string that will be converted to SHA512 hash.")
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    WTF Obfuscator

    WTF Obfuscator

    WTF Obfuscator is a new obfuscator for your .NET applications

    [W]hat [T]he ob[F]uscator is a new obfuscator which protects your application. Not too good protection until!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    LeetSocket is an easy to use Socket Component, built on TCP, written in c# .net 2.0 Example Usage: Build a chat in 5 mins http://www.youtube.com/watch?v=Tm2jS6mQjRs Developers: Ahmet Yüksektepe Nick Russler
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    Cryptkeeper

    Cryptkeeper Secuirty tool

    ...some uses encryption keys and some dont. there are AES , 4DES , RC2 , RC4 , MD5 , SHA1 , SHA2 , SHA3 , SHA4 , XoR , Crypt , HeX , BINARY , Rijndael 256 , Obfuscation String , RSA , BASE64. The password manager anything saved WILL NOT BE ENCRYPTED so it is smart to protect the program from others not using it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Encrypts a message (string) into an unreadable text.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    jlidegw
    IRC gateway for lide.cz chat.Written 100% pure in Java including "Lide API" (package jlidegw),which allows Java developers to make their own applications collaborating with lide.cz server.Some code parts are inspired by Python version of lidegw.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Univar makes it easier for ASP.NET developers to work with the session, cookie, query string or cache by offering a unified, type safe, generic all-in-one tool set for all of them. It supports serialization, compression and encryption out of the box.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    NAC is a collection of tools for cryptography. The goal is to provide simple-to-use crypto tools (like an OTP, String and number generator, public key algorithm...) you can use under Linux, Windows...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB