Open Source C++ Encryption Software for Mac

C++ Encryption Software for Mac

View 37 business solutions

Browse free open source C++ Encryption Software for Mac and projects below. Use the toggles on the left to filter open source C++ Encryption Software for Mac by OS, license, language, programming language, and project status.

  • Catch Bugs Before Your Customers Do Icon
    Catch Bugs Before Your Customers Do

    Real-time error alerts, performance insights, and anomaly detection across your full stack. Free 30-day trial.

    Move from alert to fix before users notice. AppSignal monitors errors, performance bottlenecks, host health, and uptime—all from one dashboard. Instant notifications on deployments, anomaly triggers for memory spikes or error surges, and seamless log management. Works out of the box with Rails, Django, Express, Phoenix, Next.js, and dozens more. Starts at $23/month with no hidden fees.
    Try AppSignal Free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    VeraCrypt

    VeraCrypt

    Open source disk encryption with strong security for the Paranoid

    VeraCrypt is a free disk encryption software brought to you by IDRIX (https://www.idrix.fr) and based on TrueCrypt 7.1a. It adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. It also solves many vulnerabilities and security issues found in TrueCrypt. This enhanced security adds some delay ONLY to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted data. All released files are PGP signed with key ID=0x680D16DE, available on key servers and downloadable at https://www.idrix.fr/VeraCrypt/VeraCrypt_PGP_public_key.asc VeraCrypt can mount TrueCrypt volumes. It also can convert them to VeraCrypt format. Documentation: https://www.veracrypt.fr/en/Documentation.html FAQ : https://www.veracrypt.fr/en/FAQ.html
    Leader badge
    Downloads: 2,308 This Week
    Last Update:
    See Project
  • 2
    QPass password manager
    QPass is easy to use, open source password manager application with built-in password generator. You can store in it's database such data as passwords and logins which will be encrypted using AES-256 with PBKDF2(number of iterations set by user). Each entry can include additional information about entry such as name, url adress and description.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 3
    Gryptonite (formerly GPassword Manager)

    Gryptonite (formerly GPassword Manager)

    Simple but Powerful, Cross-Platform Password Management Utility

    A simple but powerful cross-platform utility for managing and accessing your most secret data. It stores passwords and whole files, so it can literally store any information you want to keep secret. Access your most-used passwords/URLs right out of a desktop tray icon. For advanced users, it includes a separate utility called Grypto-Transforms, which has a universal hash calculator with all the major hash functions, generic encrypt/decrypt functions and a base64/hex converter. Although the interface is simple and intuitive, the security is top-notch. It uses AES with CCM to secure and authenticate the data.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 4
    Midbar

    Midbar

    Midbar is more than just an open source password vault!

    Midbar is more than just a password vault! It's made to significantly increase the cost of unauthorized access to its your personal data. Some tutorials: ESP32 V4.0: https://www.instructables.com/Midbar-V40/ Raspberry Pi Pico V2.0: https://www.instructables.com/Midbar-Raspberry-Pi-Pico-Version-V20/ ESP32 V5.0: https://www.instructables.com/Midbar-V50/ STM32F401CCU6 + Arduino Uno Version V1.0: https://www.instructables.com/Midbar-STM32F401CCU6-Arduino-Uno-Version/ RTL8720DN + Arduino Uno V1.0: https://www.instructables.com/Midbar-RTL8720DN-Arduino-Uno-Version/ ESP8266 V2.0: https://www.instructables.com/Midbar-ESP8266-Version-V20/ STM32F407VET6 + Arduino Uno Version V1.0: https://www.instructables.com/Midbar-STM32F407VET6-Arduino-Uno-Version/ STM32F407VET6 Version V2.0: https://www.instructables.com/Midbar-STM32F407VET6-Version-V20/ ESP32 V6.0: https://www.instructables.com/Midbar-V60/ Teensy 4.1 V3.0: https://www.instructables.com/DIY-Hardware-Data-Vault-With-Teensy-41/
    Downloads: 3 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    1654 — encryption system

