Showing 25 open source projects for "string encryption"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    Speedcrypt File Encryption

    Speedcrypt File Encryption

    A File Encryptor with many Options and Powerful Algorithms!

    ...Speedcrypt implements libraries such as Bouncy Castle and others among the most used in the world of cryptography! Speedcrypt is a free program for encrypt the files which helps you to manage in a secure way. The files are encrypted using the best and most Secure Encryption algorithms currently known: AES-GCM, AES RIJNDAEL, PGP, AES (String Crypto 256 Bit Key) SERPENT, CHACHA20, XCHACHA20-POLY1305. Speedcrypt is it really free, more than that: it is Open Source. You can have a look at its full source code and check whether the security features are implemented correctly.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 2
    JavaScript Obfuscator

    JavaScript Obfuscator

    A powerful obfuscator for JavaScript and Node.js

    JavaScript Obfuscator is a Node.js library and CLI that transforms readable JavaScript into hardened, difficult-to-reverse code. It applies techniques such as identifier mangling, string array extraction/encoding, control-flow flattening, dead-code injection, and numeric literal transformations to disguise intent. Advanced options include self-defending code, domain locking, debug/console protection, and property key transformation, allowing you to tailor defenses to your threat model. The...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    PureBasic Shamir Secret Sharing

    PureBasic Shamir Secret Sharing

    Open-source PureBasic implementation of the Shamir Secret Sharing

    PureBasic Shamir Secret Sharing is an open-source, self-contained and educational implementation of the Shamir Secret Sharing Scheme, written entirely in PureBasic. Shamir Secret Sharing is a cryptographic method that splits a secret into multiple parts (shares), such that any combination of at least T shares can reconstruct the original secret, while any number of shares fewer than T reveals no usable information. This implementation operates over the finite field GF(257), allowing...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Private Vault
    My Private Vault is a general-purpose Windows application to encrypt your sensitive files (string AES algorithm) locally. Did you know that trojans and other kinds of malware can easily access all your files after getting into your machine? Download My Private Vault now and take control of your privacy!
    Downloads: 0 This Week
    Last Update:
    See Project
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • 5
    IRBS - Institutional Registers Backup

    IRBS - Institutional Registers Backup

    Open Source Institutional Registers Backup Syst. for Paper Registers

    If you are looking for a way to backup your numerous paper based registers, i.e. Admissions / Withdrawals, Fees, Attendance & Exam Mark Registers of Schools, Junior / Senior Colleges, then this software will help you. Designed with goals of Simplicity & packaged with all necessary open source tools to get you into action, straightaway. Refer Screenshots Below. Just download the above zip file, extract it to a Disk Partition, with lots of free space & Turn ON Network Discovery By Right...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Hash Latch
    The hash latch generates keys in a manner similar to how some cryptocurrencies are mined. It takes a string and brute-forces a prefix for it so that the hash of the string with the prefix has a certain number of leading zeroes. But that alone would've been too easy to hack. To prevent an attacker from forging the keys by generating a new prefix: the hash latch doesn't output the keys in the plaintext. Instead, it encrypts the key and outputs the ciphertext. That means that instead of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    Koperek.VCL

    Fast file copier, experimental archiver and encrypter for Windows 95+

    Copy handler written in Windows 98 era ~ 2002 written to by used by myself. To speed up file copy operations, thanks to bigger buffer size. Work as simple shell extension (Send To). Source files to be copied are always passed as string list via Clipboard. Destination directories passed via program parameters list. Note - you could copy multiple sources into multiple places at once! You will be able to: - Copy files - Move files and entire directories - Delete directories - Encrypt...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    .Net Core for Delphi/Lazarus

    .Net Core for Delphi/Lazarus

    The best library to work with the .Net Core from Delphi and Lazarus.

    The .Net Core for Delphi/Lazarus (dotNetCore4Delphi) is a .Net Core Runtime Library for Delphi which helps Delphi/Pascal developers work with .Net Core. It is designed to provide a way to interact with .Net Core applications from Delphi/Pascal. What dotNetCore4Delphi can do: - Access .Net Core Framework Class Library. - Access Third Party .Net Core Libraries. - Access Your .Net Core Libraries. - etc Competitive Advantages: - Cross-platform framework that runs on Windows, Linux and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Open Source Data Quality and Profiling

    Open Source Data Quality and Profiling

    World's first open source data quality & data preparation project

    This project is dedicated to open source data quality and data preparation solutions. Data Quality includes profiling, filtering, governance, similarity check, data enrichment alteration, real time alerting, basket analysis, bubble chart Warehouse validation, single customer view etc. defined by Strategy. This tool is developing high performance integrated data management platform which will seamlessly do Data Integration, Data Profiling, Data Quality, Data Preparation, Dummy Data...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 10

    CKK Encryption

    Fast and unbreakable encryption

    Any comments or question should be directed to the Discussion section of this website. I'll respond to any post directed there. Still in alpha stage. We take a file/stream and break it down to 8bit ASCII "0-255" values. We then take those values and combine with individual 8bit ASCII values of the password/pass phrase. We loop thru the file combining 1 byte with 1 byte from "password phrase" in a continuous loop. We then write all odd results then even results to a file, array or string...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    .Net Runtime Library for Delphi

    .Net Runtime Library for Delphi

    This is the best library to work with the .Net framework from Delphi.

    The .Net Runtime Library for Delphi (CNClrLibrary) is the best library to work with .Net framework and .Net libraries from Delphi. It is designed to provide a way to interact with applications written in anyone of the .Net languages (such as C#, Visual Basic.Net, Delphi.Net, JScript.Net, etc) from Delphi. CNClrLibrary allows Delphi to use .Net libraries without the need for registry entries, COM registrations, or changes to the .NET libraries. Competitive Advantages: - No extra dll...
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project
  • 12
    IT-Remote Service Tools

    IT-Remote Service Tools

    Manage Remote Connections, RDP, SSH, Mikrotik, VNC

    ...IT-Remote Service Tools is secured with password with possibly to turn ON or OFF feature. Configurations file are Extensible Markup Language XML. Password are encypted with symmetric-key encryption that means the string can only be decrypted if the other party has the correct key (which is used for encryption). Application is portable that means that you can move it easily without losing any of your data of connections places. Except password of your application which is stored in your registry.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    TinyObfuscate

    TinyObfuscate

    A tool for strings obfuscation tool in c++ by Michael Haephrati

    When you need encrypt/obfuscate strings in your program so that they don't just show up with a strings or hex tool when your executable is examined, this tool can be useful. See Code Project article: https://www.codeproject.com/Articles/1210398/Small-String-Obfuscator by Michael Haephrati
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Anak Krakatoa Defined Crypt

    Anak Krakatoa Defined Crypt

    Uma implementação diferente do algorítmo de Virgenère

    ...Isso seria o ideal, mas infelizmente ele utilizava todos os 256 caracteres do conjunto ASCII, quer dizer, ele também incluía em seus cálculos todos os caracteres de controle (DEL, CR, LF, ACK, etc.). Esse componente, foi INTEIRAMENTE convertido e otimizado a partir do JavasScript VIRGENERE ENCRYPTION criado por Francisco Ryan Tolmasky (opossum@mailcity.com) e usa uma tabela fixa contendo pares de caracteres comuns em meu idioma, nunca saindo desse intervalo evitando assim o aparecimento de caracteres indesejados na string criptografada resultante
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    approach to encryption and decryption involves two strings. The first is an encryption / decryption string which we will allow to be up to 128 lower case alphabetical characters in length. The second string is a line of text from a file that is to be encrypted or decrypted. the basic strategy for encrypting data is based on mapping alphabetical characters to specific values, then doing some simple mathematical operations to create a new value.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    PortaBase

    A Portable Database

    A personal database application for Maemo devices as well as PCs running Linux/UNIX, Mac OS X, and Windows. It can be used as a shopping list, password manager, media inventory, financial tracker, TODO list, address book, photo album, and more.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 17

    CyberCrypt

    .NET Library for Encryption/Decryption

    CyberCrypt: ----------------- .NET Library for Encryption/Decryption Usage: ---------- Encrypting file using AES (256 bits): CyberCrypt._AES256.EncryptFile("C:\example.txt", "YourPassword") Decrypting file using AES (256 bits): CyberCrypt._AES256.DecryptFile("C:\example.txt", "YourPassword") Hashing string using SHA512: CyberCrypt._SHA.SHA512Hash("A string that will be converted to SHA512 hash.")
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    WTF Obfuscator

    WTF Obfuscator

    WTF Obfuscator is a new obfuscator for your .NET applications

    [W]hat [T]he ob[F]uscator is a new obfuscator which protects your application. Not too good protection until!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    LeetSocket is an easy to use Socket Component, built on TCP, written in c# .net 2.0 Example Usage: Build a chat in 5 mins http://www.youtube.com/watch?v=Tm2jS6mQjRs Developers: Ahmet Yüksektepe Nick Russler
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    Cryptkeeper

    Cryptkeeper Secuirty tool

    ...some uses encryption keys and some dont. there are AES , 4DES , RC2 , RC4 , MD5 , SHA1 , SHA2 , SHA3 , SHA4 , XoR , Crypt , HeX , BINARY , Rijndael 256 , Obfuscation String , RSA , BASE64. The password manager anything saved WILL NOT BE ENCRYPTED so it is smart to protect the program from others not using it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Encrypts a message (string) into an unreadable text.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    jlidegw
    IRC gateway for lide.cz chat.Written 100% pure in Java including "Lide API" (package jlidegw),which allows Java developers to make their own applications collaborating with lide.cz server.Some code parts are inspired by Python version of lidegw.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Yoda's Protector
    Yoda's Protector is a free, open source, Windows 32-bit software protector.
    Downloads: 18 This Week
    Last Update:
    See Project
  • 24
    Univar makes it easier for ASP.NET developers to work with the session, cookie, query string or cache by offering a unified, type safe, generic all-in-one tool set for all of them. It supports serialization, compression and encryption out of the box.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    NAC is a collection of tools for cryptography. The goal is to provide simple-to-use crypto tools (like an OTP, String and number generator, public key algorithm...) you can use under Linux, Windows...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB