Transform months of data modeling and coding into days.
Automatically generate, document, and govern your entire data architecture.
Efficiently model your business and data models, and generate code for your data pipelines, data lakehouse, and analytical applications
Learn More
Striven | All In One Business Management Software
Striven is an all-in-one business management software suite with everything your organization needs for success.
Striven is the all-in-one business management software that lowers your costs, improves your operations, and makes work easier. Make your company’s data coherent, connected, and relevant.
Encryption/Decryption tool for words/hash/digits/encoded text
Word Cipher - KRIEG Technologies
Developed by: Northumber, KRIEG Technologies
This application is developed for encode/decode words and translate them into commons encryption languages but also ancient ciphering language.You can encrypt/decrypt words or text or digits into:
----- Text Ciphering -----
Albam Latin (Temurah)
Atbash Latin (Temurah)
Avgad Latin (Temurah)
Caesar Cipher
Flipped Text
----- Text Rotation -----
ROT5 (Digits)
ROT13 (Text)
ROT18 (Text &...
ActiveLock is an open-source copy protection, software licensing framework for all development enviroments supporting COM+ architecture. Core DLL available in VB2008 and VB6. Samples in C++, C#, Excel/Access VBA and keygens in PHP, ASP.NET available.
SOLEid is a multi-purpose file protector that helps users to easily protect their files with different protection measures. The ones that are included till date are: password protection, hardware id lock, username and process protection.
Inferno is a simple and fast program that can securely delete files using the same methods as the U.S. Department of Defense. Inferno can also securely delete internet and windows history. Also it can even encrypt and decrypt your private files.
A no-code toolkit for building responsive and resilient mobile business applications for Microsoft Power Platform, Dynamics 365, Dataverse and Salesfo
Deploying mobile apps with Resco takes days, not months—all without writing a single line of code. Workers can download the Resco app from AppStore, Google Play, or Windows Store, log into your company environment, and instantly use the app you have published on any device.
BinaryPix is a Tool to create "Binary-Visual" Code out of ASCII-Text Then it places it on a choosen picture. Then you are able to water-mark your pictures with the "binary-hidden" code.
Power through agendas and documents, make more informed decisions and conduct board meetings faster.
For team managers searching for a solution to manage their meetings
iBabs not only captures the entire decision-making process – it takes all the paperwork out of meetings. iBabs empowers everyone who has ever organized or attended, a meeting. With a seemingly simple app that offers complete control and a comprehensive overview of all those fiddly details. With about 3000 organizations and over 300,000 users, iBabs gives you peace of mind. So you can quickly organize effective meetings, and good decisions can be made with confidence. iBabs didn’t just happen overnight. We started analyzing and simplifying board meeting processes many years ago. We understand all the work that goes into meetings, and how to streamline everything so it all flows smoothly. On any device, confidentially, securely and automatically. Make good decisions with confidence.
SFV.net is a sfv (Simple File Verificator) file creator and validator application. All code written by vb.net and requires .net framework for run or compile
An original bruteforce-based encryption/decryption system. BBE was originally conceived to chat with encrypted text on IRC. mIRC and X-Chat support BBE via script addon. BBE can also encrypt MIME encoded files. Blowfish encryption is currently supported.
CryptoTW provides a win32 DLL that acts as an interface between the GPG.EXE from gnupg.org and a win32 program. Programming automated systems against the GPG.EXE is challenging. By solving the problem once, as a DLL, many developers can benefit.
The Leeter is an easy-to-use and convinient program to easily write hardly understandable text. While this is mainly not the intention of normal chatters it may be a nice joke to try out on friends. Provides 5 different options to scramble up your text.
The goal of Operation Project X is to crack the 2048-bit RSA private encryption key Microsoft uses to sign Xbox media, by using distributed computing. This key could be used by Xbox owners to run homebrew code on their machines.
Overcoat encrypts your projects exe file before distribution (for shareware authors for example), that limits the use of an exe file, and forces the user to purchase/registar after a certain developer defined period
OpenSSL Digest frontend for Windows. This program can be used to create/verify MD2/MD4/MD5/SHA/SHA1/MDC2/RIPEMD160 checksums of your files. OpenSSL32 now supports file encryption/decryption using various encryption Ciphers, such as Blowfish, Idea, DES,
The File Shredder securely shreds files by overwriting them before they are deleted. Every character in the file is overwritten with customised random data, so it is secure, but a little slow. The file is also given a random name.
A number of tools to enhance management/coding of NFR (http://www.nfr.net) IDA, and various other admin tools that can be used for both NFR and hand coding other appliance scripts.
We at GCD are here to bring you ease in decoding your friends CRYPTIC GeekCode .signature files -=). Also sometime in the future we plan to eventualy start an ENCODER to help you even more!