Showing 155 open source projects for "symmetric"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • 1
    GnuPG

    GnuPG

    Complete and free implementation of the OpenPGP standard

    GnuPG (GNU Privacy Guard) is a widely used free software encryption system that implements the OpenPGP standard to provide secure communication and data protection across multiple platforms. It uses a hybrid cryptographic approach combining symmetric encryption for performance with public-key cryptography for secure key exchange and identity verification. The software allows users to encrypt files and messages, create digital signatures, and manage cryptographic keys, making it a foundational tool for privacy-focused workflows. Because it is open source and licensed under the GNU GPL, GnuPG can be freely audited, modified, and redistributed, which has contributed to its adoption in security-sensitive environments. ...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 2
    FKILL

    FKILL

    Cross-platform tool to kill processes

    To kill a port, prefix it with a colon. For example: :8080. Run without arguments to use the interactive interface. Run fkill without arguments to launch the interactive UI. Force kill processes that did not exit within the given number of milliseconds. Kill all child processes along with the parent process. (Windows only). Ignore capitalization when killing a process. Note that the case is always ignored on Windows. Suppress all error messages. For example: Process doesn't exist.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Spring Cloud Config Server

    Spring Cloud Config Server

    External configuration (server and client) for Spring Cloud

    Spring Cloud Config provides server-side and client-side support for externalized configuration in a distributed system. With the Config Server, you have a central place to manage external properties for applications across all environments. The concepts on both client and server map identically to the Spring Environment and PropertySource abstractions, so they fit very well with Spring applications but can be used with any application running in any language. As an application moves through...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    PythonCall & JuliaCall

    PythonCall & JuliaCall

    Python and Julia in harmony

    Bringing Python® and Julia together in seamless harmony. Call Python code from Julia and Julia code from Python via a symmetric interface. Simple syntax, so the Python code looks like Python and the Julia code looks like Julia. Intuitive and flexible conversions between Julia and Python: anything can be converted, you are in control. Fast non-copying conversion of numeric arrays in either direction: modify Python arrays (e.g. bytes, array. array, numpy.ndarray) from Julia or Julia arrays from Python. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 5
    HttpKernel Component

    HttpKernel Component

    A structured process for converting a Request into a Response

    The HttpKernel component provides a structured process for converting a Request into a Response by making use of the EventDispatcher component. It's flexible enough to create full-stack frameworks, micro-frameworks or advanced CMS systems like Drupal. Every HTTP web interaction begins with a request and ends with a response. Your job as a developer is to create PHP code that reads the request information (e.g. the URL) and creates and returns a response (e.g. an HTML page or JSON string)....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Hangfire

    Hangfire

    An easy way to perform background job processing

    An easy way to perform background processing in .NET and .NET Core applications. No Windows Service or separate process required. Backed by persistent storage. Open and free for commercial use. Easy to set up, easy to use. No Windows Service, no Windows Scheduler, no separate applications required. Background jobs are regular static or instance .NET methods with regular arguments, no base class or interface implementation required. Once a background job was created without any exception,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    pwd.sh

    pwd.sh

    GnuPG symmetric secrets manager using Bash

    pwd.sh is a lightweight command-line utility designed to generate strong, secure passwords using simple and reproducible methods directly from the terminal. The tool focuses on usability and security by leveraging deterministic techniques that allow users to generate complex passwords without needing to store them. It is particularly useful for users who want to avoid password reuse while maintaining memorability or reproducibility. The script is designed to be minimal and portable, making...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    SOFAJRaft

    SOFAJRaft

    A production-grade java implementation of RAFT consensus algorithm

    SOFAJRaft is a production-level, high-performance Java implementation based on the RAFT consistency algorithm that supports MULTI-RAFT-GROUP for high-load, low-latency scenarios. With SOFAJRaft you can focus on your business area. SOFAJRaft handles all RAFT-related technical challenges. SOFAJRaft is very user-friendly, which provides several examples, making it easy to understand and use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    jwx

    jwx

    Implementation of various JWx (Javascript Object Signing

    ...Supports JWE messages with multiple recipients, both compact and JSON serialization. Most operations work with either JWK or raw keys e.g. *rsa.PrivateKey, *ecdsa.PrivateKey, etc). Opinionated, but very uniform API. Everything is symmetric, and follows a standard convention. Arguments are organized as explicit required paramters and optional WithXXXX() style options.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10
    MNN

    MNN

    MNN is a blazing fast, lightweight deep learning framework

    MNN is a highly efficient and lightweight deep learning framework. It supports inference and training of deep learning models, and has industry leading performance for inference and training on-device. At present, MNN has been integrated in more than 20 apps of Alibaba Inc, such as Taobao, Tmall, Youku, Dingtalk, Xianyu and etc., covering more than 70 usage scenarios such as live broadcast, short video capture, search recommendation, product searching by image, interactive marketing, equity...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 11
    transcrypt git

    transcrypt git

    transparently encrypt files within a git repository

    A script to configure transparent encryption of sensitive files stored in a Git repository. Files that you choose will be automatically encrypted when you commit them, and automatically decrypted when you check them out. The process will degrade gracefully, so even people without your encryption password can safely commit changes to the repository's non-encrypted files. transcrypt protects your data when it's pushed to remotes that you may not directly control (e.g., GitHub, Dropbox clones,...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    AWS Encryption SDK for Java
    The AWS Encryption SDK is a client-side encryption library designed to make it easy for everyone to encrypt and decrypt data using industry standards and best practices. It enables you to focus on the core functionality of your application, rather than on how to best encrypt and decrypt your data. The AWS Encryption SDK is provided free of charge under the Apache 2.0 license. With the AWS Encryption SDK, you define a master key provider (Java and Python) or a keyring (C, C#/.NET, and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    schur

    schur

    Interactive Program For Calculating Properties Of Symmetric Functions

    Schur is a standalone program for interactively calculating properties of Lie groups and symmetric functions. Schur has been designed to answer questions of relevance to a wide range of problems of interest to chemists, mathematicians, computer scientists,...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 14
    Multron File Guardian

    Multron File Guardian

    A File Encrypter/Decrypter With Many/Hybrid Encryption Algorithms

    Multron File Guardian provides you a strong file encryption. Supported algorithms AES Serpent Twofish ThreeFish Camellia ChaCha20 SM4 HC RSA Hybrided With Symmetric Algorithms License = AAL You can set RSA Key Length (from 2048 to 16384) You can set Password-Iteration Rate. You can also set Symmetric Algorithm Key Size If you're about to share a file securely, then you may want to use one of Hybrid algorithms. You can compress your files before encryption. Authentication provided via Encrypt-then-MAC Method if you desire. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 15

    Beampath

    Beam dynamics simulations in linear accelerators and beamlines

    BEAMPATH is a 2D and 3D code for simulation of space charge dominated beam dynamics in linear particle accelerators and beam transport. The program is used for particle-in-cell simulation of axial-symmetric, quadrupole-symmetric and z-uniform beams in a channel containing RF gaps, radio-frequency quadrupoles, multipole lenses, solenoids, bending magnets, accelerating waveguides. Detailed description of model can be found in Y.K.Batygin, “Particle-in-cell code BEAMPATH for beam dynamics simulations in linear accelerators and beamlines” Nuclear Instruments and Methods in Physics Research A 539 (2005) 455–489.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 16

    file encrypt

    File encryption and decryption utility

    The fcrypt and fdecrypt programs provide a comprehensive symmetric encryption tool kit for encrypting and decrypting files.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 17
    EDGE Toolkit

    EDGE Toolkit

    Cross-platform Integrated Security Suite written in Go

    Multi-purpose cross-platform hybrid cryptography tool for symmetric and asymmetric encryption, cipher-based message authentication code (CMAC/PMAC/GMAC/VMAC), recursive hash digest, hash-based message authentication code (HMAC), HMAC-based key derivation function (HKDF), password-based key derivation function (PBKDF2/Argon2/Scrypt), password-hashing scheme (Bcrypt/Argon2/Makwa), shared key agreement (ECDH/VKO/X25519), digital signature (RSA/ECDSA/EdDSA/GOST/SPHINCS+), X.509 CSRs, CRLs and Certificates, and TCP instant server with TLS 1.3 and TLCP encryption layers for small or embedded systems.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 18

    Encrypted Password Database

    Enterprise level password management and automation

    The Encrypted Password Database is an enterprise level application for storing authentication information and automating application password management.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    BRL-CAD

    BRL-CAD

    Open Source Solid Modeling CAD

    BRL-CAD is a powerful cross-platform constructive solid geometry solid modeling system that includes an interactive geometry editor, ray-tracing for rendering & geometric analyses, network distributed framebuffer support, image & signal-processing tools.
    Downloads: 82 This Week
    Last Update:
    See Project
  • 20

    Aria FE

    No nonsense file encryption, Linux and Windows

    Aria FE is a symmetric, no nonsense file encryption tool with a [very] minimal graphic interface. AES, Aria, Camellia, ChaCha20, and SM4 ciphers are supported.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    BMDFM

    BMDFM

    Binary Modular DataFlow Machine (BMDFM)

    Binary Modular DataFlow Machine (BMDFM) is a software package that enables running an application in parallel on shared memory symmetric multiprocessing (SMP) computers using the multiple processors to speed up the execution of single applications. BMDFM automatically identifies and exploits parallelism due to the static and mainly dynamic scheduling of the dataflow instruction sequences derived from the formerly sequential program. The BMDFM dynamic scheduling subsystem performs a symmetric multiprocessing (SMP) emulation of a tagged-token dataflow machine to provide the transparent dataflow semantics for the applications. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    arca_enc

    Encryption engine supports AES, Aria, Camellia, SM4, and ChaCha20

    Basic symmetric encryption engine, meant to be called from a script, so be used as a command line encryption tool as well. https://codeberg.org/BloodFeastMan/arca
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Midbar Desktop App

    Midbar Desktop App

    Standalone desktop app from the Midbar project

    This repository contains the standalone desktop application from the Midbar project. The app operates entirely offline and does not require an internet connection. GitHub repository: https://github.com/Northstrix/Midbar-Desktop-App
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    FTC

    Symmetric File and Text Encryption

    FTC cascades choice of Aria-256, AES-256, Camellia-256, SM4, or ChaCha20 for file and text encryption, the keystream generation is extremely robust I don't make cute interfaces, it just works.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Cyphernight-MAX SEC
    Dexmond.com is the official website of Dexmond Technologies, dedicated to CypherNight: MAX-SEC V3, a professional-grade, multi-platform data encryption suite designed for securing, digitally signing, and managing sensitive files with uncompromising security. The core tool combines military-strength cryptography — AES-256-GCM for symmetric encryption, RSA-4096 (with OAEP padding) for asymmetric operations, Ed25519 digital signatures, and Argon2id for secure passphrase-based key derivation — to protect data against brute-force, offline, and alteration attacks. Unique features include per-chunk authentication, single-use uniqueness markers, encrypted key vaults, forced external archive loading for safe inspection of ZIP/RAR/ISO files, universal forensic archive extraction, and steganography (LSB hiding of files inside images). ...
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB