Showing 27 open source projects for "decrypt code"

View related business solutions
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    OpenPGP.js

    OpenPGP.js

    OpenPGP implementation for JavaScript

    This project aims to provide an Open Source OpenPGP library in JavaScript so it can be used on virtually every device. Instead of other implementations that are aimed at using native code, OpenPGP.js is meant to bypass this requirement (i.e. people will not have to install gpg on their machines in order to use the library). The idea is to implement all the needed OpenPGP functionality in a JavaScript library that can be reused in other projects that provide browser extensions or server applications. It should allow you to sign, encrypt, decrypt, and verify any kind of text, in particular e-mails, as well as managing keys. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Sealed Secrets for Kubernetes

    Sealed Secrets for Kubernetes

    A Kubernetes controller and tool for one-way encrypted Secrets

    Sealed Secrets provides declarative Kubernetes Secret Management in a secure way. Since the Sealed Secrets are encrypted, they can be safely stored in a code repository. This enables an easy-to-implement GitOps flow that is very popular among the OSS community. Sealed Secrets offers a powerful CLI tool (kubeseal) to one-way encrypt your Kubernetes Secret easily. The Sealed Secrets controller will decrypt any Sealed Secret into its equivalent Kubernetes Secret. Sealed Secrets are safe to store in your local code repository, along with the rest of your configuration.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 3
    cat-catch

    cat-catch

    Cat scratch chrome resource sniffing extension

    ...It does not decrypt any website. Any content downloaded by the user has nothing to do with the extension. Please pay attention to the permissions and copyrights of the downloaded resources.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 4
    wa-automate-nodejs

    wa-automate-nodejs

    WhatsApp tool for chatbots with advanced features

    wa-automate-nodejs is the most advanced NodeJS library which provides a high-level API to control WA. Want to convert your WA account to an API instantly? You can now with the CLI. For more details see Easy API. After executing create() function, @open-wa/wa-automate will create an instance of WA web. If you are not logged in, it will print a QR code in the terminal. Scan it with your phone and you are ready to go! @open-wa/wa-automate will remember the session so there is no need to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 5
    Standard Notes App

    Standard Notes App

    Think fearlessly with end-to-end encrypted notes and files

    Standard Notes is a free, secure note-taking app with powerful end-to-end encryption, unparalleled privacy features, and seamless cross-platform syncing on unlimited devices. Standard Notes is a secure digital notes app that protects your notes and files with audited, industry-leading end-to-end encryption. Only you have access to the keys required to decrypt your data. Write and store all your notes and files in one secure place and seamlessly access them across all your devices....
    Downloads: 8 This Week
    Last Update:
    See Project
  • 6
    GopenPGP V3

    GopenPGP V3

    A high-level OpenPGP library

    GopenPGP V3 is a high-level OpenPGP cryptographic library developed by ProtonMail that provides a user-friendly API for common encryption and signing operations in Go, abstracting the complexity of the underlying OpenPGP standards and golang crypto primitives. This library lets developers perform key generation, message encryption and decryption, digital signing, and signature verification with straightforward functions that hide much of the boilerplate and nuance typically required when...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    virgosun teaching support

    virgosun teaching support

    Mentor, code c, c++, java, go, php, swift, .. DevSecOps virtual lab, .

    Menor, code c, c++, java, python, go, php, swift, .., DevSecOps virtual lab, .. This software is provided as a demonstration build. Redistribution of the binary is allowed for academic evaluation only. More previously completed projects will be released incrementally as executable packages are rebuilt for public distribution. www.youtube.com/embed/fzoISpZv5d0?rel=0
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    transfer.sh

    transfer.sh

    Easy and fast file sharing from the command-line

    Easy and fast file sharing from the command-line. This code contains the server with everything you need to create your own instance. Transfer.sh currently supports the s3 (Amazon S3), gdrive (Google Drive), storj (Storj) providers, and local file system (local). For easy deployment, we've created a Docker container. For the usage with a AWS S3 Bucket, you just need to specify the following options, provider, aws-access-key, aws-secret-key, bucket, and s3-region. If you specify the...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    wechat-bot

    wechat-bot

    PC WeChat chat robot with secondary development interface

    The client sends a friend text message (supports websocket and HTTP). The client obtains the wxid and name of the friend in the address book (supports websocket and HTTP). The client sends a picture to a friend (supports websocket and HTTP). Sends an AT message (support websocket and HTTP). Send attachments (only support HTTP, weboscket). Get chatroom member list (wxid) and nickname (support websocket and HTTP). Please refer to the sample code of client.js (websocket client) and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 10
    Aurora Files

    Aurora Files

    Your files in your cloud on your rules

    Aurora Files is an open-source file storage platform for small teams and personal users.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11

    commons-crypt

    A library for easy use of symmetric encryption and decryption in java

    A library for easy use of symmetric encryption and decryption in java. Encrypt and decrypt with one line of code using common algorithms like AES. Requires Java 7 or later.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Simplify

    Simplify

    Android virtual machine and deobfuscator

    ...For example, any if or switch conditional with an unknown value results in both branches being taken. Analyzes the execution graphs from smalivm and applies optimizations such as constant propagation, dead code removal, unreflection, and some peephole optimizations. These are fairly simple, but when applied together repeatedly, they'll decrypt strings, remove reflection, and greatly simplify code. It does not rename methods and classes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Steganography

    Steganography

    Steganography library for Processing

    ...A library for Processing that can embed text and images into a carrier image. The hidden image or text is encrypted for additional security and requires a password or better still a pass phrase to retrieve and decrypt the hidden message. There is no source code difference between 1.0.1 and 1.0.2 it simply corrects the library URL in the supporting documentation used by the Processing Foundation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    sjcl

    sjcl

    Stanford Javascript Crypto Library

    The Stanford Javascript Crypto Library is a project by the Stanford Computer Security Lab to build a secure, powerful, fast, small, easy-to-use, cross-browser library for cryptography in Javascript. SJCL is small but powerful. The minified version of the library is under 6.4KB compressed, and yet it posts impressive speed results. SJCL is secure. It uses the industry-standard AES algorithm at 128, 192 or 256 bits; the SHA256 hash function; the HMAC authentication code; the PBKDF2 password...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    iText®, a JAVA PDF library

    iText®, a JAVA PDF library

    PDF Library for Developers

    iText is an open-source PDF library available for Java and .NET (C#). iText allows you to effortlessly generate and manipulate standards-compliant PDF documents with a powerful and feature-rich SDK. With iText, you can create archivable and accessible PDFs, split and merge documents, fill and flatten forms, digitally sign documents, and more. iText add-ons enable additional functionality, such as PDF creation from HTML templates, secure redaction, OCR, and much more. The latest...
    Leader badge
    Downloads: 170 This Week
    Last Update:
    See Project
  • 16
    StrongKey CryptoEngine

    StrongKey CryptoEngine

    FIDO strong authentication, encryption, digital signature engine

    StrongKey CryptoEngine (SKCE) 2.0 is a "crypto Swiss Army knife" server to perform cryptographic functions through web services, while freeing application developers to focus on business functionality. Its modules include: - A FIDO Engine to support FIDO U2F key registrations/authentications - An encryption engine to encrypt/decrypt files using AES/TDES keys - Escrowing keys to on-premises key management system (StrongAuth KeyAppliance/SAKA) - Integration to cloud storage services (AWS S3, Azure and Eucalyptus Walrus) - A signing engine to digitally sign documents, code, etc. with FIPS 140-2 HSM support - An LDAP Engine for AD/LDAP integration for authorization decisions SKCE is battle-tested and in production at one of the largest e-commerce companies in the world, protecting more than 50M documents within the business process; see http://bit.ly/14VPYlO for the case study. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    CryptoToolsPack

    CryptoToolsPack

    Basic encode/decode, files comparison and protect sensitive data

    This pack includes the following: FCSG - generate checksum and perform file comparison; JCryptoTool - encrypt/decrypt messages and files; JWallet - password protect sensitive information. See Help menu in each application, Source code included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Imetion Security Castle
    Imetion Security Castle is a Best Tool Kit for protect your Datas. You can Encrypt your Text files, rich text files, code text files and electronic voice encrypt file and zip any files in your own extentions like *.zip/ *.rar/ *.mp3/ *.mp4 ect. **
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    BinaryCrypt

    BinaryCrypt

    Binary Conversion Calculator

    With BinaryCrypt, you can convert between regular text, binary, hexadecimal, octal decimal and decimal. You can convert only decimal (as of right now) to any base up to base 64. You can also save your converted text to a file or open a converted text file to decrypt the message, and perform basic arithmetic in binary. The git repo for the C# code is located at: https://github.com/m1r4g3/BinaryCrypt-.Net
    Downloads: 9 This Week
    Last Update:
    See Project
  • 20
    TEACryptor

    TEACryptor

    Encrypts text files

    Uses the Tiny Encryption Algorithm to encrypt text files. This program can only encrypt text files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    ISC - The ISAAC Stream Cipher

    ISC - The ISAAC Stream Cipher

    ISC lets you encrypt & decrypt text and files of any type up to 4GB

    ISAAC is a cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It was developed by Bob Jenkins from 1993-1996 and placed in the Public Domain. ISAAC is fast - especially when optimised - and portable to most architectures in nearly all programming and scripting languages. After more than 20 years of existence ISAAC has not been broken, and the little program you have here allows you to use it to encrypt and decrypt text of arbitrary length, files of any...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    e-Exam

    e-Exam

    Testing students has never been easier!

    This program is a replacement to paper-based exams. You have to write the test in a text file and then load it from the program. From there you have the option of choosing exactly how many questions you want in the test (the questions will be chosen at random), you can also randomize the order of the possible answers of all of the questions (while still maintaining the "right" correct answers), or if you want you can also randomize the order of the questions. You will also be prompted for a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Thesis-Password retrieval from Windows

    Thesis project: Password retrieval from Windows

    FOR EDUCATIONAL PURPOSES ONLY. Unauthorized credential retrieval from a computer running Windows. Code to automate/combine of already finished projects to retrieve username and password from Windows partitions using linux running from a usb storage device, using tools as bkhive, samdump2, rcracki_mt to process core files from within the windows system to get the NTLM hash and rainbow tables to decrypt it. I do not have and do not claim ownership of any intellectual property not produced by me. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    Substitution Cipher Decryption

    Decrypt messages encrypted with a substitution cipher

    The provided program helps the user with the deciphering of a substitution cipher with the 26 letter alphabet by providing the following features • Dynamic entering of ciphertext. Ciphertext can be modified at any point of the process. • Easy location of corresponding characters in the ciphertext and the substituted text by selection. • Fast frequency analysis for single letters, bigrams, trigrams and quadgrams (more N -grams can be made available by adding a single line of code). •...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    HTML Encrypter

    HTML Encrypter

    Java based HTML encrypter and decrypter

    An encryption and decryption application developed in Java. The application uses a number of algorithms to encrypt and decrypt the HTML source code: Blowfish, AES, TEA, Rabbit, MARC 4, Escape/Unescape functions. In addition to the encryption and decryption functions, the application also returns the source code of a website. The user has the ability to upload the encrypted file, using the FTP transfer feature, to his or hers personal website. Additional features are listed below.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB