Showing 210 open source projects for "sha3-256"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 1
    This is a dual cipher model with independent keys that uses AES-256 and 3DES-192 doubling data length random pad following the method as mentioned by Bruce Schneier in his book "Applied Cryptography". For more details check out https://www.titasraha.com/multicipher
    Downloads: 23 This Week
    Last Update:
    See Project
  • 2
    JNIZ music notation audio to midi

    JNIZ music notation audio to midi

    music composition and notation software, audio to midi converter

    Jniz is a piece of software designed for musicians as a support tool to the musical composition. It allows you to build and to harmonize several voices according to the rules of classical harmony. Sound/audio-to-Midi converter: real-time conversion of any monophonic sound (voice, instrument etc.) into notes / tones. Jniz is a free proprietary piece of software. You do not have the right to sell, distribute Jniz or use its sources under penalty of law. You will infringes on the Jniz staff...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    AES Everywhere

    AES Everywhere

    Cross Language AES 256 Encryption Library

    AES Everywhere is Cross Language Encryption Library that provides the ability to encrypt and decrypt data using a single algorithm in different programming languages and on different platforms. This is an implementation of the AES algorithm, specifically CBC mode, with 256-bit key length and PKCS7 padding. It implements OpenSSL-compatible cryptography with randomly generated salt.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    PyTorch pretrained BigGAN

    PyTorch pretrained BigGAN

    PyTorch implementation of BigGAN with pretrained weights

    An op-for-op PyTorch reimplementation of DeepMind's BigGAN model with the pre-trained weights from DeepMind. This repository contains an op-for-op PyTorch reimplementation of DeepMind's BigGAN that was released with the paper Large Scale GAN Training for High Fidelity Natural Image Synthesis. This PyTorch implementation of BigGAN is provided with the pretrained 128x128, 256x256 and 512x512 models by DeepMind. We also provide the scripts used to download and convert these models from the...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Top-Rated Free CRM Software Icon
    Top-Rated Free CRM Software

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
    Get started free
  • 5
    TCPDF - PHP class for PDF

    TCPDF - PHP class for PDF

    PHP class for PDF

    TCPDF is a PHP class for generating PDF documents without requiring external extensions. TCPDF Supports UTF-8, Unicode, RTL languages, XHTML, Javascript, digital signatures, barcodes and much more. IMPORTANT: This version will be soon marked as deprecated and replaced by a new version currently under development: https://github.com/tecnickcom/tc-lib-pdf
    Leader badge
    Downloads: 270 This Week
    Last Update:
    See Project
  • 6
    CS Figures

    CS Figures

    Heuristic-based fractal and music generator-256+ systems.

    Welcome to CSFigures, the generative rendering program for all sorts of interpretations of digital roots. Digital roots in this program are constructed on a basis of a multiplication table, but with alternate counting systems contrasted, different from 0-9. The data is then analyzed by adding the imaginary digital symbols together, to achieve a single digit number, or alternately working with heuristics such as finding the last or lowest/highest digit of each number. You may see your options...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    SSHTOOLS

    SSHTOOLS

    Java SSH API

    This project now hosts the third-generation of Java SSH API, Maverick Synergy. This API builds on the Maverick Legacy commercial APIs and delivers a new API in a unified client/server framework. This API is available to the community under the LGPL open source license. This update includes ed25519 support, support for the new OpenSSH private key file format and stronger key exchange algorithms. The project continues to host both the original API and legacy applications created around...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 8
    IP-Chat

    IP-Chat

    UDP based desktop chatting app which supports AES-256 bit encryption.

    Simple Encrypted chat application built with Java. It uses AES-256 bit block cipher algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Checksum Util

    A unix like CLI checksum utility ported for WindowsNT.

    Available Hashes: 1. MD5 (md5sum) 1. SHA-1 (sha1sum) 2. SHA-256 (sha256sum) 3. SHA-512 (sha512sum) Installation: Download latest Windows zip release from here. Extract the zip file. Then right-click 'install.bat' and Run as Administrator. Usage: In CMD / PowerShell: C:\Users\User Name> sha1sum path/to/file.psd
    Downloads: 2 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    sjcl

    sjcl

    Stanford Javascript Crypto Library

    The Stanford Javascript Crypto Library is a project by the Stanford Computer Security Lab to build a secure, powerful, fast, small, easy-to-use, cross-browser library for cryptography in Javascript. SJCL is small but powerful. The minified version of the library is under 6.4KB compressed, and yet it posts impressive speed results. SJCL is secure. It uses the industry-standard AES algorithm at 128, 192 or 256 bits; the SHA256 hash function; the HMAC authentication code; the PBKDF2 password...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    HashOR

    HashOR is used to create 84 hashes of a string or file.

    HashOR can create 84 hashes from data or file input. It also can create a TTH and AICH.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    GMR Digital Signature System

    GMR Digital Signature System

    GMR digital signature system

    Private keys are insecure in cloud server infrastructure. Chrome: right click - translate into English! https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2018/Spectre-NG_18052018.html System that creates key pairs and digital signatures and is based on the presumed difficulty of prime factorization. Please install on a virtual machine with Linux! Windows is not supported! German: System, das Schlüsselpaare und digitale Signaturen erstellt, und auf der vermuteten...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Anak Krakatoa Defined Crypt

    Anak Krakatoa Defined Crypt

    Uma implementação diferente do algorítmo de Virgenère

    Um dia precisei de um algoritmo simples de criptografia para usar em um de meus programas, com o intuito de encriptar strings de texto. Como não tive paciência para criar um, resolvi procurar na Internet. Achei o que eu estava procurando, mas ocorreu uma coisa muito inesperada... O algoritmo era genérico, ou seja, ele manipulava a sequência de texto informada e fazia um cálculo simples, alterando os caracteres um a um. Isso seria o ideal, mas infelizmente ele utilizava todos os 256 caracteres...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Space International SHIKA Crypto-suite

    Space International SHIKA Crypto-suite

    High-grade military diplomatics-grade cryptography suite

    ... are fully magnetic-proof. Designed by Ann Space, Chiko Space and Mika Space, senators of the Most High Senate of Space International, and military generals of the special division of the Infinite Military of Space International (Navy). Better than Serpent, Twofish and AES ciphers. Fully unbreakable. Reasonable performance for the assured ultra high-grade security. Approved by Space International senates and top militaries. At least 512-bits security. The market's offer is only 128 to 256 bits security.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    CrococryptFile

    CrococryptFile

    An encryption tool for creating file archives

    ... file dump. =Crypto Suites= For a full list of and details about supported crypto suites, please visit the CrococryptFile Homepage. Examples: - Password-based encryption (following PBKDF2) with AES-256, Twofish, Serpent, ... - Public key encryption using GPG/OpenPGP, Windows Keystore/CAPI with RSA/X.509 certificates - Cloaked (headerless) Password-based Encryption (AES-Twofish-256 cascaded) - ...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 16

    MHISoft eVault

    Secure Password Vault and Password Manager

    https://github.com/mhisoft/eVault I just don't trust any online or third party vault for storing my personal information and passwords. So I created this open source. It is a secure password vault which is best suitable for storing passwords and personal data. All the data are stored in a encrypted data with AES 256 bit key encryption. You only need to remember one master password and a set of combination code to the vault. The password is stored in a hashed format and can't be reverse...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    MySuiteA

    This is not NSA Suite B. This is MySuiteA!

    MySuiteA is a cryptographic suite consisting of symmetric ciphers and hash algorithms, as well as two proof-of-concept quantum-safe asymmetric cryptographic algorithms for digital signature and key agreement. This suite implements: AES-128, AES-192, AES-256, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHAKE128, SHAKE256, NEWHOPE, REBLISS-512A, (and the self-devised)REBLISS-1024A, among a few other things...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    N2K-OS FreeDOS Distro

    N2K-OS FreeDOS Distro

    GUI Desktop for FreeDOS Related Systems

    N2K-OS is a Graphics User Interface built for MS-DOS, FreeDOS, and DOSBox. Testing models have even shown that they will run in a Virtual Machine as well. Initially being built on a 486 Machine that ranks as a low end Pentium 1, with 40 megabytes of ram, it currently runs like a dream for any machine of similar nature with SuperVGA and 256 Colors with ability to reach 800x600 (and soon to be much higher resolutions than that). Slowly being developed over the last few years (each time...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    openChecksum

    openChecksum

    Check the MD5, SHA-1 and SHA-256 with an multiplatform tool.

    Check the MD5, SHA-1 and SHA-256 Checksum with an multiplatform easy tool developed with QT.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    Binary Stream Editor

    A stream editor in java that can handle text/binary formats

    ... by default, has 256 single-byte characters. Data in the buffer is available as a charsequence to the commands for stuff like regex matching etc. The output can be redirected to a file, and an output encoding can be specified.The commands can also store/retrive arbitrary data for later use in a map. Evaluation of expressions in commands is done using Apache Jexl, and custom functions can also be used. Sample java usage and sample command line usage examples are included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    PeaUtils

    File management utilities: split & join, secure delete, crc/hash

    Suite of file management utilities: split and join files, secure delete, verify checksum and hash values: CRC32. MD5, SHA1, SHA-256, SHA3 and more. Spin-off of PeaZip project.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 22
    Filelocker 2
    Filelocker is a web based secure file sharing application which facilitates easy file sharing between users at an organization and promotes secure data sharing habits.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 23
    Hi anybody, This 7z allow you hiding many files using LSB Steganographic method in many pics, also let you the possibility to cipher the hidden files using private and public key with ECC(Elliptic curve cryptography), using BouncyCastle Java library or AES-256 bits. HOW TO USE: Its software needs JRE 1.7 or Higher!! Just unzip the dist.7z file and open Faster-Hiding.jar file, you can download the sources. Please open tickets if you found a problem or copyright trouble...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    waifu2x-ROS

    ReactOS and Windows XP compatible build of waifu2x.

    To speed up, use "-b 256 -j 4" options. The original is there: https://github.com/WL-Amigo/waifu2x-converter-cpp Here are some minor cosmetic changes (switch to control memory usage and slightly reformatted output) and files needed to build under MinGW32-W64. To recompile (in Linux), run "make clean; make". 2016-10-17 UPDATE: added simple GUI. 2016-10-18 FIX: corrected typo, added some crashes handling. 2016-11-20 UPDATE: - added "TTA" and "number of passes" options; - enabled RGB...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25

    Thread

    Converts a single-threaded Linux command into a multi-threaded monster

    With the use of the Boost C++ Libraries: https://sourceforge.net/projects/boost/ thread provides a pre-complied solution to turn a non-threaded Linux command into a threaded program. It is best used with a no cobbler flag or no overwrite option in the code. Example run: $./threaded.sh choose how many threads options: 2 4 6 8 12 16 32 64 128 256 512 1024 2056 4112 16448 32896 $64 "enter a full command to run multi-threaded:" $pdftotext ./pdfs/. $
    Downloads: 0 This Week
    Last Update:
    See Project