Showing 45 open source projects for "crypt"

View related business solutions
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Access competitive interest rates on your digital assets.

    Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    lancet

    lancet

    A comprehensive, efficient, and reusable util function library of Go

    Lancet is a comprehensive, efficient, and reusable util function library of go. Inspired by the java apache common package and lodash.js. support 600+ go util functions. includes string, slice, datetime, net, crypto, concurrency, etc. Each module is designed as a package with no coupling between modules. Only depends on two kinds of libraries, go standard library and golang.org/x. Well structured, test for every exported function.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    transcrypt git

    transcrypt git

    transparently encrypt files within a git repository

    ...You can conveniently store things like passwords and private keys within your repository and not have to share them with your entire team or complicate your workflow. transcrypt is in the same vein as existing projects like git-crypt and git-encrypt, which follow Git's documentation regarding the use of clean/smudge filters for encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    GpgFrontend

    GpgFrontend

    A Free, Easy-to-Use, Cross-Platform OpenPGP Crypto Tool.

    GpgFrontend is a Free, Open Source, Powerful, Easy-to-Use, Compact, Cross-Platform OpenPGP Crypt Tool. Also, it's one of the excellent GUI Frontends for Modern GnuPG (gpg). By using GpgFrontend, you can quickly encrypt and decrypt text or files. You can also digitally sign your text or files.GpgFrontend does not need to depend on any server, therefore it may be one of the last lines of defense in protecting your privacy.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 4
    Linux Engineer Toolkit Live

    Linux Engineer Toolkit Live

    Portable Linux engineer toolkit for recovery, repair & data rescue

    Linux Engineer Toolkit (LengToolkit) Live is a specialized, recovery-oriented Linux distribution designed for system engineers and IT professionals. Operating exclusively in Live mode, it provides a robust environment to rescue failing systems, recover lost data, and manage disk infrastructures without the need for installation.
    Leader badge
    Downloads: 79 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 5
    Crypt-LE

    Crypt-LE

    Let's Encrypt / Buypass / ZeroSSL and other ACME-servers clients

    Crypt-LE is a Perl module and command-line client that facilitates obtaining SSL certificates from Let's Encrypt and other ACME-compatible Certificate Authorities. It supports various verification methods and simplifies certificate management processes. ​
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    SecretManager

    SecretManager

    FR : Outil de partage des mots de passe, EN : Sharing tool passwords

    * SecretManager V2 started. *New design and new features ************************************ This tool allows you to store (AES 256) and share passwords. Passwords are placed in groups. Groups are associated with user profiles. Finally, we associate user porfiles with users. So users have access to passwords for which they are authorized. In addition, it is possible to supervise the access to secrets (alarm and all access).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    commons-crypt

    A library for easy use of symmetric encryption and decryption in java

    A library for easy use of symmetric encryption and decryption in java. Encrypt and decrypt with one line of code using common algorithms like AES. Requires Java 7 or later.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    vim-airline

    vim-airline

    Very light status/tabline for vim

    Lean & mean status/tabline for vim that's light as air. When the plugin is correctly loaded, there will be a nice statusline at the bottom of each vim window. That line consists of several sections, each one displaying some piece of information. For a better look, any sections can be colored differently, depending on various conditions (e.g. the mode or whether the current file is 'modified'). Tiny core written with extensibility in mind (open/closed principle). Integrates with a variety of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Bash-Snippets

    Bash-Snippets

    A collection of small bash scripts for heavy terminal users

    A collection of small bash scripts for heavy terminal users with no dependencies. All of these scripts have been heavily tested on macOS and Linux. Most of these scripts have been tested on Windows 10 and the official developer bash instance. Does not work with Cygwin or Mysys2.
    Downloads: 1 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 10
    Anak Krakatoa Defined Crypt

    Anak Krakatoa Defined Crypt

    Uma implementação diferente do algorítmo de Virgenère

    Um dia precisei de um algoritmo simples de criptografia para usar em um de meus programas, com o intuito de encriptar strings de texto. Como não tive paciência para criar um, resolvi procurar na Internet. Achei o que eu estava procurando, mas ocorreu uma coisa muito inesperada... O algoritmo era genérico, ou seja, ele manipulava a sequência de texto informada e fazia um cálculo simples, alterando os caracteres um a um. Isso seria o ideal, mas infelizmente ele utilizava todos os 256...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Delphi TXT DataBase Class
    Export and future Database for txt Files With compression and crypt for data. The First component is ExportClass bring to you on powerfull tool to import and exporto your data on txt files with compression and cripto, mask options, header to auto fields import and export, import and export blob data to file encode in Base64 and offer some functions to use on your's softwares like lib functions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Crypt

    Crypt

    Crypt encryption and decryption is based on ASCII Table Shift.

