Search Results for "dmg decrypt key" - Page 2

Showing 38 open source projects for "dmg decrypt key"

View related business solutions
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • Top-Rated Free CRM Software Icon
    Top-Rated Free CRM Software

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
    Get started free
  • 1

    Ncrypt

    Text and image encryption and decryption software

    This software provides a mean for users to encrypt and decrypt data in the form of text and images. The program follows a basic encryption algorithm that relies on mathematical properties of matrices, such as row operations, matrix multiplication, and invertible matrices . This program works by allowing the user to input a key in the form of a matrix, on which the program bases the encryption. The program then performs the encryption. The software only works in the scope of text files...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    GPGUI - PGP GUI

    GPGUI - PGP GUI

    GUI wrapping GnuPG functionality provided by Bouncy Castle

    The GPGUI program is GUI wrapping GnuPG functionality provided by Bouncy Castle. The program allows you to encrypt/sign/decrypt text messages and files using asymmeric PGP keys. The program can read and manage GnuPG keys if GnuPG is installed. But the program also maintains its own secret and public key files and having GnuPG installed is optional.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    The MOTET Cipher & SE Scrambler

    The MOTET Cipher & SE Scrambler

    A tiny, fast encryption tool in C

    MOTET is a tiny, fast super-encipherment application written in C, featuring the new CSPRNG/stream ciphers MOTE and BEDBUG in each of their three variants, as well as the "gold standard" among ciphers, ISAAC. MOTET brings multiple levels of encryption, including a ciphertext-hash, a Vigenere mixing function, a choice of Caesar MOD or Caesar MIX ciphering on the primary key-stream, plus a deeply scrambled "outer shell" as a final super-encryption stage. A unique nonce IV guarantees that each...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    ISC - The ISAAC Stream Cipher

    ISC - The ISAAC Stream Cipher

    ISC lets you encrypt & decrypt text and files of any type up to 4GB

    ISAAC is a cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It was developed by Bob Jenkins from 1993-1996 and placed in the Public Domain. ISAAC is fast - especially when optimised - and portable to most architectures in nearly all programming and scripting languages. After more than 20 years of existence ISAAC has not been broken, and the little program you have here allows you to use it to encrypt and decrypt text of arbitrary length, files of any type...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Save hundreds of developer hours with components built for SaaS applications. Icon
    Save hundreds of developer hours with components built for SaaS applications.

    The #1 Embedded Analytics Solution for SaaS Teams.

    Whether you want full self-service analytics or simpler multi-tenant security, Qrvey’s embeddable components and scalable data management remove the guess work.
    Try Developer Playground
  • 5
    ImpraStorage

    ImpraStorage

    ImpraStorage provided a private imap access to store large files

    ImpraStorage provided a private imap access to store large files. Each file stored on the server is split in severals random parts. Each part also contains random noise data (lenght depends on a crypt key) to ensure privacy and exclude easy merge without the corresponding key. An index of files stored is encrypt (with the symmetric-key algorithm Kirmah) and regularly updated. Once decrypt, it permit to perform search on the server and download each part. transfert process is transparent...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    AESTextCrypt

    AESTextCrypt

    Encrypt and decrypt text using AES 256 bit encryption

    AESTextCrypt is an easy-to-use open source tool for text encryption and decryption. Primarily intended for use with email, use it wherever you need to protect text from prying eyes. The encrypted text can be copy/pasted into any text-handling application (e.g. email) instead of plain text. Convenience buttons are provided for clipboard operations. AESTextCrypt uses AES-256 bit encryption which is the strongest available encryption scheme. It also employs bcrypt, which implements key...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    Android 3x3 Pattern Lock Cracker

    Android 3x3 Pattern Lock Cracker

    This tool is using to decript gesture.key into pattern lock key

    ############################################################## === Android 3x3 Pattern Cracker === by SMRX86 and thanks to Eric Draven (RNDC) for fix this script ------------------------------------------------------------- This is a tool to decrypt gesture.key into pattern lock key run under *NIX environment. Just make sure that you have the correct gesture.key file before proceeding
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    The utility can encrypt/decrypt file/folder structure using key. The folder/files, when encrypted are stored in corresponding structure as is but with the extention ".encrypted" & when you decrypt it, entire structure can be restored back as it was.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Blowfish Encryption over HTTP. It encrypts with your username and password using the server-generated unique key which you must have, so as to use this service. The malicious third-party can't decrypt your login info if they don't have the key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Crypto tax reports in under 20 minutes Icon
    Crypto tax reports in under 20 minutes

    Cryptocurrency investors or accountants looking for a tax solution

    Make tax reporting easy, reliable and accurate with Koinly. Simply connect your exchange accounts / public addresses and let Koinly calculate your capital gains, then generate a tax report for next year. Your final report is accepted by your tax agency and easy to print & file.
    Learn More
  • 10
    Cryptomni is a program which can encrypt and decrypt files using the one-time pad cipher. If a key is truly random, kept secret, and never reused, this encryption algorithm can be proven to be unbreakable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Imagine being able to send an encrypted message as a single file to someone working on any Operating System, without them having to install any software to decrypt it. Just send them an Inkjar. Or you can store your own passwords on a usb key anywhere.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Ikedectypt is a perl script to decrypt IKEv1 packets in libpcap formatted trace file. You can use Ethereal(http://www.ethereal.com) to analyze decrypted trace. Key information(first initialization vector, skeyid_e) is needed to be supplied by user.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    This proyect is an implementation of OpenPGP (RFC2440) written entirely in Java. It let's you sign, encrypt, decrypt messages and files, using public key cryptography.
    Downloads: 0 This Week
    Last Update:
    See Project