Showing 26 open source projects for "decrypt code"

View related business solutions
  • Auth0 for AI Agents now in GA Icon
    Auth0 for AI Agents now in GA

    Ready to implement AI with confidence (without sacrificing security)?

    Connect your AI agents to apps and data more securely, give users control over the actions AI agents can perform and the data they can access, and enable human confirmation for critical agent actions.
    Start building today
  • Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight Icon
    Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight

    Lock Down Any Resource, Anywhere, Anytime

    CLEAR by Quantum Knight is a FIPS-140-3 validated encryption SDK engineered for enterprises requiring top-tier security. Offering robust post-quantum cryptography, CLEAR secures files, streaming media, databases, and networks with ease across over 30 modern platforms. Its compact design, smaller than a single smartphone image, ensures maximum efficiency and low energy consumption.
    Learn More
  • 1
    OpenPGP.js

    OpenPGP.js

    OpenPGP implementation for JavaScript

    This project aims to provide an Open Source OpenPGP library in JavaScript so it can be used on virtually every device. Instead of other implementations that are aimed at using native code, OpenPGP.js is meant to bypass this requirement (i.e. people will not have to install gpg on their machines in order to use the library). The idea is to implement all the needed OpenPGP functionality in a JavaScript library that can be reused in other projects that provide browser extensions or server applications. It should allow you to sign, encrypt, decrypt, and verify any kind of text, in particular e-mails, as well as managing keys. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    cat-catch

    cat-catch

    Cat scratch chrome resource sniffing extension

    ...It does not decrypt any website. Any content downloaded by the user has nothing to do with the extension. Please pay attention to the permissions and copyrights of the downloaded resources.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    wa-automate-nodejs

    wa-automate-nodejs

    WhatsApp tool for chatbots with advanced features

    wa-automate-nodejs is the most advanced NodeJS library which provides a high-level API to control WA. Want to convert your WA account to an API instantly? You can now with the CLI. For more details see Easy API. After executing create() function, @open-wa/wa-automate will create an instance of WA web. If you are not logged in, it will print a QR code in the terminal. Scan it with your phone and you are ready to go! @open-wa/wa-automate will remember the session so there is no need to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Sealed Secrets for Kubernetes

    Sealed Secrets for Kubernetes

    A Kubernetes controller and tool for one-way encrypted Secrets

    Sealed Secrets provides declarative Kubernetes Secret Management in a secure way. Since the Sealed Secrets are encrypted, they can be safely stored in a code repository. This enables an easy-to-implement GitOps flow that is very popular among the OSS community. Sealed Secrets offers a powerful CLI tool (kubeseal) to one-way encrypt your Kubernetes Secret easily. The Sealed Secrets controller will decrypt any Sealed Secret into its equivalent Kubernetes Secret. Sealed Secrets are safe to store in your local code repository, along with the rest of your configuration.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place. Icon
    Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place.

    For healthcare Providers and Facilities

    Incredable streamlines and simplifies the complex process of medical credentialing for hospitals and medical facilities, helping you save valuable time, reduce costs, and minimize risks. With Incredable, you can effortlessly manage all your healthcare providers and their credentials within a single, unified platform. Our state-of-the-art technology ensures top-notch data security, giving you peace of mind.
    Learn More
  • 5
    Standard Notes App

    Standard Notes App

    Think fearlessly with end-to-end encrypted notes and files

    Standard Notes is a free, secure note-taking app with powerful end-to-end encryption, unparalleled privacy features, and seamless cross-platform syncing on unlimited devices. Standard Notes is a secure digital notes app that protects your notes and files with audited, industry-leading end-to-end encryption. Only you have access to the keys required to decrypt your data. Write and store all your notes and files in one secure place and seamlessly access them across all your devices....
    Downloads: 6 This Week
    Last Update:
    See Project
  • 6
    transfer.sh

    transfer.sh

    Easy and fast file sharing from the command-line

    Easy and fast file sharing from the command-line. This code contains the server with everything you need to create your own instance. Transfer.sh currently supports the s3 (Amazon S3), gdrive (Google Drive), storj (Storj) providers, and local file system (local). For easy deployment, we've created a Docker container. For the usage with a AWS S3 Bucket, you just need to specify the following options, provider, aws-access-key, aws-secret-key, bucket, and s3-region. If you specify the...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 7
    SunVirgo-teaching-assistant

    SunVirgo-teaching-assistant

    Mentor, code c, c++, java, go, php, swift, .. DevSecOps virtual lab, .

    Menor, code c, c++, java, python, go, php, swift, .., DevSecOps virtual lab, .. This software is provided as a demonstration build. Redistribution of the binary is allowed for academic evaluation only. More previously completed projects will be released incrementally as executable packages are rebuilt for public distribution. www.youtube.com/embed/fzoISpZv5d0?rel=0
    Downloads: 9 This Week
    Last Update:
    See Project
  • 8
    wechat-bot

    wechat-bot

    PC WeChat chat robot with secondary development interface

    The client sends a friend text message (supports websocket and HTTP). The client obtains the wxid and name of the friend in the address book (supports websocket and HTTP). The client sends a picture to a friend (supports websocket and HTTP). Sends an AT message (support websocket and HTTP). Send attachments (only support HTTP, weboscket). Get chatroom member list (wxid) and nickname (support websocket and HTTP). Please refer to the sample code of client.js (websocket client) and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Aurora Files

    Aurora Files

    Your files in your cloud on your rules

    Aurora Files is an open-source file storage platform for small teams and personal users.
    Downloads: 5 This Week
    Last Update:
    See Project
  • Dun and Bradstreet Risk Analytics - Supplier Intelligence Icon
    Dun and Bradstreet Risk Analytics - Supplier Intelligence

    Use an AI-powered solution for supply and compliance teams who want to mitigate costly supplier risks intelligently.

    Risk, procurement, and compliance teams across the globe are under pressure to deal with geopolitical and business risks. Third-party risk exposure is impacted by rapidly scaling complexity in domestic and cross-border businesses, along with complicated and diverse regulations. It is extremely important for companies to proactively manage their third-party relationships. An AI-powered solution to mitigate and monitor counterparty risks on a continuous basis, this cutting-edge platform is powered by D&B’s Data Cloud with 520M+ Global Business Records and 2B+ yearly updates for third-party risk insights. With high-risk procurement alerts and multibillion match points, D&B Risk Analytics leverages best-in-class risk data to help drive informed decisions. Perform quick and comprehensive screening, using intelligent workflows. Receive ongoing alerts of key business indicators and disruptions.
    Learn More
  • 10

    commons-crypt

    A library for easy use of symmetric encryption and decryption in java

    A library for easy use of symmetric encryption and decryption in java. Encrypt and decrypt with one line of code using common algorithms like AES. Requires Java 7 or later.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Simplify

    Simplify

    Android virtual machine and deobfuscator

    ...For example, any if or switch conditional with an unknown value results in both branches being taken. Analyzes the execution graphs from smalivm and applies optimizations such as constant propagation, dead code removal, unreflection, and some peephole optimizations. These are fairly simple, but when applied together repeatedly, they'll decrypt strings, remove reflection, and greatly simplify code. It does not rename methods and classes.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    Steganography

    Steganography

    Steganography library for Processing

    ...A library for Processing that can embed text and images into a carrier image. The hidden image or text is encrypted for additional security and requires a password or better still a pass phrase to retrieve and decrypt the hidden message. There is no source code difference between 1.0.1 and 1.0.2 it simply corrects the library URL in the supporting documentation used by the Processing Foundation.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    sjcl

    sjcl

    Stanford Javascript Crypto Library

    The Stanford Javascript Crypto Library is a project by the Stanford Computer Security Lab to build a secure, powerful, fast, small, easy-to-use, cross-browser library for cryptography in Javascript. SJCL is small but powerful. The minified version of the library is under 6.4KB compressed, and yet it posts impressive speed results. SJCL is secure. It uses the industry-standard AES algorithm at 128, 192 or 256 bits; the SHA256 hash function; the HMAC authentication code; the PBKDF2 password...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    iText®, a JAVA PDF library

    iText®, a JAVA PDF library

    PDF Library for Developers

    iText is an open-source PDF library available for Java and .NET (C#). iText allows you to effortlessly generate and manipulate standards-compliant PDF documents with a powerful and feature-rich SDK. With iText, you can create archivable and accessible PDFs, split and merge documents, fill and flatten forms, digitally sign documents, and more. iText add-ons enable additional functionality, such as PDF creation from HTML templates, secure redaction, OCR, and much more. The latest...
    Leader badge
    Downloads: 240 This Week
    Last Update:
    See Project
  • 15
    StrongKey CryptoEngine

    StrongKey CryptoEngine

    FIDO strong authentication, encryption, digital signature engine

    StrongKey CryptoEngine (SKCE) 2.0 is a "crypto Swiss Army knife" server to perform cryptographic functions through web services, while freeing application developers to focus on business functionality. Its modules include: - A FIDO Engine to support FIDO U2F key registrations/authentications - An encryption engine to encrypt/decrypt files using AES/TDES keys - Escrowing keys to on-premises key management system (StrongAuth KeyAppliance/SAKA) - Integration to cloud storage services (AWS S3, Azure and Eucalyptus Walrus) - A signing engine to digitally sign documents, code, etc. with FIPS 140-2 HSM support - An LDAP Engine for AD/LDAP integration for authorization decisions SKCE is battle-tested and in production at one of the largest e-commerce companies in the world, protecting more than 50M documents within the business process; see http://bit.ly/14VPYlO for the case study. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    CryptoToolsPack

    CryptoToolsPack

    Basic encode/decode, files comparison and protect sensitive data

    This pack includes the following: FCSG - generate checksum and perform file comparison; JCryptoTool - encrypt/decrypt messages and files; JWallet - password protect sensitive information. See Help menu in each application, Source code included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Imetion Security Castle
    Imetion Security Castle is a Best Tool Kit for protect your Datas. You can Encrypt your Text files, rich text files, code text files and electronic voice encrypt file and zip any files in your own extentions like *.zip/ *.rar/ *.mp3/ *.mp4 ect. **
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    BinaryCrypt

    BinaryCrypt

    Binary Conversion Calculator

    With BinaryCrypt, you can convert between regular text, binary, hexadecimal, octal decimal and decimal. You can convert only decimal (as of right now) to any base up to base 64. You can also save your converted text to a file or open a converted text file to decrypt the message, and perform basic arithmetic in binary. The git repo for the C# code is located at: https://github.com/m1r4g3/BinaryCrypt-.Net
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    TEACryptor

    TEACryptor

    Encrypts text files

    Uses the Tiny Encryption Algorithm to encrypt text files. This program can only encrypt text files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    ISC - The ISAAC Stream Cipher

    ISC - The ISAAC Stream Cipher

    ISC lets you encrypt & decrypt text and files of any type up to 4GB

    ISAAC is a cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It was developed by Bob Jenkins from 1993-1996 and placed in the Public Domain. ISAAC is fast - especially when optimised - and portable to most architectures in nearly all programming and scripting languages. After more than 20 years of existence ISAAC has not been broken, and the little program you have here allows you to use it to encrypt and decrypt text of arbitrary length, files of any...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    e-Exam

    e-Exam

    Testing students has never been easier!

    This program is a replacement to paper-based exams. You have to write the test in a text file and then load it from the program. From there you have the option of choosing exactly how many questions you want in the test (the questions will be chosen at random), you can also randomize the order of the possible answers of all of the questions (while still maintaining the "right" correct answers), or if you want you can also randomize the order of the questions. You will also be prompted for a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    Thesis-Password retrieval from Windows

    Thesis project: Password retrieval from Windows

    FOR EDUCATIONAL PURPOSES ONLY. Unauthorized credential retrieval from a computer running Windows. Code to automate/combine of already finished projects to retrieve username and password from Windows partitions using linux running from a usb storage device, using tools as bkhive, samdump2, rcracki_mt to process core files from within the windows system to get the NTLM hash and rainbow tables to decrypt it. I do not have and do not claim ownership of any intellectual property not produced by me. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Substitution Cipher Decryption

    Decrypt messages encrypted with a substitution cipher

    The provided program helps the user with the deciphering of a substitution cipher with the 26 letter alphabet by providing the following features • Dynamic entering of ciphertext. Ciphertext can be modified at any point of the process. • Easy location of corresponding characters in the ciphertext and the substituted text by selection. • Fast frequency analysis for single letters, bigrams, trigrams and quadgrams (more N -grams can be made available by adding a single line of code). •...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    HTML Encrypter

    HTML Encrypter

    Java based HTML encrypter and decrypter

    An encryption and decryption application developed in Java. The application uses a number of algorithms to encrypt and decrypt the HTML source code: Blowfish, AES, TEA, Rabbit, MARC 4, Escape/Unescape functions. In addition to the encryption and decryption functions, the application also returns the source code of a website. The user has the ability to upload the encrypted file, using the FTP transfer feature, to his or hers personal website. Additional features are listed below.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    SLEncrypt is a python module for encryption with 11 ciphers at the moment, including ADFGVX, Autokey, Caesar/ROT13, Vigenere, XOR and a lot more. It contains functions allowing you to easily encrypt/decrypt files. The code is about 95% PEP 8 compilant.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next