Open Source Cryptography Software - Page 17

Cryptography Software

View 5658 business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    pup2p is a remaster of the Puppy Linux livecd distro and is aimed at use with the anonymous network I2P. It includes I2P as well as a number of I2P related apps. NOTE: The ISO is currently VERY out of date! Sorry for my absence. I may try to update the project soon. The SFS file IS up to date as of this change. 03/2013
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Using encryption to secure your code or text. Click File->Run to run your code using Ruby, see the pop up for output. Never save your text or code to disk unencrypted. Don't forget your password. Encryption is error-persistent.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    This tool will allow obfuscation of UNIX scripts listing an interpreter as the first line. It is most useful for distributing functionality in a commercial product or a high user volume environment where you wish to hide proprietary information.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    sirius signing server

    sirius signing server

    Centralized signing and verification

    Sirius-Sign is a signing and verification server with it's focus on high throughput and easy integration into an existinig landscape. For signature creation smartcards with OCF and PKCS11 interfaces are supported. An EJB container is required.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • 5
    stegotools is a suite of UNIX command-line applications to read/write hidden information from/in files using steganography. It currently fully supports 24bpp bitmap images.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6

    zhcrypt

    Tiny front end to hcrypt.exe from project page Hcrypto

    Zhcrypt is simply a tiny front end to hcrypt.exe, one of the utilities found within the Hcrypto suite found on Sourceforge. Hcrypt.exe is a Windows command line utility that will encrypt and decrypt files offering a variety of common and uncommon algorithms, including AES-128, AES-192, AES-256, Blowfish, CAST-128, CAST-256, DES, TripleDES, DESX, GOST, DEA, KASUMI, MARS, MISTY1, Noekeon, RC2, RC5, RC6, SAFER-SK, SEED, Serpent, Skipjack, Square, TEA, Twofish, and XTEA
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    CoDec is a Java package for encoding and decoding ASN.1 data structures. CoDec supports the Basic Encoding Rules (BER) as well as the Distinguished Encoding Rules (DER) and provides a library with data structures for many cryptographic standards.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Derived from TrueCrypt 6.3 release, I added some command line options to "TrueCrypt Format.exe" to allow TrueCrypt volumes to be created without using the graphical user interface
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    Files Hash code Verifier

    Files Hash code Verifier

    A tool to verify and generate MD5,SHA,CRC32 hash of multiple files

    A Security tool that will help to verify the hash codes of files . Currently,Our Hash Code verifier tool supports the following Hash types: MD5,SHA,CRC32. More details about the tool can be found in the project homepage.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    PCSecrets

    PCSecrets

    Encrypt and manage secret text data

    PCSecrets is a PC application that holds secret text data - protected by a master password and strong encryption. Use it as a password manager or just somewhere to hold any text data securely in one place. It can hold a second, hidden set of secrets that is undetectable and plausibly deniable. The program is also a PC counterpart of the Secrets for Android app. It uses the same data structure and provides synchronization that allows easy transfer of secrets between the two. For those who find the personal computer environment more comfortable for data entry and editing (i.e. a real keyboard), PCSecrets provides an alternative way to manage your secrets. Sync is also effectively a form of backup. To enable the sync feature with Secrets for Android, you need to install the PCSecrets Sync app, downloadable from SourceForge or Google Play. PCSecrets import plus PCSecrets Sync provides a route to importing secret data into Secrets for Android that would not otherwise be possible.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    *PassGuard suite provides a series of application used to manage your numerous passwords in an encrypted file. Additionally, a C++ framework is provided to create password management applications. Plugins system managed different encryption methods.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    0 byte, is a SLAX modification to security. Download order: Boot directory: -slax.cfg -vmlinuz -initrd.gz -dban.bzi Slax directory: +base directory: -001-core -002-xorg -003-desktop -004-kdeapps -005-devel -008-0byte +modules directory -driverrak -segurt
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Java based Portable hashing application capable of multiple individual file signatures or proprietary group signatures (1 signature for a folder and all its contents). GUI and command line in the same executable. -sha1 -sha256 -sha51 -md5 -crc32
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    This ain't your daddy's crypto! We provide a set of C libs and utilities to perform cypherpunk style crypto functions, using your existing OpenPGP keys. Ring signatures; credentials; mental poker; timelines; zero knowledge proofs. Cool stuff!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    2Pix
    2Pix integrates with Windows to allow you to easily encrypt and hide files in bitmap images, a process called steganography (not to be confused with stenography). Data is stored in the low-order bits of each pixel of an image, so the file is completely hidden from view. Version 1.1 now provides plausible deniability because no unencrypted signature is stored in the image header. It should be impossible to prove an image contains a hidden file (if you use a strong password and only use 1 or 2 bits per pixel component). NOTE: This project has been moved to Google Code. http://code.google.com/p/2pix-steganography
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    A text editor which saves data encrypted with strong cryptography (AES, Blowfish..)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    A simple checksum verifier
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A set of Unixish tools allowing encrypted and compressed backups be done on exchangible media.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A C++/Qt program for use in encrypting and decrypting simple substitution cyphers. These cyphers are often found in newspapers and various puzzle books.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    The ABKey plugin for Apple's Address Book allows you to quickly view GPG key information for contacts as well as specify per-contact preferences for how GPGMail (the Apple Mail plugin for GPG) handles encrypting and signing of emails.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    ACHAS

    Chat application with asymmetric encryption

    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Pure managed C# implementation of well-known cryptographic hash functions such as SHA-family (SHA0, SHA1, SHA2), MD-family (MD2, MD4, MD5), RIPEMD, Tiger, Haval, Snefru and others. Moved to Github: https://github.com/AndreyRusyaev/acryptohashnet
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    AES Encrypter

    AES Encrypter

    Encrypt and decrypt AES strings

    Encrypt and decrypt AES strings.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    A package of Rijndael, Twofish and Serpent encryption algorithms implemented in x86 assembly. Meant to learn basics of assembly, learn about the algorithms or to be used in a C program.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Downloads: 0 This Week
    Last Update:
    See Project