Showing 13 open source projects for "byte on"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 1
    denuvo

    denuvo

    DENUVO (VMProtect 2.6x) VM research tool

    ...DENUVO_Profiler is a subsequent development of the SecuROM_Profiler utility - the simplest tool for visualising the operation of a virtual machine and effectively controlling the data it uses in the byte-code tape (p-code). DENUVO_Profiler also hunts for Electronic Arts (Origin) licence containers on the current user's machine and can extract their contents, with including the GameToken. # See also: 80_PA SecuROM keygen
    Downloads: 71 This Week
    Last Update:
    See Project
  • 2
    PureBasic Shamir Secret Sharing

    PureBasic Shamir Secret Sharing

    Open-source PureBasic implementation of the Shamir Secret Sharing

    ...Shamir Secret Sharing is a cryptographic method that splits a secret into multiple parts (shares), such that any combination of at least T shares can reconstruct the original secret, while any number of shares fewer than T reveals no usable information. This implementation operates over the finite field GF(257), allowing correct handling of all byte values (0–255) without loss, making it compatible with any type of string or binary-compatible data. Main Features Complete implementation of Shamir Secret Sharing Arithmetic over GF(257) Compatible with all character strings Robust Lagrange interpolation Safe modular inverse computation Shares encoded in hexadecimal (3 characters per byte) Clear, well-commented source code ⚠️ Disclaimer This project is intended for educational and demonstration
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    PQS

    PQS

    Petoron Quantum Standard (PQS)

    ...PBKDF2-HMAC-SHA256 (200k iterations, adjustable) for password hardening. Key separation via BLAKE2s - independent keys for encryption and MAC. BLAKE2s-MAC authentication - 16-byte tag, any modification = instant rejection. Streaming keystream generator - secure, large-scale XOR without key reuse. Fake padding (HEAD/TAIL) - obfuscates binary boundaries and payload structure. Precise size encoding - restores original payload exactly. Supports files up to 128 MB per encrypted block. No dependencies, fully offline, cross-platform Python implementation. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    d-crypt

    Tweakable 256-bit symmetrical block cipher.

    ...Features a similar structure as AES (uses simpler versions of ShiftRows, MixColumns) and uses AES SBOX. It is an SP network. The Key Schedule is a different from AES's, however the Expansion is partially inspired in AES. The 256-bit key is turned into a 576-byte expanded key which is used in every key addition round. D-crypt performs a total of 18 rounds: Firstly it does a SBOX round, and a XOR keyaddition with the first 32bytes of the expanded key, Secondly it does 16 rounds of MixcColums, ShiftRows, KeyAddition (this step is determined by the tweak) and SBOX, and finally, it does an final round of SBOX followed by a final round of XOR key addition, providing key whitening. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 5

    ANNFiD

    A forensic file identification tool using neural networks

    Just carved a bunch of bytes and have no idea what they could be? Maybe ANNFiD can help. ANNFiD uses neural network to identify byte patterns. It can be trained and has a GUI to help in the process. The tool is still on a very early stage, but could improve exponentially with the help of the developer community
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Bwst

    BWST is a short word for Brute-force Word-list Segmentation Technique.

    Simply, it’s a brute-force word list generating application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    pngacidbath is the one true PNG image brute force compressor. While other tools simply run down a list of "intelligent" compressor algorithms (some known as zlib methods), pngacidbath tries every byte combination to come up with THE smallest file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Image Encryption encypts a text into an image, by appling an offset to each single byte.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A pure python module which implements the DES and Triple-DES encryption algorithms. Triple DES is either DES-EDE3 with a 24 byte key, or DES-EDE2 with a 16 byte key.
    Downloads: 3 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 10
    A encryption library for C++ "DEL-X" that uses a 3d encryption algorithm. It can work with any key size from 8bit- 4096bit with a 512 byte block size.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    SJEA version 1.0 - Simple Java Encryption Algorithm. SJEA is a simple command-line binary encryption algorithm (symmetric block cipher) written in JAVA. It uses a password and a byte-vector array to scramble the input file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    MUSASH provides a utility to digest text, file and a byte char. It also able to compare two files, compare file, text and char to a hash. It also allows user to search for a string that evaluates to a hash given. Supported algo: MD5, SHA1 and SHA2 family
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The Moonbounce API is a set of high level objects that encapsulate pieces of the Bouncycastle lightweight crypto API. Moonbounce significantly simplifies RSA key generation, signing, encryption/decryption and verification of both byte arrays and files.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB