Showing 136 open source projects for "encryption"

View related business solutions
  • AestheticsPro Medical Spa Software Icon
    AestheticsPro Medical Spa Software

    Our new software release will dramatically improve your medspa business performance while enhancing the customer experience

    AestheticsPro is the most complete Aesthetics Software on the market today. HIPAA Cloud Compliant with electronic charting, integrated POS, targeted marketing and results driven reporting; AestheticsPro delivers the tools you need to manage your medical spa business. It is our mission To Provide an All-in-One Cutting Edge Software to the Aesthetics Industry.
    Learn More
  • The AI workplace management platform Icon
    The AI workplace management platform

    Plan smart spaces, connect teams, manage assets, and get insights with the leading AI-powered operating system for the built world.

    By combining AI workflows, predictive intelligence, and automated insights, OfficeSpace gives leaders a complete view of how their spaces are used and how people work. Facilities, IT, HR, and Real Estate teams use OfficeSpace to optimize space utilization, enhance employee experience, and reduce portfolio costs with precision.
    Learn More
  • 1
    Cryptomator

    Cryptomator

    Multi-platform transparent client-side encryption for your cloud files

    Cryptomator is a free and open source project that offers multi-platform, transparent client side encryption of your files in the cloud. It works with just about any cloud storage service; is totally transparent so you can work with your files how you normally would; and secure with a 256-bit key length AES encryption. It’s also simple and easy to use with no need for different accounts, key management, cloud access grants or cipher configurations.
    Downloads: 20 This Week
    Last Update:
    See Project
  • 2
    XX-Net

    XX-Net

    A web proxy tool

    XX-Net is an easy-to-use, anti-censorship web proxy tool from China. It includes GAE_proxy and X-Tunnel, with support for multiple platforms.
    Downloads: 61 This Week
    Last Update:
    See Project
  • 3
    gost

    gost

    GO Simple Tunnel, a simple tunnel written in golang

    ...Listening on multiple ports, multi-level forward proxies - proxy chain, standard HTTP/HTTPS/HTTP2/SOCKS4(A)/SOCKS5 proxy protocols support. Probing resistance support for web proxy, TLS encryption via negotiation support for SOCKS5 proxy. Support multiple tunnel types, tunnel UDP over TCP. Local/remote TCP/UDP port forwarding, TCP/UDP Transparent proxy, Shadowsocks Protocol (TCP/UDP), and SNI Proxy. Permission control, load balancing, route control, DNS resolver and proxy, and TUN/TAP Device. In GOST, GOST and other proxy services are considered as proxy nodes, GOST can handle the requests itself, or forward the requests to any one or more proxy nodes. ...
    Downloads: 49 This Week
    Last Update:
    See Project
  • 4
    uWebSockets.js

    uWebSockets.js

    μWebSockets for Node.js back-ends

    µWebSockets.js is a web server bypass for Node.js that reimplements eventing, networking, encryption, web protocols, routing and pub/sub in highly optimized C++. As such, µWebSockets.js delivers web serving for Node.js, 8.5x that of Fastify and at least 10x that of Socket.IO. It is also the built-in web server of Bun.
    Downloads: 4 This Week
    Last Update:
    See Project
  • The Most Powerful Software Platform for EHSQ and ESG Management Icon
    The Most Powerful Software Platform for EHSQ and ESG Management

    Addresses the needs of small businesses and large global organizations with thousands of users in multiple locations.

    Choose from a complete set of software solutions across EHSQ that address all aspects of top performing Environmental, Health and Safety, and Quality management programs.
    Learn More
  • 5
    Project X

    Project X

    Originates from XTLS protocol, providing a set of network tools

    ...It is written primarily in Go and is optimized for high performance, making it suitable for both personal and large-scale deployments. Project X also integrates advanced features like REALITY and XTLS, which enhance encryption and disguise traffic to improve privacy and resistance to detection. The platform is highly modular, allowing developers to customize routing rules, transport layers, and proxy behaviors through configuration files or integrations.
    Downloads: 18 This Week
    Last Update:
    See Project
  • 6
    croc

    croc

    Easily and securely send things from one computer to another

    Yet another way to transfer files that strikes a good balance between speed, security or simplicity by using relay-assisted peer-to-peer transactions and end-to-end encryption via password-authenticated key exchange. There are a lot of ways to transfer files. Above the basic necessity of preserving the data during the transfer, sharing data should be fast, secure, and most of all, easy. Most file transfer utilities I’ve used encompass two thirds of these qualities. I’ve wanted to make a utility that encompasses all three, without compromising any one of them. ...
    Downloads: 12 This Week
    Last Update:
    See Project
  • 7
    Duplicati

    Duplicati

    Store securely encrypted backups in the cloud!

    Duplicati is a free and open source backup client for securely storing your data. Duplicati stores encrypted, incremental, compressed backups on cloud storage services and remote file servers using AES-256 encryption, keeping your data safe and always updated. It works with most storage services, including Google Cloud and Drive, Amazon S3, Microsoft Azure and OneDrive, Dropbox, FTPOpenStack Storage (Swift), SSH (SFTP), WebDAV, Tencent Cloud Object Storage (COS), and more! Duplicati also works on all major platforms (Windows, Linux and OSX). ...
    Downloads: 28 This Week
    Last Update:
    See Project
  • 8
    SMTP Tunnel Proxy

    SMTP Tunnel Proxy

    A high-speed covert tunnel that disguises TCP traffic as SMTP email

    ...It implements a SOCKS5 proxy interface on the client that wraps outbound traffic into an SMTP-like handshake (EHLO, STARTTLS, AUTH) and encrypted payload, making the session appear to DPI systems as a normal email exchange. The tool supports modern TLS encryption (STARTTLS) with HMAC-SHA256 authentication, per-user secrets, IP whitelisting, and multiplexed connections over a single tunnel. With a simple installer and systemd service setup, users can quickly deploy it on a Linux VPS as a tunneled access point, then connect from Windows, macOS, or Linux clients using auto-generated client packages. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    ZeroTier

    ZeroTier

    A smart Ethernet switch for Earth

    ...Emulates Layer 2 Ethernet with multipath, multicast, and bridging capabilities. ZeroTier’s zero-trust networking solution provides scalable security with 256-bit end-to-end encryption. Simplify your network stack by unifying VPNs, VLANs, and SD-WANs with one solution. Easily build common backplane networks spanning multiple cloud providers. Easily provision and de-provision remote access for users, contractors, and partners. Save on performance, storage, and bandwidth by unifying on-prem with cloud. Administrate and debug from anywhere.
    Downloads: 57 This Week
    Last Update:
    See Project
  • Data management solutions for confident marketing Icon
    Data management solutions for confident marketing

    For companies wanting a complete Data Management solution that is native to Salesforce

    Verify, deduplicate, manipulate, and assign records automatically to keep your CRM data accurate, complete, and ready for business.
    Learn More
  • 10
    frp

    frp

    A Fast Reverse Proxy

    frp stands for exactly what it is: a fast reverse proxy. It helps you expose a local server behind a NAT or firewall to the Internet. It is currently under development, but already supports TCP and UDP, as well as HTTP and HTTPS protocols where requests can be forwarded to internal services by domain name. It also has a P2P connect mode and many other nifty features. These include configuration files, environment variables, a dashboard that shows you frp's status and proxies' statistics...
    Downloads: 97 This Week
    Last Update:
    See Project
  • 11
    DuckDuckGo Browser Extensions

    DuckDuckGo Browser Extensions

    DuckDuckGo Privacy Essentials browser extension for Firefox, Chrome

    Privacy, simplified. One super-charged app, multiple types of privacy protection. The DuckDuckGo app provides the most comprehensive online privacy protection with the push of a button. With one download, you get a new everyday browser that offers seamless protection while you search and browse, and even access to tracking protection for emails you receive. Protecting your privacy online is like protecting your home. Locking the front door won’t stop the most determined folks from getting...
    Downloads: 32 This Week
    Last Update:
    See Project
  • 12
    Rclone

    Rclone

    Rsync for cloud storage

    Rclone is a command line program for syncing files and directories to and from various cloud storage providers, including Google Drive, Amazon Drive, S3, Dropbox, Backblaze B2, One Drive, Swift, Hubic, Cloudfiles, Google Cloud Storage, Yandex Files and many more.
    Downloads: 15 This Week
    Last Update:
    See Project
  • 13
    cunicu

    cunicu

    A zeroconf peer-to-peer mesh VPN using Wireguard

    cunīcu is a user-space daemon managing WireGuard interfaces to establish a mesh of peer-to-peer VPN connections in harsh network environments. To achieve this, cunīcu utilizes a signaling layer to exchange peer information such as public encryption keys, hostname, advertised networks, and reachability information to automate the configuration of the networking links. From a user perspective, cunīcu alleviates the need of manual configuration such as exchange of public keys, IP addresses, endpoints, etc.. Hence, it adopts the design goals of the WireGuard project, to be simple and easy to use. ...
    Downloads: 29 This Week
    Last Update:
    See Project
  • 14
    firezone

    firezone

    Enterprise-ready zero-trust access platform built on WireGuard

    Firezone is a modern, self-hosted VPN solution built on WireGuard, designed to provide secure remote access for teams and infrastructure. It offers a sleek web interface, automatic configuration management, and strong encryption. Unlike traditional VPNs, Firezone focuses on ease of deployment, scalability, and integration with identity providers, making it ideal for developers and teams needing secure networking without relying on third-party services.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 15
    DTail

    DTail

    DTail is a distributed DevOps tool for tailing, grepping, catting logs

    DTail (a distributed tail program) is a DevOps tool for engineers programmed in Google Go for following (tailing), catting and grepping (including gzip and zstd decompression support) log files on many machines concurrently. An advanced feature of DTail is to execute distributed MapReduce aggregations across many devices. For secure authorization and transport encryption, the SSH protocol is used. Furthermore, DTail respects the UNIX file system permission model (traditional on all Linux/UNIX variants and also ACLs on Linux based operating systems). The DTail binary operates in either client or server mode. The DTail server must be installed on all server boxes involved. The DTail client (possibly running on a regular Laptop) is used interactively to connect to the servers concurrently. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Setup IPsec VPN

    Setup IPsec VPN

    Scripts to build your own IPsec VPN server with IPsec/L2TP

    setup-ipsec-vpn is a set of automated scripts that allow you to deploy your own IPsec VPN server on Linux in just a few minutes. It supports multiple VPN protocols, including IPsec/L2TP, Cisco IPsec (XAuth), and IKEv2, providing strong encryption to protect network traffic. By encrypting all traffic between the client and server, the VPN prevents eavesdropping on unsecured networks such as public Wi-Fi in coffee shops, hotels, or airports. The project uses Libreswan as the IPsec server and xl2tpd as the L2TP provider, with additional options to install WireGuard or OpenVPN on the same host. ...
    Downloads: 17 This Week
    Last Update:
    See Project
  • 17
    CloudServer

    CloudServer

    Zenko CloudServer open-source Node.js implementation of S3 protocol

    Zenko CloudServer, an open-source Node.js implementation of the Amazon S3 protocol on the front-end and backend storage capabilities to multiple clouds, including Azure and Google.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    Bitwarden Client Applications

    Bitwarden Client Applications

    Bitwarden client applications (web, browser extension, desktop, cli)

    ...For those who want to do more, secure more, and collaborate more, Bitwarden is fast and easy to set up for both individuals and businesses. Cross-platform access for mobile, browser, and desktop apps. Supported in over 40 languages. Zero-knowledge, and end-to-end encryption guide the Bitwarden approach to trust, accountability, and security.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 19
    Floccus

    Floccus

    Sync your bookmarks privately across browsers and devices

    ...Create as many sync profiles as you need. Control sync strategy (i.e. uni- or bidirectional), sync interval and synced folder. Easily export your configuration. Keep your credentials secure with an encryption passphrase. Sync your bookmarks privately across browsers an devices.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 20
    crawler

    crawler

    Collection of JS reverse engineering examples for web scraping study

    crawler is a collection of web scraping and JavaScript reverse engineering examples designed for learning how modern websites protect their data and how those protections can be analyzed. It contains many case studies that demonstrate how to analyze and replicate request parameters, cookies, and encryption logic used by real websites. Each directory in the project focuses on a specific target service or scenario, showing how browser network requests and JavaScript code can be studied to reproduce API calls programmatically. Many examples illustrate techniques such as debugging scripts, intercepting requests, analyzing encrypted parameters, and understanding authentication flows. crawler also explores common anti-scraping defenses and demonstrates how developers can examine them through debugging tools and reverse engineering techniques.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 21
    Interactsh

    Interactsh

    An OOB interaction gathering server and client library

    Interactsh is an open-source tool for detecting out-of-band interactions. It is a tool designed to detect vulnerabilities that cause external interactions. Interactsh Cli client requires go1.17+ to install successfully. interactsh-client with -sf, -session-file flag can be used store/read the current session information from user defined file which is useful to resume the same session to poll the interactions even after the client gets stopped or closed. Running the interactsh-client in...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 22
    syslog-ng

    syslog-ng

    Log management solution that improves the performance of SIEM

    syslog-ng is the log management solution that improves the performance of your SIEM solution by reducing the amount and improving the quality of data feeding your SIEM. With syslog-ng Store Box, you can find the answer. Search billions of logs in seconds using full text queries with Boolean operators to pinpoint critical logs. syslog-ng Store Box provides secure, tamper-proof storage and custom reporting to demonstrate compliance. syslog-ng can deliver data from a wide variety of sources to...
    Downloads: 12 This Week
    Last Update:
    See Project
  • 23
    GoProxy

    GoProxy

    High performance proxy server implemented by golang

    The GoProxy is a high-performance http proxy, https proxy, socks5 proxy, ss proxy, websocket proxies, tcp proxies, udp proxies, game shield, game proxies. Supports forward proxies, reverse proxy, transparent proxy, internet nat proxies, https proxy load balancing, http proxy load balancing , socks5 proxies load balancing, socket proxy load balancing, ss proxy load balancing, TCP / UDP port mapping, SSH transit, TLS encrypted transmission, protocol conversion, anti-pollution DNS proxy, API...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 24
    Fabio

    Fabio

    Consul Load-Balancing made simple

    Fabio is an HTTP and TCP reverse proxy that configures itself with data from Consul. Traditional load balancers and reverse proxies need to be configured with a config file. The configuration contains the hostnames and paths the proxy is forwarding to upstream services. This process can be automated with tools like consul-template that generate config files and trigger a reload. Fabio works differently since it updates its routing table directly from the data stored in Consul as soon as...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    YourInfo

    YourInfo

    Real-time browser fingerprinting demo with cross-browser tracking

    YourInfo is a personal information management tool designed to let users securely store, structure, and retrieve their key data — such as contacts, credentials, personal notes, and preferences — while also enabling AI-assisted queries or reminders using that data. The platform prioritizes privacy by focusing on local storage or user-controlled databases, ensuring sensitive data stays under the user’s control rather than in third-party servers. Users can define types of information, tag...
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB