Showing 203 open source projects for "text-to-video"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 1
    Bigram Table Generator

    Bigram Table Generator

    A program to generate random reciprocal bigram tables

    A command-line program to encrypt/decrypt a message using a random reciprocal bigram table and write a bigram table to a text file. Executing the program without any command-line arguments starts bigram in message encryption/decryption mode. The program prompts for a password or passphrase and a message to encrypt/ decrypt. After the message is entered the ciphertext is displayed. Executing the program with command-line arguments causes bigram to generate a random bigram table to print...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2

    Schuler's OpenCL Scrypt

    My personal version of OpenCL Scrypt tunned for my own video card.

    I've been doing some changes to the OpenCL Scrypt implementation and I've decided to share it. You may use it at your own risk. This implementation seems to be 5% faster in an ATI R9 video card. The original source code has been copied from https://github.com/ckolivas/cgminer.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    innocence-java

    Replace text with POS equivalent text, in a reversible fashion.

    Program takes (currently) english text sentences, and replaces each word in a given sentence with another word having the same Part of Speach (POS) tag. This creates a new sentence containing none of the original words. This new sentence can then be transmitted to a remote user, and using the same software, "de-crypted" into yielding the original sentence. The software relies on having a known "seed" value for the random number generator, which is known only by the sender and receiver...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    JCryptor

    JCryptor is an encrypting tool based on the Caesar-cipher.

    JCryptor uses the Caesar-cipher to encrypt keystrokes on-the-fly. It can also be used to decrypt an encrypted text easily. Caesar-cipher is a simple encryption algorithm, developed by Julius Caesar, to encrypt his correspondence with Cicero in the ancient world. Therefore it uses a simple character substitution method to replace a given character by another. A keyshift of thirteen is called ROT13. ROT13 can be decrypted by encrypting it again with ROT13. Even today this simple method is used...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
    Learn More
  • 5
    EnigmaGPG Community

    EnigmaGPG Community

    Sending encrypted data through internet web applications.

    Enigma GPG Community allows you to encrypt / sign text and attachments using plugins in browsers, to send encrypted information via any Internet application that can only be understood by the intended recipient ensuring the authenticity, privacy and confidentiality of messages between the sender and receiver . Note the utility that can achieve this project because it aims to meet the global need for privacy on the web. Also applies to any web application that allows text input by the user...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    IoN text Encrypter

    A Text Encryption Program

    A Text Encryption Program Writen In VB.net
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    TextShade

    TextShade

    Strong text encryption app with web-based decryptor.

    Have information that’s for your eyes only? Add some more peace of mind. Want to send a message to someone securely? It's never been easier.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Mcrypt-shell

    Mcrypt-shell

    Gui shell for linux mcrypt util written on Qt.

    Gui shell for linux mcrypt util written on Qt with integrated file-manager, hex and text editor, compress function. It uses symmetric encryption provided by mcrypt, with no signature and crc writen to file (--no-openpgp --bare). No list of encrypted files or logs are created, no temp files writed on disk during process of encryption/decryption. Included Manage keys dialog for storing used keys (it will encrypted by password), or you can type "one-time" key. This project created for SibGTU...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Hydrocon IRC Bot

    irc bot multi-threaded, ddos, code execution, and more

    Hydrocon IRC bot public 1.7 this is a IRC bot that is compiled with codeblocks and the mingw32 compiler. It is fully multi-threaded melts on execution, runs on start up. it has great stability and efficiency . also has the ability to execute remote code and and execute cmd commands along with ddos and more, 16 option's in total. updates coming soon.
    Downloads: 0 This Week
    Last Update:
    See Project
  • The Voice API that just works | Twilio Icon
    The Voice API that just works | Twilio

    Build a scalable voice experience with the API that's connecting millions around the world.

    With Twilio Voice, you can build unique phone call experiences with one API, to create, receive, control and monitor calls with just a few lines of code. Create an engaging voice experience that you can quickly scale and modify with a wide array of customization options and resources.
    Learn More
  • 10
    Codegroup

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    Codegroup is a Java application that will allow one to convert binary (or text) computer files in to 5 letter codegroups for transmission over email, landline telephones, radioteletype or Morse Code. Codegroup has internal error correction & limited cryptography capabilities. Codegroup : ZZZZZ YBPIL AIAIG FMOPP CPAAA DGNGP GPGPA ADNJN ELJKO ELIMO GEOHF KIFGP IFBCB PKCPI YJMHE PHBHP PPOBH NCOHD AKLLL AGHFP DEGEF LKELC EAIJI ABAGP AHPPO IHHPH OHPDF YNFPB ALEPO KMPKP Once this program...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    MyPasswords

    MyPasswords

    Personal Password Manager

    What you need for managing your passwords, including the passwords of your online accounts, bank accounts and ... with the corresponding URLs. The passwords are encrypted by AES. Can be used on almost all operating systems including Windows & Linux.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    PasswordGenerator

    PasswordGenerator

    A free Password Generator written in Java

    next version is 2.4.6
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13

    Substitution Cipher Decryption

    Decrypt messages encrypted with a substitution cipher

    The provided program helps the user with the deciphering of a substitution cipher with the 26 letter alphabet by providing the following features • Dynamic entering of ciphertext. Ciphertext can be modified at any point of the process. • Easy location of corresponding characters in the ciphertext and the substituted text by selection. • Fast frequency analysis for single letters, bigrams, trigrams and quadgrams (more N -grams can be made available by adding a single line of code...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    Maroniecoder

    Maroniecoder

    Encrypt a text through a list of encryption methods

    I came to the conclusion that this program is not worth the time for further development. Use different Encryption methods with parameters to en- or decrypted a text through the list With downloadable source-code since 1.3 You need to have Java installed http://www.oracle.com/technetwork/java/javase/downloads/index.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Enigmatic CGI pastebin
    Simple CGI script which allows you to transfer sensitive ascii data (passwords, hashes, pem keys) via HTTPS. SSL MUST BE implemented by webserver. Algorithm: - Paste new data into textarea, submit. You get link Link consists of three md5 hashes from salt. File, containing your data, named that way. So, it is hard to bruteforce links/files. - Whenever link being opened, script reads file and prints its content into brower in text/plain content-type. Afterthat, script removes file. So...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    FileEncoderDecoder

    File Encoder And Decoder

    Encoder.jar utility enrypts any file (containing text like .txt, .rtf, .html, .htm, .msg, .xml, etc.) and generates an encoded file. This encoded file may then be transferred via email or other medium from the source machine and can be decoded back to original on the target machine. The target machine should have Decoder.jar in order to reproduce it back to the original form. Decoder.jar decrypts an encoded file and regenerates the original file. Use : java -jar Encoder.jar java -jar...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    javawebutils

    web application utilities

    This library contains utility classes such as a converter from plain text to HTML (for safe inclusion of user-supplied text into web pages, avoiding XSS attacks, etc.), converters from binary to hex representation, and similar functions
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    vCrypto

    vCrypto

    Encoding Decoding and Encryption Decryption

    vCrypto can be used to have secret text based conversations. Use this application to Encode your message and then send the encoded message to your desired recepient. Also, for enhanced security one can encode the message into a file which will be encrypted with a user provided password. Send that file to your desired recepient and then use this application to decrypt and decode the message from the file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    GPG-Crypter
    GPG-Crypter is a graphical front-end to GnuPG(GPG) using the GTK3 toolkit and GPGME library. It has been developed to provide an easy access to GPG encryption and decryption. It supports encryption and decryption of text entered into the program's input fields. It also supports file encryption and decryption.
    Downloads: 37 This Week
    Last Update:
    See Project
  • 20

    Text Shade

    Web based message encryption software

    TextShade allows you to create and send encrypted messages via a web interface. As long as your recipient knows the password, they can decrypt your message via the website. You can use the free online version at http://www.textshade.com, or install the PHP software on your own server for additional privacy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    My Text is Treasure
    It is a simple password manager for your PC and Smartphone. It works like a text editor and uses a strong cryptography algorithm to generate the end file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    HTTP Anti Flood/DoS Security Module

    HTTP Anti Flood/DoS Security Module

    Detect Flooder IPs, Reduce Attack Surface against HTTP Flood Attacks

    This module provides attack surface reduction enhancements against the HTTP Flood Attacks at the web application level. Massive crawling/scanning tools, HTTP Flood tools can be detected and blocked by this module via htaccess, firewall or iptables, etc. (like mod_evasive) You can use this module by including "iosec.php" to any PHP file which wants to be protected. You can test module here: http://www.iosec.org/test.php (demo) Watch the Proof of Concept video: http://goo.gl/dSiAL...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23

    Johnnyjinkle Bundle

    Bundle of my noobish software

    This software bundle contains: a 2d video game, a random password generator, a unit conversion program, stopwatch/countdown programs, two calculator apps, a cmd slotmachine game, and a cmd texteditor NOTE: I make this software as a hobby, It is by know means professional software.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    ANPR for National Borders

    ANPR for National Borders Systems

    ... together with an open source OCR system. The output is going to be a text version of the plate number. Then it is going to retrieve that number from a database and get the information of the vehicle owner. Note: Please note that you need emgucv installed. you also need to move the project files to: C:\Emgu\emgucv-windows-x86XXX\Emgu.CV.Example\ Please note: that the project was created using visual studio 2003, on windows xp. and it might not run fluently on newer versions. please try to update it.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 25

    Cryptkeeper

    Cryptkeeper Secuirty tool

    In this program you will find tools like : Rawdata tool , file encryption , text encryption , program updater , program protecter , password manager , program settings , defult settings , settings viewer and the last is the file hashing. the file hashing you can use 6 hashing types for the file encryption 1 since i ran out of time for it , and the text encryption has 17 different types 12 encrypt and 5 hashing types. some uses encryption keys and some dont. there are AES , 4DES...
    Downloads: 0 This Week
    Last Update:
    See Project