    Crypt is the developed based on the ASCII Table shift and it can customized based on the user requirements, right from the shifting order and the level of encryption or decryption. It can be integrated to any of the programming language with the custom build of the source code. It can secure from text file to binary code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    d-crypt

    Tweakable 256-bit symmetrical block cipher.

    D-crypt is an symmetrical block cipher operating on 256bit blocks with an key of the same length. The cipher takes 3 inputs: the data to encrypt, the symmetric key and a tweak consisting in a array of 16 integers representing each one of eleven possible keyaddition algorithms. Features a similar structure as AES (uses simpler versions of ShiftRows, MixColumns) and uses AES SBOX.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    kadCryptLib

    The crypt lib of Kad network(eMule)

    This is a java crypt lib of eMule/Kad. Using this lib, you can encrypt Kad message or decrypt it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    ImpraStorage

    ImpraStorage

    ImpraStorage provided a private imap access to store large files

    ImpraStorage provided a private imap access to store large files. Each file stored on the server is split in severals random parts. Each part also contains random noise data (lenght depends on a crypt key) to ensure privacy and exclude easy merge without the corresponding key. An index of files stored is encrypt (with the symmetric-key algorithm Kirmah) and regularly updated. Once decrypt, it permit to perform search on the server and download each part. transfert process is transparent. Just vizualize locally the index of stored files and simply select files to download or upload. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Use of Michael Rabin's Information Dispersal Algorithm to provide secure, dispersed storage in a networked environment. For full download, please get both Math-FastGF2 and Crypt-IDA releases under the files link. See project wiki for more information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Knary

    Knary

    Installation, Configuration, and Automation tool set for Crypt Mining

    With all of the information available on the net regarding crypt mining confusion rapidly ensues. It's all over the web. A plethora of information; some right, some wrong, most confusing at best. I envision a tool that is self documenting and performs the function of a miners assistant. An installation, configuration, and documentation tool set specifically for crypt mining. Bitcoin, Litecoin, ASICs, CPU, GPU, etc. installation, setup automation, and configuration. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 19
    LastBit Suite

    LastBit Suite

    A steganographic program to hide files into images

    This is a steganogric program that uses images last bits to hide information ( files ). It can crypt data with a rotation and a xor key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    CubeEditor

    An editor to create Bitmaps of pseudo 3D cubes like Captive on Amiga

    An editor to create Bitmaps of pseudo 3D cubes to create games in the style of dungeon master/ Captive / Ishar / black crypt / Bloodwych / etc. Works on Amiga AGA computers, or if using WinUAE, or an other amiga emulator, also on a PC / Mac.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    User AES-128 bit encryption in counter mode of operation. supports interactive mode of operation and command line mode of operation.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 22
    Este programa es un encriptador y desencriptador de texto en modo consola para la plataforma Windows This program is an text encrypter and decrypter in console mode for the Windows platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    My Text is Treasure
    It is a simple password manager for your PC and Smartphone. It works like a text editor and uses a strong cryptography algorithm to generate the end file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    MD5-utils
    MD5-utils is a script for MD5 hash function manipulations. It can crypt one or more word(s) and try to crack one or more hash(es) using online servers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    Cryptkeeper

    Cryptkeeper Secuirty tool

    In this program you will find tools like : Rawdata tool , file encryption , text encryption , program updater , program protecter , password manager , program settings , defult settings , settings viewer and the last is the file hashing. the file hashing you can use 6 hashing types for the file encryption 1 since i ran out of time for it , and the text encryption has 17 different types 12 encrypt and 5 hashing types. some uses encryption keys and some dont. there are AES , 4DES , RC2 , RC4 , MD5 , SHA1 , SHA2 , SHA3 , SHA4 , XoR , Crypt , HeX , BINARY , Rijndael 256 , Obfuscation String , RSA , BASE64. The password manager anything saved WILL NOT BE ENCRYPTED so it is smart to protect the program from others not using it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB