Showing 500 open source projects for "basic-256"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • The Most Powerful Software Platform for EHSQ and ESG Management Icon
    The Most Powerful Software Platform for EHSQ and ESG Management

    Addresses the needs of small businesses and large global organizations with thousands of users in multiple locations.

    Choose from a complete set of software solutions across EHSQ that address all aspects of top performing Environmental, Health and Safety, and Quality management programs.
    Learn More
  • 1
    Cryptomator

    Cryptomator

    Multi-platform transparent client-side encryption for your cloud files

    Cryptomator is a free and open source project that offers multi-platform, transparent client side encryption of your files in the cloud. It works with just about any cloud storage service; is totally transparent so you can work with your files how you normally would; and secure with a 256-bit key length AES encryption. It’s also simple and easy to use with no need for different accounts, key management, cloud access grants or cipher configurations.
    Downloads: 81 This Week
    Last Update:
    See Project
  • 2
    Themis

    Themis

    Easy to use cryptographic framework for data protection

    ...Secure Cell is a multi-mode cryptographic container suitable for storing anything from encrypted files to database records. Use Secure Cell to encrypt data at rest. Secure Cell is built around AES-256-GCM, and AES-256-CTR. Secure Message is a simple encrypted messaging solution for the widest scope of applications. Use Secure Message to send encrypted and signed data from one user to another, from client to server, to prevent MITM attacks and avoid single secret leakage. Based on ECC + ECDSA / RSA + PSS + PKCS#7.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 3
    KeePassXC

    KeePassXC

    KeePassXC is a cross-platform community-driven port

    Securely store passwords using industry-standard encryption, quickly auto-type them into desktop applications, and use our browser extension to log into websites. Complete database encryption using industry-standard 256-bit AES. Fully compatible with KeePass Password Safe formats. Your password database works offline and requires no internet connection. Every feature looks, feels, works, and is tested on Windows, macOS, and Linux. You can expect a seamless experience no matter which operating system you are using. The full source code is published under the terms of the GNU General Public License and made available on GitHub. ...
    Downloads: 39 This Week
    Last Update:
    See Project
  • 4
    fwknop

    fwknop

    Single Packet Authorization, Port Knocking

    fwknop stands for the "FireWall KNock OPerator", and implements an authorization scheme called Single Packet Authorization (SPA). This method of authorization is based around a default-drop packet filter (fwknop supports iptables and firewalld on Linux, ipfw on FreeBSD and Mac OS X, and PF on OpenBSD) and libpcap. SPA is essentially next-generation port knocking (more on this below). The design decisions that guide the development of fwknop can be found in the blog post "Single Packet...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Rezku Point of Sale Icon
    Rezku Point of Sale

    Designed for Real-World Restaurant Operations

    Rezku is an all-inclusive ordering platform and management solution for all types of restaurant and bar concepts. You can now get a fully custom branded downloadable smartphone ordering app for your restaurant exclusively from Rezku.
    Learn More
  • 5
    RustScan

    RustScan

    The Modern Port Scanner

    ...Automatically pipe results into Nmap, or use our scripts (or write your own) to do whatever you want. Adaptive learning. RustScan improves the more you use it. No bloated machine learning here, just basic maths. The usuals you would expect. IPv6, CIDR, file input and more. Automatically pipes ports into Nmap. RustScan is a modern take on the port scanner. Sleek & fast. All while providing extensive extendability to you. Not to mention RustScan uses Adaptive Learning to improve itself over time, making it the best port scanner for you. ...
    Downloads: 45 This Week
    Last Update:
    See Project
  • 6
    StatiCrypt

    StatiCrypt

    Password protect a static HTML page

    StatiCrypt uses AES-256 and WebCrypto to encrypt your HTML file with your long password and return a static page including a password prompt and the javascript decryption logic that you can safely upload anywhere (see what the page looks like). This means you can password protect the content of your public static HTML file, without any back-end - serving it over Netlify, GitHub pages, etc.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    AES-256 CBC File Encrypter

    AES-256 CBC File Encrypter

    Open source file encryption software

    An open-source software that enables you to encrypt your files using the AES encryption algorithm. GitHub page can be found at https://github.com/Northstrix/AES-256_CBC_File_Encrypter Made with the help of Perplexity If you find this project convenient, please leave a review to help others learn about it. Similar projects: https://sourceforge.net/projects/sta-file-encrypter/ https://sourceforge.net/projects/aes256-cbc-file-encrypter/
    Downloads: 6 This Week
    Last Update:
    See Project
  • 8
    Buttercup Desktop

    Buttercup Desktop

    Cross-Platform Passwords & Secrets Vault

    ...Use it alongside the browser extension and mobile app for a completely portable experience. Strong 256bit AES encrypted vaults that meet today's security standards. Rest assured that your credentials are safe. Easy-to-use interfaces with basic concepts make storing and finding your login details a piece of cake. Buttercup's software is free to download and use, forever. It's also available for all major platforms.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 9
    OWASP WrongSecrets

    OWASP WrongSecrets

    Vulnerable app with examples showing how to not use secrets

    Welcome to the OWASP WrongSecrets game! The game is packed with real life examples of how to not store secrets in your software. Each of these examples is captured in a challenge, which you need to solve using various tools and techniques. Solving these challenges will help you recognize common mistakes & can help you to reflect on your own secrets management strategy.
    Downloads: 3 This Week
    Last Update:
    See Project
  • Payments you can rely on to run smarter. Icon
    Payments you can rely on to run smarter.

    Never miss a sale. Square payment processing serves customers better with tools and integrations that make work more efficient.

    Accept payments at your counter or on the go. It’s easy to get started. Try the Square POS app on your phone or pick from a range of hardworking hardware.
    Learn More
  • 10
    Osquery

    Osquery

    SQL operating system instrumentation and monitoring framework

    ...With osquery, SQL tables represent abstract concepts such as running processes, loaded kernel modules, open network connections, browser plugins, hardware events or file hashes.Osquery queries your devices like a database. Osquery uses basic SQL commands to leverage a relational data-model to describe a device. Frequently, attackers will leave a malicious process running but delete the original binary on disk. This query returns any process whose original binary has been deleted, which could be an indicator of a suspicious process.
    Downloads: 16 This Week
    Last Update:
    See Project
  • 11
    Aviator Predictor

    Aviator Predictor

    Aviator hack: seed-inspection of aviator crash predictor & aviator app

    ...Available for desktop, it’s designed for research, fairness verification, and safe demo testing Demo-focused aviator predictor tools — seed-inspection helpers (SHA-512 / SHA-256), AI-assisted summaries, and demo bot templates for aviator crash predictor, Start in demo mode to test safely. Disclaimer: Provided for analytical and testing purposes only. No predictive guarantees or gameplay assurances.
    Leader badge
    Downloads: 5,129 This Week
    Last Update:
    See Project
  • 12
    OAuth2 Proxy

    OAuth2 Proxy

    A reverse proxy that provides authentication with Google, Azure, etc.

    A reverse proxy and static file server that provides authentication using Providers (Google, GitHub, and others) to validate accounts by email, domain or group. If you are running a version older than v6.0.0 we strongly recommend you please update to the current version. After returning from the authentication provider, the OAuth tokens are stored in the configured session store (cookie, redis, ...) and a cookie is set. The request is forwarded to the upstream server with added user info and...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 13
    Proxyee

    Proxyee

    HTTP proxy server,support HTTPS & websocket

    Proxyee is a JAVA-written HTTP proxy server library that supports HTTP, HTTPS, and WebSocket protocols, and supports MITM (Man-in-the-middle), which can capture and tamper with HTTP, and HTTPS packets. The CA certificate (src/resources/ca.crt) from the project needs to be imported to a trusted root certificate authority. The CA certificate (src/resources/ca.crt) from the project needs to be imported to a trusted root certificate authority. You can use the CertDownIntercept interceptor to...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 14
    Bootleg AES-256 CBC File Encrypter

    Bootleg AES-256 CBC File Encrypter

    A simple file encryption software that utilizes the AES-256 CBC

    ...This application is provided with no warranty or guarantees of any kind. Use it at your own risk! Source code is available at: https://github.com/Northstrix/Bootleg-AES-256-CBC-File-Encrypter Made with the help of Perplexity Similar projects: https://sourceforge.net/projects/sta-file-encrypter/ https://sourceforge.net/projects/aes-256-cbc-file-encrypter/
    Downloads: 2 This Week
    Last Update:
    See Project
  • 15
    ngx_waf

    ngx_waf

    Handy, High performance, ModSecurity compatible Nginx firewall module

    Handy, High-performance Nginx firewall module. Such as black and white list of IPs or IP range, uri black and white list, and request body black list, etc. Directives and rules are easy to write and readable. The IP detection is a constant-time operation. Most of the remaining inspections use caching to improve performance. Compatible with ModSecurity's rules, you can use OWASP ModSecurity Core Rule Set. Supports verifying Google, Bing, Baidu and Yandex crawlers and allowing them...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    powercat

    powercat

    Netshell features all in version 2 powershell

    ...It provides both interactive shells and single-command execution modes so operators can create bind shells, reverse shells, or simple file upload/download endpoints using only PowerShell. The tool supports encrypted connections (SSL/TLS) and can act as a basic SOCKS proxy or relay, enabling flexible pivot and tunneling workflows. PowerCat is implemented as a single, portable PowerShell script that favors minimal dependencies and is convenient to drop into a target or use from an admin workstation. Because it reimplements low-level socket behavior in managed code it is especially useful in Windows environments where native tools like netcat are unavailable or restricted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    ActiveX OCX to encrypt files with a very fast implementation of AES 256 bits and standard RC4, for news and improvements visit http://rspencdll.sourceforge.net/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    FTC

    Symmetric File and Text Encryption

    FTC cascades choice of Aria-256, AES-256, Camellia-256, SM4, or ChaCha20 for file and text encryption, the keystream generation is extremely robust I don't make cute interfaces, it just works.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 19
    C code and Win32 and Win64 DLL to encrypt strings or files with a very fast implementation of AES 256, AES 256 CTR or RC4 encryption methods, full Unicode support through utf-8 encode, support for large files too (above 2 gb).
    Downloads: 5 This Week
    Last Update:
    See Project
  • 20
    STA File Encrypter

    STA File Encrypter

    Open source file encryption software

    ...GitHub page can be found at https://github.com/Northstrix/Serpent-Twofish-AES-File-Encrypter Made with the help of the Chat GPT and Perplexity Similar projects: https://sourceforge.net/projects/aes-256-cbc-file-encrypter/ https://sourceforge.net/projects/aes256-cbc-file-encrypter/
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    KeePass

    KeePass

    A lightweight and easy-to-use password manager

    KeePass Password Safe is a free, open source, lightweight, and easy-to-use password manager for Windows, Linux and Mac OS X, with ports for Android, iPhone/iPad and other mobile devices. With so many passwords to remember and the need to vary passwords to protect your valuable data, it’s nice to have KeePass to manage your passwords in a secure way. KeePass puts all your passwords in a highly encrypted database and locks them with one master key or a key file. As a result, you only have to...
    Leader badge
    Downloads: 222,478 This Week
    Last Update:
    See Project
  • 22
    mendelson AS2

    mendelson AS2

    Implementation of the EDIINT AS2 protocol (RFC 4130)

    mendelson AS2 is the JAVA-based open source EDIINT AS2 solution. Monitoring- and configuration GUI, async & sync MDN, signatures, encryption, TLS, web interface, pluggable into any servlet container, partner manager, certificate manager, data compression, optional profiles: MA, FN. Localized to Spanish, Italian, Portuguese, German, English, French.
    Leader badge
    Downloads: 461 This Week
    Last Update:
    See Project
  • 23
    Important: TITAN Security Suite is a commercial software product. A valid license key is required to activate and use the application. Enterprise security & AES-256 encryption for Windows systems Commercial and Enterprise licenses are available on our official website: https://www.coreguardtech.org Wichtiger Hinweis: Die TITAN Security Suite ist eine kommerzielle Software. Zur Aktivierung und Nutzung ist ein gültiger Lizenzschlüssel erforderlich. Kommerzielle und Enterprise-Lizenzen sind auf unserer offiziellen Website erhältlich: https://www.coreguardtech.org
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
     In-Browser-File-Encrypter

    In-Browser-File-Encrypter

    The source code of the In-Browser-File-Encrypter web app

    The In-Browser File Encrypter is a simple web application that enables you to securely encrypt your files directly in your browser using the AES-256 encryption algorithm in CBC mode. Check it out at: https://codepen.io/Northstrix/pen/xxvXvJL and https://northstrix.github.io/In-Browser-File-Encrypter/V1.0/web-app.html GitHub page: https://github.com/Northstrix/In-Browser-File-Encrypter The download shortcut: https://sourceforge.net/projects/in-browser-file-encrypter/files/V1.0%20%28Improved%20UI%29/V1.0%20%28Improved%20UI%29.zip/download Successfully tested in Google Chrome on Windows 11 and Fedora 40.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    AVGVSTO USB

    AVGVSTO USB

    https://avgvsto.sourceforge.io

    AVGVSTO - Advanced Security Suite with USB Binding AVGVSTO is a Python-based encryption tool that binds sensitive data to a physical USB drive , ensuring decryption is only possible when the authorized device is connected. It combines AES-256 encryption with robust USB hardware authentication and brute-force protection for enhanced security. 🔍 Key Features Hardware-Bound Encryption Files can only be decrypted when the original USB drive (used during encryption) is connected. The USB's unique identifier (st_dev) is embedded in the encrypted file. AES-256 with PBKDF2 Secure key derivation using SHA-256 with 1 million iterations for password-to-key conversion. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next