Showing 40 open source projects for "decrypt code"

View related business solutions
  • The Most Powerful Software Platform for EHSQ and ESG Management Icon
    The Most Powerful Software Platform for EHSQ and ESG Management

    Addresses the needs of small businesses and large global organizations with thousands of users in multiple locations.

    Choose from a complete set of software solutions across EHSQ that address all aspects of top performing Environmental, Health and Safety, and Quality management programs.
    Learn More
  • Skillfully - The future of skills based hiring Icon
    Skillfully - The future of skills based hiring

    Realistic Workplace Simulations that Show Applicant Skills in Action

    Skillfully transforms hiring through AI-powered skill simulations that show you how candidates actually perform before you hire them. Our platform helps companies cut through AI-generated resumes and rehearsed interviews by validating real capabilities in action. Through dynamic job specific simulations and skill-based assessments, companies like Bloomberg and McKinsey have cut screening time by 50% while dramatically improving hire quality.
    Learn More
  • 1
    ISC - The ISAAC Stream Cipher

    ISC - The ISAAC Stream Cipher

    ISC lets you encrypt & decrypt text and files of any type up to 4GB

    ISAAC is a cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It was developed by Bob Jenkins from 1993-1996 and placed in the Public Domain. ISAAC is fast - especially when optimised - and portable to most architectures in nearly all programming and scripting languages. After more than 20 years of existence ISAAC has not been broken, and the little program you have here allows you to use it to encrypt and decrypt text of arbitrary length, files of any...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    e-Exam

    e-Exam

    Testing students has never been easier!

    This program is a replacement to paper-based exams. You have to write the test in a text file and then load it from the program. From there you have the option of choosing exactly how many questions you want in the test (the questions will be chosen at random), you can also randomize the order of the possible answers of all of the questions (while still maintaining the "right" correct answers), or if you want you can also randomize the order of the questions. You will also be prompted for a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Thesis-Password retrieval from Windows

    Thesis project: Password retrieval from Windows

    FOR EDUCATIONAL PURPOSES ONLY. Unauthorized credential retrieval from a computer running Windows. Code to automate/combine of already finished projects to retrieve username and password from Windows partitions using linux running from a usb storage device, using tools as bkhive, samdump2, rcracki_mt to process core files from within the windows system to get the NTLM hash and rainbow tables to decrypt it. I do not have and do not claim ownership of any intellectual property not produced by me. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    sqlite3fish

    Another encryption solution (with Blowfish algorithm) for SQLite3

    The sqlite3fish is another encryption solution for sqlite3. It is based on some source code of botansqlite3(https://github.com/OlivierJG/botansqlite3) . But it does not need Botan library, it uses Blowfish algorithm to encrypt/decrypt the database file. This library only depends on the source code(no-modify) of SQLite3, it is clean and easy to compile. But currently it only supports the version 3.7.0 of SQLite3 (http://www.sqlite.org/sqlite-amalgamation-3_7_0.zip) .
    Downloads: 0 This Week
    Last Update:
    See Project
  • The AI workplace management platform Icon
    The AI workplace management platform

    Plan smart spaces, connect teams, manage assets, and get insights with the leading AI-powered operating system for the built world.

    By combining AI workflows, predictive intelligence, and automated insights, OfficeSpace gives leaders a complete view of how their spaces are used and how people work. Facilities, IT, HR, and Real Estate teams use OfficeSpace to optimize space utilization, enhance employee experience, and reduce portfolio costs with precision.
    Learn More
  • 5

    Simplest Text Encrypter

    A simple example of polyalphabetic cipher in Java.

    Cryptography fascinates everyone. A variety of encryption techniques and ciphers are used to code important data. A polyalphabetic cipher is one of the simplest cipher one can make. This is a Java program to implement polyalphabetic cipher. [How the cipher encodes?] Input Data: helloaf Key: love l - 12th letter in Alphabet o - 15th letter in Alphabet v - 22nd letter in Alphabet e - 5th letter in Alphabet Now: h(l) e(o) l(v) l(e) o(l) a(o) f(v) Further: h(+12)...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Substitution Cipher Decryption

    Decrypt messages encrypted with a substitution cipher

    The provided program helps the user with the deciphering of a substitution cipher with the 26 letter alphabet by providing the following features • Dynamic entering of ciphertext. Ciphertext can be modified at any point of the process. • Easy location of corresponding characters in the ciphertext and the substituted text by selection. • Fast frequency analysis for single letters, bigrams, trigrams and quadgrams (more N -grams can be made available by adding a single line of code). •...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    ...It is safer than zip or rar files because a simple force-attack can reveal their password. A force-attack to an AES encriptation could delay millions of years. There are available the source code of the GUI, a CaptionProgressBar and the RijndaelCryptorProvider, the core of the application which can start a encriptation process in a simple code line. New Version released (v2.5): - Add English Language - Some Bug Fixes - Added some options - Added some encriptation parameters IMPORTANT CRITICAL UPDATE (V2.5.0.1)!!!!! ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    EAESCrypt

    Extended AES Cryptography

    ...EAESCrypt is a command line utility. The instaler for Windows 7 provides some basic functionality in the context menu for the files in Windows Explorer, to encrypt and decrypt them, as well as to manage the encryption keys. Go to the EAESCrypt Web Site to download the installer and the source code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Cyberbit

    Cyberbit

    Visual Cryptography and Bit-Plane Complexity Segmentation in Python

    ...The vessel images can be 8-bit gray-level images or 24-bit deep true-color images. Anyone who can correctly spot the two vessels and knows the dimensions of the image containing the secret message will be able to decrypt the secret message using the Cyberbit application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Inventory and Order Management Software for Multichannel Sellers Icon
    Inventory and Order Management Software for Multichannel Sellers

    Avoid stockouts, overselling, and losing control as your business grows.

    We are the most powerful inventory and order management platform for Amazon, Walmart, and multichannel product sellers. Centralize orders, product information, and fulfillment operations to run more efficiently, sell more products, and stay compliant with marketplace requirements so you can grow profitably.
    Learn More
  • 10

    EncryExchange

    Encrypted Message Exchange

    ----- New Version ----- v1.1 - Added new features, tidied and condensed the UI, tidied up the code and added better error handling and messages. ----- This Server-Client application allows the exchange of encrypted messages using the public key as the address of the mailbox. This system is designed to be used to exchange messages through networks and servers that can not be trusted. The client application is a C#.net application that is used as a mail client to send/receive and encrypt/decrypt messages. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    HTML Encrypter

    HTML Encrypter

    Java based HTML encrypter and decrypter

    An encryption and decryption application developed in Java. The application uses a number of algorithms to encrypt and decrypt the HTML source code: Blowfish, AES, TEA, Rabbit, MARC 4, Escape/Unescape functions. In addition to the encryption and decryption functions, the application also returns the source code of a website. The user has the ability to upload the encrypted file, using the FTP transfer feature, to his or hers personal website. Additional features are listed below.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
    Project discontinued due to I would keep the code for private use. If you downloaded already and you like it, I suggest keeping a backup of it in a safe spot.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    SLEncrypt is a python module for encryption with 11 ciphers at the moment, including ADFGVX, Autokey, Caesar/ROT13, Vigenere, XOR and a lot more. It contains functions allowing you to easily encrypt/decrypt files. The code is about 95% PEP 8 compilant.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Code of the Furries: Generate/decrypt a Furry Code with the FurCoder. Written with FXRuby toolkit, and Ruby. This version developed for Linux. X11 application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    MTCaptcha Direct Token Decrypt
    MTCaptcha, a GDPR and VPAT compliant captcha service build for the enterprise. This is the demo code to decrypt and decode MTCaptcha's verified token directly on server side without making any API call. This is for customers of MTCaptcha Captcha Service (https://www.mtcaptcha.com) The demo code can be found on github: https://mtcaptcha-public.github.io/MTCaptcha-Direct-Token-Decryption/
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB