Search Results for "encryption algorithm" - Page 3

Showing 205 open source projects for "encryption algorithm"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 1
    Secure File Vault

    Secure File Vault

    A very secure file vault for private files to avoid hackers

    A File vault to store all of your personal items, this file vault could not be brute forced (impossible because of the hashing algorithms). It uses a combination of veracrypt, winrar, 7zip to encrypt your files to ensure that they are secure and not be seen by someone. Once you start to create the file vault, your password gets hashed a million times (only takes 3 seconds) then base 64 3 times and hashed 1 more time, it uses a combination of SHA256, SHA512 and lot of other secret...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Simple Cipher Algorithm

    Simple Cipher Algorithm

    Java Encryption Utility.

    Very simple to use symmetric Java encryption utility. Please write a review. Email me with any questions or problems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    RSA Encryption Tool

    RSA algorithm based encryption tool.

    A simple program written in C# utilizing .NET 4.6 to demonstrate RSA encryption in action. User can select a text file or input any text to encrypt.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    TraySafe

    TraySafe

    Elegant and reliable profile data storage

    ...PIN functionality is included in versions 1.1.0 and above. The serious perk of the app is that all the info is saved as encrypted data in the data.tsf file in the program directory. The simple yet effective encryption algorithm has a password hash, salt key and vigenère cipher key that are changed with every update. The only thing you have to do when updating is to delete the .tsf files and re-enter all your info again so that it can be encrypted using the new parameters. Detailed How-To can be found in the project wiki.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    AES Everywhere

    AES Everywhere

    Cross Language AES 256 Encryption Library

    AES Everywhere is Cross Language Encryption Library that provides the ability to encrypt and decrypt data using a single algorithm in different programming languages and on different platforms. This is an implementation of the AES algorithm, specifically CBC mode, with 256-bit key length and PKCS7 padding. It implements OpenSSL-compatible cryptography with randomly generated salt.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    WiFi Password Recovery

    WiFi Password Recovery

    A free utility to recover the passwords of wireless networks

    ...For example if you forgot the password of a WiFi network (which you have entered in the past), you can easily recover it thanks to this tool. WiFi Password Recovery provides a very simple user interface which shows also other informations (SSID, Interface, Security type, Encryption algorithm) for each wireless network. The program is able to recover the passwords of wireless networks which use the following security types: WEP, WPA, WPA-PSK, WPA2, WPA2-PSK.* GitHub Repository: https://github.com/EvolSoft/WiFi-Password-Recovery *Note: On Windows XP the passwords of WiFi networks using WPA security will be shown as 64 HEX digits. ...
    Downloads: 52 This Week
    Last Update:
    See Project
  • 7
    IP-Chat

    IP-Chat

    UDP based desktop chatting app which supports AES-256 bit encryption.

    Simple Encrypted chat application built with Java. It uses AES-256 bit block cipher algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    sjcl

    sjcl

    Stanford Javascript Crypto Library

    ...SJCL is small but powerful. The minified version of the library is under 6.4KB compressed, and yet it posts impressive speed results. SJCL is secure. It uses the industry-standard AES algorithm at 128, 192 or 256 bits; the SHA256 hash function; the HMAC authentication code; the PBKDF2 password strengthener; and the CCM and OCB authenticated-encryption modes. Just as importantly, the default parameters are sensible: SJCL strengthens your passwords by a factor of 1000 and salts them to protect against rainbow tables, and it authenticates every message it sends to prevent it from being modified. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    IDA Signsrch

    IDA Pro plug-in of Luigi Auriemma's signsrch signature matching tool.

    ... * Deprecated, will no longer be updated, please see my use my superior YARA for IDA plugin here: https://github.com/kweatherman/yara4ida * July 2018, updated to IDA 7.1 Luigi's original signsrch description: "Tool for searching signatures inside files, extremely useful as help in reversing jobs like figuring or having an initial idea of what encryption/- compression algorithm is used for a proprietary protocol or file. It can recognize tons of compression, multimedia and encryption algorithms and many other things like known strings and anti-debugging code which can be also manually added since it's all based on a text signature file read at run-time and easy to modify."
    Downloads: 2 This Week
    Last Update:
    See Project
  • Cloud-based help desk software with ServoDesk Icon
    Cloud-based help desk software with ServoDesk

    Full access to Enterprise features. No credit card required.

    What if You Could Automate 90% of Your Repetitive Tasks in Under 30 Days? At ServoDesk, we help businesses like yours automate operations with AI, allowing you to cut service times in half and increase productivity by 25% - without hiring more staff.
    Try ServoDesk for free
  • 10

    v1pad

    One-time-pad encryption using a virtual pad

    v1pad is a command-line tool that encrypts and decrypts files using one-time-pad encryption. v1pad uses a virtual pad, meaning that the one-time pad is generated dynamically based on user input instead of being stored in a file. The name v1pad is an abbreviation for Virtual One-Time Pad.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    ParaCrypt

    ParaCrypt

    more convenient one-time-pad encryption.

    ParaCrypt is software for encrypting and decrypting data with one-time-pads. For convenience the one-time-encryption-pads are created using pre-shared unencrypted files as sources of entropy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    ROXter

    ROXter

    The easiest way to encypt files or text

    This is a ROXster. A program that encrypts files and text with an algorithm based on XOR. You can use it to encrypt your files or text fast and easy. Enjoy!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    file digest

    A command-line utility for calculating and verifying file checksums.

    Digest is a command-line utility which can be used to calculate and verify checksums of any files, similar to md5sum or RHash, but using modern hash algorithms. Supported algorithms: BLAKE, BLAKE2, Grøstl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, Skein, SM3, Streebog, Whirlpool. Usage: digest [-c] <algorithm> <filename(s)> For example, if you want to calculate the checksums using skein512/256 algorithm, use this command: digest skein512/256 * > checksums.skein To verify the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    DES-Rotem

    DES-Rotem

    DES attempt to crack code with 3 rounds

    This Java project is an attempt to crack the key in a DES encryption algorithm. The plaintext and the cyphertext are known. The purpose is to crack the 64-bit key with 3 rounds instead of 16. This project checks all 2^64 possible keys. Therefore, it takes a long time to find the correct key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    openSSLGOSTSigner

    Simple GUI tool for openssl to sign files with GOST algorithm

    This software is a simple GUI tool which uses openssl command line utility underneath. It designed to sign any type of files with GOST algorithm (GOST cipher) and will be especially useful for russian ISP's and IT companies which in one way or another have to deal with Roskomnadzor's forbidden sites list to reduce the timewaste while typing in commandline each time you need to sign some file. To use this software you will need to have a ".PEM" file(which exactly used to sign files). If you...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16

    Ransomware Recovery Tool

    Why pay Ransom when you have Ransomware Recovery Tool for decryption

    Ransomware Recovery Tool is one of the most proficient and effective recovery tool to recover files infected by Ransowmware and other viruses. When a virus like Trojan, Melissa, I Love You, Code Red, Zeus or any other types of virus like Wannacry Ransomware enters into your system,it encrypts your files and make it inaccessible due to which it is very hard for a user to use those files. In recent times, Wannacry Ransomware attack is the most recent one and trust me it created havoc by...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Advanced Onion Router
    Advanced Onion Router is a portable client for the OR network and is intended to be an improved alternative for Tor+Vidalia+Privoxy bundle for Windows users. Some of the improvements include UNICODE paths, support for HTTP and HTTPS proxy protocols on the same Socks4/Socks5 port with HTTP header filtering that generates fake identity-dependent headers every time the identity is changed (proxy chains are also supported), support for NTLM proxies, a User Interface that makes Tor's options and...
    Leader badge
    Downloads: 204 This Week
    Last Update:
    See Project
  • 18

    TEAENCRYPTION

    A TEA encryption with GUI for 32-bit 64-bit works only on windows.

    A algorithm encryption based on TEA (Tiny encryption Algorithm) that will help the user to encrypt his text files and decrypt whenever the user wants as long as he uses the same key.It is simple to use but doesnt work with really really long text files.Will implement mac and other OS in the future.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Ncrypt

    Text and image encryption and decryption software

    This software provides a mean for users to encrypt and decrypt data in the form of text and images. The program follows a basic encryption algorithm that relies on mathematical properties of matrices, such as row operations, matrix multiplication, and invertible matrices . This program works by allowing the user to input a key in the form of a matrix, on which the program bases the encryption. The program then performs the encryption. The software only works in the scope of text files with a maximum of 150 characters, and image files with a maximum size of 128 x 128.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    This tool can create one-time-password values based on HOTP (RFC 4226: HOTP: An HMAC-Based One-Time Password Algorithm), TOTP (RFC 6238: TOTP: Time-Based One-Time Password Algorithm) and OCRA (RFC 6287: OCRA: OATH Challenge-Response Algorithm) standards, and also supports client side of OAuth protocols (1.0a, 2.0).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    MicroZip

    MicroZip

    Create,extract and encrypt ZIP,GZIP,TAR,BZIP2,TAZ files on Java mobile

    ...MicroZip also supports encrypted ZIP archives with both classic ZIP encryption and AES 256 encryption algorithm.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 22
    File Locker

    File Locker

    Lock and unlock files easily in Windows

    ...You can just right click on a file and immediately lock it with your password. And when a file is locked, you can just double click it and enter your password to open it. It uses serious encryption algorithm, so be careful with your password! If you forget it, your file might permanently get unlockable.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 23

    Photon4K

    32768-bit symmetric-key encryption, fully-functional development CLI

    Photon4K is a 32768-bit symmetric-key encryption cipher accessed via a basic, yet fully-functional development-oriented Command Line Interface (CLI) utility. The algorithm is intended to be a high-security "symmetric" cipher designed primarily for archival purposes -- http://wikipedia.org/wiki/Symmetric-key_algorithm . Photon4K is implemented as an attempt to take long-established, proven cryptographic techniques to another "level" to contend with the rapid advances in powerful quantum and conventional computing resources reported on often by the mainstream tech press. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Password Keeper

    Password Keeper

    manage your passwords in a secure way

    ...You only have to remember one single master password to unlock the application when it starts only. your login and passwords are encrypted using the best and most secure encryption algorithm currently known (AES).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    AES256 Password manager Russian version

    Simple password manager in Russian

    Simple password manager that uses encryption AES 256. Translated into Russian. AES256 Password Manager (originally Encrypter) decoder is a text file that stores the passwords or other sensitive data is completely secure manner using encryption algorithm AES 256-bit. Official page http://xn--90abhbolvbbfgb9aje4m.xn--p1ai/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BF%D0%B0%D1%80%D0%BE%D0%BB%D0%B8/aes256-password-manager-%D0%BF%D1%80%D0%BE%D1%81%D1%82%D0%BE%D0%B9-%D0%BC%D0%B5%D0%BD%D0%B5%D0%B4%D0%B6%D0%B5%D1%80-%D0%BF%D0%B0%D1%80%D0%BE%D0%BB%D0%B5%D0%B9.html Autor twitter: https://twitter.com/mrkaban546
    Downloads: 0 This Week
    Last Update:
    See Project