    1654 — encryption system

    1024-bit encryption system (functional safe or disk) | С++20

    This release marks the first production-ready publication of 1654, a dependency-free cryptographic vault engine built around a strict vault abstraction and a wide-state cryptographic design. 1654 is not a wrapper around existing crypto libraries. It is a self-contained system whose cryptographic behavior is fully defined within the repository. Key Characteristics Vault-oriented model Encrypted data is treated as a sealed container-safe with explicit operations, not as a password-wrapped file. Dependency-free design The entire cryptographic surface is auditable in-tree. PetoronHash as the cryptographic core All key material derivation, diffusion, and internal transformations are driven by PetoronHash 1024-bit wide internal state The architecture uses a wide internal state to increase diffusion depth and structural safety margins. https://github.com/01alekseev/1654 Petoron | Ivan Alekseev | MIT license
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    AES_in_CBC_mode_for_MCUs

    AES_in_CBC_mode_for_MCUs

    Open-source code that enables you to use AES in CBC mode

    AES_in_CBC_mode_for_microcontrollers is an open-source code that enables you to easily integrate the AES encryption algorithm in CBC mode to your project. Based on the work of https://github.com/zhouyangchao/AES GitHub Page: https://github.com/Northstrix/AES_in_CBC_mode_for_microcontrollers
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    This is a non-causal non-linear encryption system that cannot be cracked by the von-neuman architectures available today
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Azrar

    Azrar

    Encryption addressing long-term data secrecy

    Most of today's cryptographic standards will be broken with tomorrow's computational power. Azrar is a user-friendly tool for the encryption/decryption of single files - preferably compressed archives - addressing long-term data secrecy. Thus, Azrar provides the possibility to use webspace for secure data transfer between two communication/transfer partners (encryption only, network transfer not yet included in current version). Data in encrypted files are secret/private indefinitely. To achieve long-term data secrecy, Azrar differs from other approaches in terms of not to rely on effective computational deficiencies. It combines a one-time pad with a stream cipher method using the strong cryptographic hash function (family) Skein. Azrar fulfills business requirements for secure data transfer and supports several operating systems natively. It does not use a runtime environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Bigram Table Generator

    Bigram Table Generator

    A program to generate random reciprocal bigram tables

    A command-line program to encrypt/decrypt a message using a random reciprocal bigram table and write a bigram table to a text file. Executing the program without any command-line arguments starts bigram in message encryption/decryption mode. The program prompts for a password or passphrase and a message to encrypt/ decrypt. After the message is entered the ciphertext is displayed. Executing the program with command-line arguments causes bigram to generate a random bigram table to print to screen or save to disk depending on whether the -f filename argument was given. If the -p passphrase argument is given a specific table is generated and is repeatable each time the same passphrase is given. This program was written to supplement the Enigma Simulator by Dirk Rijmenants. http://users.telenet.be/d.rijmenants/en/enigmasim.htm Enigma message procedures: http://users.telenet.be/d.rijmenants/en/enigmaproc.htm
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 10
    Tool for encrypting files using blowfish, aes, des or cast5, File hashing with md5, sha and ripemd160, compresssion with gzip, and a nice user interface. Created using C++ with Qt framework, depends on QCA third-part Qt Library and OpenSSL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    CryptDS
    CryptDS is cross platform file encryption software with AES-128 encryption based on Open Source library Crypt++. CryptDS has a wxWidgets GUI interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    A one key 64-bit encryption program designed for Linux and Windows. There is a console version, and also a GUI version provided by wxWindows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    A encryption library for C++ "DEL-X" that uses a 3d encryption algorithm. It can work with any key size from 8bit- 4096bit with a 512 byte block size.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Electronic Shelf Label Firebase Edition

    Electronic Shelf Label Firebase Edition

    An electronic shelf label is a type of price tag

    An Electronic Shelf Label is a device that's typically attached to the front edge of retail shelving. ESL Firebase Edition V2.0 utilizes the AES-256 in CBC mode and Google Firebase. It doesn't require an expensive gateway to function, once configured, all it needs is a power supply and a Wi-Fi access point. ESL Firebase Edition V2.0 allows you to operate as many of them as you wish, provided that each has its own unique ID, and there's enough power and bandwidth for all of them. For more information please visit https://github.com/Northstrix/Electronic-Shelf-Label-Firebase-Edition You can find the tutorial on V2.0: https://www.instructables.com/DIY-IoT-Electronic-Shelf-Label-With-Google-Firebas-1/ V1.0: https://www.instructables.com/DIY-IoT-Electronic-Shelf-Label-With-Google-Firebas/ The desktop app is made with the help of the ChatGPT.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    Encryptor

    Simple application to encrypt and decrypt strings

    Encryptor is an application extended by plugins, it is aimed to provide an interface to encrypt strings. At the moment, the available plugins are: * OpenSSLPlugin * BotanPlugin
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Hash Latch
    The hash latch generates keys in a manner similar to how some cryptocurrencies are mined. It takes a string and brute-forces a prefix for it so that the hash of the string with the prefix has a certain number of leading zeroes. But that alone would've been too easy to hack. To prevent an attacker from forging the keys by generating a new prefix: the hash latch doesn't output the keys in the plaintext. Instead, it encrypts the key and outputs the ciphertext. That means that instead of giving you the actual key, it gives you a safe containing the key. This approach allows the hash latch to protect itself from forged keys and also enables you to put the same key into multiple safes without the recipients of these safes knowing they have the same key (even if they compare their ciphertexts). Moreover, the hash latch verifies the integrity of a key after decrypting it (just in case). You can read the tutorial about it on Instructables: https://www.instructables.com/Hash-Latch/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    JDS: Data Security

    JDS: Data Security

    JDS is a powerful data protection program

    JDS is a powerful tool for data protection. Documents are encrypted using a special algorithm. The data encryption algorithm is constantly updated to improve security. The program also provides other functions. Such as sending a file to a vault with password access, fast text encryption in 3 types, and much more. The program is easy to use and does not require special knowledge. The standard version has 2 languages (Russian and English) and 9 themes. You can download the language and theme pack separately.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    The Mav.Crypt tool will be upgraded to many different encryption methods. At the Moment, the only method is ROT13, but we are developing some other technics and a new Algorithm. More Infos shortly at the Project Web Page.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Microsoft SEAL

    Easy-to-use and powerful homomorphic encryption library

    Microsoft SEAL is an open-source homomorphic encryption library that allows computations to be performed directly on encrypted data, with no need for any decryption. Developed by the Cryptography and Privacy Research group at Microsoft, it enables software engineers to build end-to-end encrypted data storage and computation services that never have to procure the customer's key. Microsoft SEAL is very easy to use, compile and run in many different environments. Homomorphic encryption is an encryption scheme that allows the cloud to compute directly on the encrypted data, without requiring the data to be decrypted first. This results in encrypted computations remaining encrypted, decrypted only by the data owner using the secret key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    OOS Software Distribution

    OOS Software Distribution

    Various programs accessed through a shell developed by a teenager.

    OOS, or Ozzy's Operating System, is simply a Shell that is currently under development. This "Shell" is not yet standalone; Meaning, it uses some platform-dependent code, and requires the Bash shell to work properly. It currently is only available for mac, but any of you can compile it for your Linux machines. Included with this shell are 3 nonbuiltin programs, which you can install during the installation of the "Operating System." OOS Mimics a UNIX Shell in every way I can think of, and acts as a little embedded Operating System. This, of course, allows for programs to be run. The nonbuiltin programs that I have developed and included include a game, a calculator, an encryption program, and another random program. This whole project was developed and maintained entirely by a 13-year-old. So enough of this description stuff! Download my program, try it out!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Pambaf

    Pambaf

    Another encryption algorithm

    Pambaf is a new encryption algorithm for users or developers with extremely high demands for security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    A command-line to help encipher and decipher your password based on a simple algorithm. Java version provides GUI.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    The PowerCiph Data Encryption Algorithm is a versatile, yet simplistic, encryption algorithm/protocol. The ultimate goal of the algorithm is simplicity, compactness, and a lack of prerequisites.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Secure Hash Algorithm variant of the nist maintained Secure Hash Algorithm. this is a 1024 bit digest. Comments suggestions always welcome. Rick Removed old downloads as they are long outdated. The update is the last version I worked on. Algorithm is based on the SHA2 digest. I may work on an updated version for c++11
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Open En/decryption software. Current version allows for 2 keys, 1 at 32 bytes, and 1 at 20 bytes. Supports ASCII and Binary files in a multiple-executable polylithic architecture.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB