Showing 285 open source projects for "tinyxml-2"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    Build gen AI apps with an all-in-one modern database: MongoDB Atlas

    MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
    Start Free
  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • 1

    JSSLTrace - a SSL/TLS Interceptor

    A java-based interceptor for SSL/TLS protocol

    Jssltrace is a java-based tool, which enables it's user to intercept ssl based communication between two programs. Jssltrace works essentiallly in the same manner as tcptrace (http://www.pocketsoap.com/tcptrace), which is the main inspiration for it.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Cyberbit

    Cyberbit

    Visual Cryptography and Bit-Plane Complexity Segmentation in Python

    Hide secret messages in your pictures! Cyberbit lets you transmit a secret message to an intended person in a new manner. The secret message is an 1-bit deep black & white image. The message can contain written text, a drawing, a secret code etc. Using Visual Cryptography the application splits the secret message into two "shadow images" called <<shares>>. Any of the two shares will be embedded into a "normal" image file called by tradition <<vessel>>. You can use a method of hand...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Kryptograph

    Der Kryptograph (Python 2.7.3)

    Because of my diplom thesis now, i wont update my little project very often :(
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    CrackThis!

    CrackThis!

    Data Encrypton Software utilizing IMPACT

    ...-like operation, we created very robust encryption methodology which will secure information for some time to come through sheer numbers and flexibility. With 2^65536 possible keys a brute force attack on a key is simply infeasible. The full version, due to release March 11, 2013 will allow password protection which helps protect your information by forcing the impostor to not only produce the 65536 bit key, but have your password as well and allows for individual passwords for individual files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    ORDO vers.1.0

    AES-128, Linux, OpenBSD, Assembly-Language

    Small cryptographic command line tool for LINUX and OpenBSD (x86) completely in 32-Bit Assembly Language. ORDO encrypt/decrypt files (max. size 2 GB) with AES-128-Algorithm (Rijndael) in CBC-Mode (Cipher-Block-Chaining). No libs are included, only system-calls are used. ORDO is under BSD License.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    FoTRANS

    Digital Encryption / Decryption Software

    FoTRANS, previously called Digital Fortress, is an encryption standard which stands digital Fortress and TRANSLTR, inspired by the famous Dan Brown Novel Digital Fortress. This project is by two High School computer students Ayush and Anubhav, who are good friends.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Fractal Encryption was once a dream, this is a quest to find the ultimate encryption layers behind the FES Protocol Released in ANTdb 2005.. It in it own base is the module to drive geometric fractal interlaced data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    This project is a Steganography software that allows you conceal files inside any picture type.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    MandelHash

    MandelHash

    MD5 hash used to position and color two overlaid Mandelbrot sets.

    I'm using an MD5 hash of a username and password field to generate some entropy which is used to generate color pallets and positions / scaling of two Mandelbrot sets. These two images are overlaid to create interesting pictures which represent the entered credentials. I'm interested in all things security, this is mostly just for fun, but could possibly be used to help users identify mistakes in their password entry prior to submission and enforce a tighter failed password lockout policy...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    Barada
    Barada (Barada Aint Respecting Any Deceptive Adversaries) is a PAM module designed to provide two-factor authentication support. There is companion software called Gort which runs on Android devices, essentially turning your phone into a SecureID token. The PAM module is available in the repositories for Debian based distributions. Gort, the Android client, is available from the android market (https://play.google.com/store/apps/details?id=net.sf.crypt.gort)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Open Source Security Suite Verschlüssselung mit Blowfish/Twofish/ AES. Datenlöschung mit Guttmann (Default)/Pseudorandom Data/US DoD 5220-22.M Methode
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    WPACrackGUI

    WPACrackGUI

    WPACrackGUI es un entorno gráfico de crackeo de redes WPA con john.

    WPACrackGUI es un programa que mediante a la generación asistida de john puede crackear redes WPA sin ningún problema simplemente clickeando unas veces.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    2Pix
    2Pix integrates with Windows to allow you to easily encrypt and hide files in bitmap images, a process called steganography (not to be confused with stenography). Data is stored in the low-order bits of each pixel of an image, so the file is completely hidden from view. Version 1.1 now provides plausible deniability because no unencrypted signature is stored in the image header. It should be impossible to prove an image contains a hidden file (if you use a strong password and only use 1 or 2...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    PyEvcs

    Extended Visual Cryptography Schemes in Python

    Visual Cryptography is a graphical form of information concealing. In a 2-out-of-2 Visual Cryptography Scheme a dealer will "split" a secret image into two shares, print the shares onto separate transparencies and hand them to the participants to the scheme. If the two participants come together, they'll be able to reveal the secret image without a computer, perfectly superimposing the transparencies they own. Analyzing a single share, no one will be able to obtain any information considering...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    pwdex

    Web-based password exchange, sharing and storage system.

    Web-based password exchange, sharing and storage system. It has 2 types of passwords: private and shared. Shared ones can be shared to individual users or to groups of users. The system is written in Ruby using Sinatra framework. Storage backend is any database (e.g. MySQL, sqlite), encryption is done via AES-256.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    web-script written in php, helps setting up proftpd itself with mysql authentication, logging and TLS. provides a frontend for user administration
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    BankOfEuler stores a set of accounts, each with a set of values. Value can be split into two parts, merged into a sum, or transferred between accounts. The server is never aware of the quantities being manipulated because they are encrypted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Scripts for manage X509 certificates: - create CAs - sign requests and revoke certificates - ocsp responser
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    This toolkit has complete security Package start from Tweak manager , Updater , Virus scanner ,Proxy server and many more This will be help full for user from corporate to small user we have already started working on it will completed with 2 months
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    SAE provides a secure password-based authentication mechanism for 802.11. It is resistant to passive attack, active attack, and dictionary attack.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    A simple set of scripts and tools for creating and distributing PKI certs for libvirt servers and management clients.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    cryptslice
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    A small encryption / decryption application that we are giving away free of charge. Version 1.0.00 - RSA only at the moment. But later versions will have a plug-in system for adding more algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Tool for encrypting files using blowfish, aes, des or cast5, File hashing with md5, sha and ripemd160, compresssion with gzip, and a nice user interface. Created using C++ with Qt framework, depends on QCA third-part Qt Library and OpenSSL.
    Downloads: 0 This Week
    Last Update:
    See Project