Premier is a global leader in financial construction ERP software.
Rated #1 Construction Accounting Software by Forbes Advisor in 2022 & 2023. Our modern SAAS solution is designed to meet the needs of General Contractors, Developers/Owners, Homebuilders & Specialty Contractors.
Learn More
Loan management software that makes it easy.
Ideal for lending professionals who are looking for a feature rich loan management system
Bryt Software is ideal for lending professionals who are looking for a feature rich loan management system that is intuitive and easy to use. We are 100% cloud-based, software as a service. We believe in providing our customers with fair and honest pricing. Our monthly fees are based on your number of users and we have a minimal implementation charge.
Address to hash160 is an efficient multi-threaded tool designed to decode various cryptocurrency addresses (such as Bitcoin BTC,Bitcoin Cash BCH, Litecoin LTC, Bitcoin Gold BTG, etc.) to extract hash160 values. It is often used in research such as brainflayer, keyhunt, BitCrack, ecloop, keyhunt cuda, etc.
mystic-crypt is designed as a Java library that can be used for simple and complex encryption and decryption.
The source code for the library is available under https://github.com/astrapi69/mystic-crypt
For demonstration what the library can do there is a graphical client:
The source code for the ui is available under https://github.com/astrapi69/mystic-crypt-ui
ENIGMA 2000 is a reliable file encrypter for DOS shell
ENIGMA 2000 is a symmetric cryptographic algorithm developed in C++ for Windows, to encrypt any file.
It is not optimized for speed processing but it is extremly reliable. Tests state that a huge input file just with zeros, will return an output file whose frequency analysis is white noise.
It uses six phases to encrypt any file and the phases sequence depends on the password.
On phase 5, it uses the Rubik's cube paradigm to encrypt the data.
It's extremly reliable and the password varies between 8 and 16 characters.
...
jCryptPad stores text informationen hierarchical, e.g. passwords, important texts etc. The data is saved in a encrypted xml file. Encryption is done with the AES algorithm. Additionally a password generator and a text encryption editor is also included.
The full-stack observability platform that protects your dataLayer, tags and conversion data
Stop losing revenue to bad data today. and protect your marketing data with Code-Cube.io.
Code-Cube.io detects issues instantly, alerts you in real time and helps you resolve them fast.
No manual QA. No unreliable data. Just data you can trust and act on.
Command line encryption tool for one time, daemon, or stream dataprocessing. Data stats, check sums, conversion to/from text. Data/keys from files, pipes, standard input. In-place/diverted processing or data-analysis-only. Random, file, password keys.