Showing 404 open source projects for "algorithms"

View related business solutions
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    Advanced Onion Router
    Advanced Onion Router is a portable client for the OR network and is intended to be an improved alternative for Tor+Vidalia+Privoxy bundle for Windows users. Some of the improvements include UNICODE paths, support for HTTP and HTTPS proxy protocols on the same Socks4/Socks5 port with HTTP header filtering that generates fake identity-dependent headers every time the identity is changed (proxy chains are also supported), support for NTLM proxies, a User Interface that makes Tor's options and...
    Leader badge
    Downloads: 138 This Week
    Last Update:
    See Project
  • 2

    openSSLGOSTSigner

    Simple GUI tool for openssl to sign files with GOST algorithm

    This software is a simple GUI tool which uses openssl command line utility underneath. It designed to sign any type of files with GOST algorithm (GOST cipher) and will be especially useful for russian ISP's and IT companies which in one way or another have to deal with Roskomnadzor's forbidden sites list to reduce the timewaste while typing in commandline each time you need to sign some file. To use this software you will need to have a ".PEM" file(which exactly used to sign files). If you...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    CryptoLibraryRefImpl

    encapsulates secure crypto algorithms for easy use

    This library exposes security functionality to the programmer, such as random number generation, hashing, salted hashing, message authentication code, symmetric encryption, asymmetric encryption, hybrid encryption, digital signature and in-memory protection. The library is accompanied by a sophisticated reference implementation, that demonstrates how to make use of the CryptoLibrary.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    A simple GUI for the mdcrack application. -MDCrack is a free featureful password cracker designed to bruteforce 21 algorithms: MD2, MD4, MD5, HMAC-MD4, HMAC-MD5, FreeBSD, Apache, NTLMv1, IOS and PIX (both enable and user) hashes,-
    Leader badge
    Downloads: 3 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 5
    Google Authenticator OpenSource

    Google Authenticator OpenSource

    Open source version of Google Authenticator (except the Android app)

    Google Authenticator is the open-source counterpart of Google’s one-time passcode apps, implementing industry-standard OATH algorithms such as TOTP (time-based) and HOTP (counter-based) for two-factor authentication. The repository historically hosts code for mobile platforms like iOS and BlackBerry, demonstrating how to generate numeric codes locally without needing network access. Its core purpose is to help services and users add a second factor that’s simple to deploy yet resistant to password reuse and phishing. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6

    TEAENCRYPTION

    A TEA encryption with GUI for 32-bit 64-bit works only on windows.

    A algorithm encryption based on TEA (Tiny encryption Algorithm) that will help the user to encrypt his text files and decrypt whenever the user wants as long as he uses the same key.It is simple to use but doesnt work with really really long text files.Will implement mac and other OS in the future.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    Ncrypt

    Text and image encryption and decryption software

    This software provides a mean for users to encrypt and decrypt data in the form of text and images. The program follows a basic encryption algorithm that relies on mathematical properties of matrices, such as row operations, matrix multiplication, and invertible matrices . This program works by allowing the user to input a key in the form of a matrix, on which the program bases the encryption. The program then performs the encryption. The software only works in the scope of text files with a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    This tool can create one-time-password values based on HOTP (RFC 4226: HOTP: An HMAC-Based One-Time Password Algorithm), TOTP (RFC 6238: TOTP: Time-Based One-Time Password Algorithm) and OCRA (RFC 6287: OCRA: OATH Challenge-Response Algorithm) standards, and also supports client side of OAuth protocols (1.0a, 2.0).
    Downloads: 14 This Week
    Last Update:
    See Project
  • 9
    JBrute

    JBrute

    Open Source Security tool to audit hashed passwords.

    ...It is focused to provide multi-platform support and flexible parameters to cover most of the possible password-auditing scenarios. Java Runtime version 1.7 or higher is required for running JBrute. Supported algorithms: MD5 MD4 SHA-256 SHA-512 MD5CRYPT SHA1 ORACLE-10G ORACLE-11G NTLM LM MSSQL-2000 MSSQL-2005 MSSQL-2012 MYSQL-322 MYSQL-411 POSTGRESQL SYBASE-ASE1502 INFORMIX-1170 To see syntax examples: https://sourceforge.net/p/jbrute/wiki/Examples To see last news: https://sourceforge.net/p/jbrute/blog FAQ: https://sourceforge.net/p/jbrute/wiki/FAQ/ General questions: jbrute-users@lists.sourceforge.net (you can suscribe to mailing list at https://lists.sourceforge.net/lists/listinfo/jbrute-users) Author: Gonzalo L. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 10

    [C#] Secure Shredder Console

    A console file shredder that supports many algorithms.

    ...The program is written in C# .NET. The source code is also available for download and you may contribute to the development here. If you want a clear explanation on how each of the algorithms work, please refer here: http://www.phoebekwok.com/publications/GJY_SecureDataShredder.pdf
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11

    The Encode

    Encode your text files

    This software is intended to encode your text files efficiently. You can decode them later using the same algorithm you used to encode it. Encode is professionalism packed simply and freely. You can use Encode for any non-illegal purposes. You can make any number of copies and redistribute Encode as it is.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    MicroZip

    MicroZip

    Create,extract and encrypt ZIP,GZIP,TAR,BZIP2,TAZ files on Java mobile

    MicroZip is a powerful file compression and encryption utility for mobile phones which allows you to create and extract compressed archives in multiple formats and encrypt sensitive information with powerful AES-256 encryption. MicroZip can create and extract ZIP,TAR,TGZ,TBZ2 archives and extract many other formats as JAR,GZ,BZ2,TBZ,WAR,BZIP2,GZIP,Z,TAZ,CBZ etc. MicroZip allows you to extract selected files without extracting the whole ZIP archive. MicroZip also supports encrypted ZIP...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 13
    Quick Hash GUI

    Quick Hash GUI

    Linux, Windows and Apple Mac File Hashing GUI Tool

    This project has moved to www.quickhash-gui.org as of 2016-12-04. I kept v2.6.9.2 and below hosted here since Dec 16 but too many people were ignoring the fact that no updates were being posted here. For the latest QuickHash v2.8.4 release (Aug 28th 2017), go to www.quickhash-gui.org, and note that as of 29/12/16 a Debian package is also available
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    File Locker

    File Locker

    Lock and unlock files easily in Windows

    Lock and unlock your personal files easily with this tool. You can just right click on a file and immediately lock it with your password. And when a file is locked, you can just double click it and enter your password to open it. It uses serious encryption algorithm, so be careful with your password! If you forget it, your file might permanently get unlockable.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 15
    OpenShredder

    OpenShredder

    File Shredder Project

    Openshredder is os independent secure file deletion tool.It is very light weight and useful.It uses standard Zero and DoD algorithms.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 16

    Primes

    Calculate primes by using extremely fast sorting

    This project considers the problem of calculating primes as a sorting problem. It includes the most efficient tree-based sorting algorithm that is possible and shows that finding a new prime can be done by sorting the differences between the previous primes in the right way. Unfortunately it has turned out that going this way is even more slowly than trying to find primes by brute force. So it can only be used as a test with heavy load for the sorting algorithm, which can be used for...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    ArpON

    ArpON

    ARP handler inspection

    ArpON (ARP handler inspection) is a Host-based solution that make the ARP standardized protocol secure in order to avoid the Man In The Middle (MITM) attack through the ARP spoofing, ARP cache poisoning or ARP poison routing attack.
    Leader badge
    Downloads: 95 This Week
    Last Update:
    See Project
  • 18

    Cryptography Tools

    Classic & Modern Cryptography tools

    Cryptography Tools is a project to develop demonstration tools on classic (currently Caesar and Playfair) & modern crypto-systems, including private & public key encryptions, digital signatures, cryptographic hashes and authenticated encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    FACPL - Access control policies

    FACPL - Access control policies

    A Java library for Attribute-based Access Control Policies

    FACPL: a Java-based library for the specification and enforcement of Access Control policies - Attribute-based Access Control Policies - Advanced features for the management of, e.g., combining algorithms and missing attributes - Generation of XACML code starting from FACPL code - Generation of FACPL code starting from XACML code Source Code: https://github.com/andreamargheri/FACPL/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    JavaCard-AlgTest-Applet

    JavaCard-AlgTest-Applet

    Smart Card/java card automated testing tool for algorithms.

    Automated testing tool for algorithms supported by all smart card with JavaCard platform. To view all files about this project or discussion, you can visit:
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    CrypSten

    A Hybrid Cryptosystem with Steganography DLL

    A library written in Visual C# for encrypting a text message into an image file, and decrypting an image file to get the text message using Rijndael Algorithm, RSA Algorithm, and LSB Substitution Algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    jPass - Cross-Platform Password Manager

    jPass - Cross-Platform Password Manager

    Compiled into a single .jar file. Tiny Password Manager. Portable

    I did not see a pre-built version of this software on the original developers Github project (https://github.com/gaborbata/jpass), so I am taking it upon myself to compile the releases as they come, so that others don't have to. --Description-- JPass is a simple, small, portable password manager application with strong encryption. It allows you to store user names, passwords, URLs and generic notes in an encrypted file protected by one master password. I will not add the source...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    LDWM: Hash-Based Signatures (draft-mcgrew-hash-sigs-02), PHP implementation of IETF pqcrypto algorithm specification
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    cl-string-match

    String matching algorithms implementation for Lisp

    Common Lisp provides a SEARCH function to lookup given keys in a string, but its implementation can be subotimal: it can be beaten in some cases by even the simpliest brute-force algorithm. This project is aimed at implementing robust string matching algorithms for Common Lisp.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    d-crypt

    Tweakable 256-bit symmetrical block cipher.

    ...The cipher takes 3 inputs: the data to encrypt, the symmetric key and a tweak consisting in a array of 16 integers representing each one of eleven possible keyaddition algorithms. Features a similar structure as AES (uses simpler versions of ShiftRows, MixColumns) and uses AES SBOX. It is an SP network. The Key Schedule is a different from AES's, however the Expansion is partially inspired in AES. The 256-bit key is turned into a 576-byte expanded key which is used in every key addition round. D-crypt performs a total of 18 rounds: Firstly it does a SBOX round, and a XOR keyaddition with the first 32bytes of the expanded key, Secondly it does 16 rounds of MixcColums, ShiftRows, KeyAddition (this step is determined by the tweak) and SBOX, and finally, it does an final round of SBOX followed by a final round of XOR key addition, providing key whitening. ...
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB