Showing 84 open source projects for "aes key generator"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 1
    Cryptomator

    Cryptomator

    Multi-platform transparent client-side encryption for your cloud files

    Cryptomator is a free and open source project that offers multi-platform, transparent client side encryption of your files in the cloud. It works with just about any cloud storage service; is totally transparent so you can work with your files how you normally would; and secure with a 256-bit key length AES encryption. It’s also simple and easy to use with no need for different accounts, key management, cloud access grants or cipher configurations.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 2
    Themis

    Themis

    Easy to use cryptographic framework for data protection

    Cross-platform high-level cryptographic library. Themis helps to build simple and complex cryptographic features easily, quickly, and securely. It’s a perfect fit for multi-platform apps. Themis hides cryptographic details and eliminates popular mistakes. Themis provides ready-made building blocks (“cryptosystems”) for secure data storage, message exchange, socket connections, and authentication. Secure Cell is a multi-mode cryptographic container suitable for storing anything from encrypted...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    KeePass

    KeePass

    A lightweight and easy-to-use password manager

    ...With so many passwords to remember and the need to vary passwords to protect your valuable data, it’s nice to have KeePass to manage your passwords in a secure way. KeePass puts all your passwords in a highly encrypted database and locks them with one master key or a key file. As a result, you only have to remember one single master password or select the key file to unlock the whole database. And the databases are encrypted using the best and most secure encryption algorithms currently known, AES and Twofish. See our features page for details.
    Leader badge
    Downloads: 402,656 This Week
    Last Update:
    See Project
  • 4
    Live-Forensicator

    Live-Forensicator

    A suite of Tools to aid Incidence Response and Live Forensics

    Live-Forensicator is a toolkit intended for live forensic collection and initial triage on Windows machines. It automates the capture of volatile information—running processes, network connections, loaded drivers, account sessions, and in-memory artifacts—into a consistent artifact set that investigators can analyze offline. The tool tries to be non-invasive while collecting sensitive data quickly and logs the collection steps to preserve chain-of-custody details and to help auditors...
    Downloads: 7 This Week
    Last Update:
    See Project
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 5
    Speedcrypt File Encryption

    Speedcrypt File Encryption

    A File Encryptor with many Options and Powerful Algorithms!

    ...Speedcrypt is a free program for encrypt the files which helps you to manage in a secure way. The files are encrypted using the best and most Secure Encryption algorithms currently known: AES-GCM, AES RIJNDAEL, PGP, AES (String Crypto 256 Bit Key) SERPENT, CHACHA20, XCHACHA20-POLY1305. Speedcrypt is it really free, more than that: it is Open Source. You can have a look at its full source code and check whether the security features are implemented correctly.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    Pasword generator RORG

    Pasword generator RORG

    Securely generate passwords using UTF16 and Random.org

    This application offers the ability to generate passwords using atmospheric noise withthe service random.org or fully local key creation. The application generates random characters from the entire UTF-16 range and converts them into one long string. INSTALATION: No installation is needed. Simply extract the folder PR-RORG.zip and use it. The application keeps its settings (including the API key) in its folder located within C: Program Files. Frequently asked questions (FAQs) in...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 7
    Crypt Tool

    Crypt Tool

    A simple password manager for Windows based on OpenSSL

    A simple password manager for Windows based on OpenSSL (included). Allow encryption, decryption of messages, passwords, files and images with AES 256 CBC algorithm. Integrated FTP(S) client. Console based commands, random password generator. Stand alone application need no installer, runable from USB sticks. Working with Windows 7-11 (OpenSSL 1.1.1s 32 Bit) Read Wiki for more details.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 8
    Important: TITAN Security Suite is a commercial software product. A valid license key is required to activate and use the application. Enterprise security & AES-256 encryption for Windows systems Commercial and Enterprise licenses are available on our official website: https://www.coreguardtech.org Wichtiger Hinweis: Die TITAN Security Suite ist eine kommerzielle Software. Zur Aktivierung und Nutzung ist ein gültiger Lizenzschlüssel erforderlich. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Naeon

    Naeon

    The safest way to store private data in untrusted (cloud) environments

    Naeon is a data encryption and sharding method designed to secure data in potentially untrusted off-site storage locations. It uses AES-256 encryption with a randomly generated passphrase, followed by obfuscation techniques to make the encrypted file unidentifiable. The data is then sharded into one private chunk containing the encryption key and part of the data, and multiple public chunks. Each chunk is renamed using its SHA-512 hash, and all chunks are timestamped equally. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • 10
    PCA

    PCA

    binary encryption archiver

    Petoron Crypto Archiver (PCA) Key features: AES-256-CFB encryption with unique IV per archive Argon2id key derivation (256MB RAM / time_cost=3 / parallelism=4) HMAC-SHA512 integrity and anti-tampering check No compression, no fingerprinting, no trace of original data Works with both single files and entire directories Fully CLI-based, portable, and open format (.pca) https://github.com/01alekseev/PCA
    Downloads: 3 This Week
    Last Update:
    See Project
  • 11
    PTBC

    PTBC

    irreversible encryption with time self-destruction

    Petoron Time Burn Cipher (PTBC) A promising cipher based on self-destruction of time, complete absence of traces and impossibility of key selection. Key features: AES-CFB encryption with per-file IV Argon2id key derivation with 256MB RAM resistance TTL (time to live) built directly into the encrypted file HMAC-SHA512 integrity verification Self-deleting mode (--autowipe) and one-time access marking (--onetime) No file metadata, no recovery, no password resets Philosophy: If you lose the password - it’s over. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    ProxyCrypt

    Encrypted volumes through command line

    ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Encryption and decryption are made on the fly, allowing you to use encrypted volumes like normal ones. Designed for paranoids and advanced users, it is also fast, very lightweight, open source and easy to recompile. See the features below. It works as a "proxy" for the AIM driver or the ImDisk driver. AIM driver is included in the full package. See the documentation for more informations...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 13
    Stegcore

    Stegcore

    A cross-platform crypto-steganography toolkit

    Stegcore combines cryptography and steganography to hide encrypted data inside ordinary files. It encrypts your payload before embedding it, so the hidden content is unreadable even if someone extracts it, and invisible to anyone who doesn't know it's there. Unlike basic steganography tools that hide data without encrypting it, Stegcore ensures the payload is cryptographically protected at rest. Unlike pure encryption tools, the payload isn't even visible. Designed for journalists,...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    SafeNotes - Encrypted Journaling

    SafeNotes - Encrypted Journaling

    SafeNotes - A encrypted and easy-to-use journaling application

    SafeNotes is an encrypted and user-friendly note-taking application designed to keep your personal notes and journal entries safe and organized. With SafeNotes, you can easily create, edit, and manage your notes, all while ensuring your data is protected through robust AES-256 encryption and password hashing. The app features a sleek and intuitive interface built with MaterialSkin, offering light and dark themes to suit your preferences. SafeNotes is perfect for anyone looking to keep...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    PQS

    PQS

    Petoron Quantum Standard (PQS)

    ...PQS v1.2 is a minimalistic, self-contained encryption engine for secure file protection, with zero reliance on external cryptographic libraries. PBKDF2-HMAC-SHA256 (200k iterations, adjustable) for password hardening. Key separation via BLAKE2s - independent keys for encryption and MAC. BLAKE2s-MAC authentication - 16-byte tag, any modification = instant rejection. Streaming keystream generator - secure, large-scale XOR without key reuse. Fake padding (HEAD/TAIL) - obfuscates binary boundaries and payload structure. Precise size encoding - restores original payload exactly. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    DAR - Disk ARchive

    DAR - Disk ARchive

    For full, incremental, compressed and encrypted backups or archives

    DAR is a command-line backup and archiving tool that uses selective compression (not compressing already compressed files), strong encryption, may split an archive in different files of given size and provides on-fly hashing, supports differential backup with or without binary delta, ftp and sftp protocols to remote cloud storage Archive internal's catalog, allows very quick restoration even a single file from a huge, eventually sliced, compressed, encrypted archive eventually located on...
    Leader badge
    Downloads: 167 This Week
    Last Update:
    See Project
  • 17
    File Encrypter

    File Encrypter

    Encrypt your files fast and for free!

    ...Encryption helps protect files from unauthorized access by transforming the contents into a scrambled format using a secure encryption algorithm. File Decryption: Encrypted files can be decrypted effortlessly using the same encryption key that was used for encryption. This feature ensures that authorized users can access and restore the original contents of the files. Strong Encryption Algorithms: The application employs robust encryption algorithms, such as AES (Advanced Encryption Standard), to provide a high level of security for the encryption.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 18

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    ...Hash functions: BLAKE, BLAKE2, Echo, Esch, Groestl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, SHAKE, Skein, SM3, Streebog, Whirlpool. Block ciphers: Anubis, Aria, Camellia, CAST-256, Kalyna, Kuznyechik, Mars, Serpent, Simon, SM4, Speck, Threefish, Twofish, and Rijndael (AES) with all block/key sizes. Stream ciphers: HC-128, HC-256, Salsa20, XSalsa20, ChaCha, XChaCha. Encryption modes: CBC, CTR. AEAD modes: Encrypt-then-MAC (EtM), GCM, OCB, ChaCha-Poly1305, Schwaemm. Streaming AEAD. MAC functions: HMAC, Poly1305. Key derivation functions: PBKDF2, scrypt, Argon2, HKDF. Includes sample command-line tools: - 'digest' - for calculating and verifying file checksum(s) using any of the supported hash algorithms (similar to md5sum or RHash)...
    Leader badge
    Downloads: 29 This Week
    Last Update:
    See Project
  • 19

    OTP-Crypto-Tool

    Symetric file encryption based on OTP implemented as XOR encryption

    OTP (One Time Pad) In case you have any questions, contact me at: crypto-munition@gmx.de When used correctly, the OTP is an information-theoretically secure and demonstrably non-breakable encryption. The encryption process is implemented as symmetrical file encryption based on XOR encryption. The integrated pseudo-random generator serves only to illustrate and check the functionality. The use of this generator for REAL OTPs is not recommended. For REAL OTPs, hardware-based key generators (e.g. thermal noise of a pn junction, transistor or diode), white noise (e.g. out of tune radio) or other stochastic decay processes should be used. If used correctly, it cannot be decrypted by any intelligence service.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 20

    Passlock-Windows

    AES-Encrypted Password manager

    PassLock is a password manager and password generator that encrypts passwords using AES and saves them securely on your local machine. The password is encrypted and decrypted using a user-defined key and will get updated in each use. Extending the length of the private key will steadily improve the overall security. PassLock also generates a 40-bit long password consisting of lowercase, uppercase letters, numbers, and symbols Passlock's 220bit AES encryption and infinitely long password generator make your passwords nearly impossible to break and Its Console Based User Interface will definitely help to enhance your experience.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    KeyRandomizer is a simple yet customizable random key generator that can either generate a single key or multiple keys at once. KeyRandomizer also allow you to customize the generation parameters such as how long the key should be and what characters to generate (you can even put your own characters).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Halimede

    Halimede

    Halimede Certificate Authority

    Halimede is a simple to use Certificate Authority. It supports multiple CA (Certificate Authorities) from a single interface, with each CA is stored within it's own datastore instance. Halimede supports a large range of public key ciphers, including RSA, DSA, ECDSA (NIST/SEC/ANSI X9.62/Brainpool Curves), EdDSA (ED25519/ED448), GOST R34.10, DSTU 4145-2002 and numerous Post-Quantum Ciphers including Rainbow, SPHINCS-256, XMSS/XMSS-MT and qTESLA for X509 Certificate generation. Halimede...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Novel Insight Inner Circle

    Novel Insight Inner Circle

    Graphical message and file encryption tool

    Novel Insight Inner Circle is a message and file encryption tool for Windows. The software is developed in Java and requires 64bit Java JRE. The encryption uses AES-256 twice so it is harder to crack than the industry standard pure AES 256bit implementation (theoretical key size is 512 bit). The software writes encrypted data in ASCII text format which can be cut'n'pasted to messaging apps or to emails and back to Inner Circle when decrypting data. IMPORTANT: The software requires new OpenJDK 16 (Not Oracle's J2RE 1.8) to run. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Shaark

    Shaark

    Self-hosted platform to keep and share your content

    ...Code length and code expiration are also configurable. Test if you application can send emails before enabling this feature. Since 1.2.9, all chests data are encrypted in your database using AES-256-CBC and your app key. Others users can be admin or non-admin. Admin users are like the main user and have an access to the entire content.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    SSHTOOLS

    SSHTOOLS

    Java SSH API

    This project now hosts the third-generation of Java SSH API, Maverick Synergy. This API builds on the Maverick Legacy commercial APIs and delivers a new API in a unified client/server framework. This API is available to the community under the LGPL open source license. This update includes ed25519 support, support for the new OpenSSH private key file format and stronger key exchange algorithms. The project continues to host both the original API and legacy applications created around...
    Downloads: 3 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next
MongoDB Logo MongoDB