608 projects tagged "Cryptography"

No download Website Updated 17 Aug 2008 xbasics FireHash

Screenshot
Pop 22.72
Vit 1.00

xbasics FireHash helps test the integrity of any file through the generation of checksums/hashes. It provides a simple, yet effective way for generating cryptographic hashes based on many different standard algorithms, including MD5 and SHA512, among many others.

Download Website Updated 18 Aug 2008 Cryptographic Implementations Analysis Too...

Screenshot
Pop 33.59
Vit 1.00

The Cryptographic Implementations Analysis Toolkit (CIAT) is a compendium of command line and graphical tools whose aim is to help in the detection and analysis of encrypted byte sequences within files (executable and non-executable). It is particularly helpful in the forensic analysis and reverse engineering of malware using cryptographic code and encrypted payloads.

Download Website Updated 21 Aug 2008 MonoDecrypt

Screenshot
Pop 17.15
Vit 1.00

MonoDecrypt uses pattern matching and its knowledge about character frequencies in order to decrypt messages encoded with a monoalphabetic substitution cipher. MonoDecrypt can decrypt texts of any language, as long as it has sufficient information about the language. Depending on the information you give it, the tool decrypts about 50%-100% on its own. Then you can decrypt the remaining data by filling the gaps or correcting bad guesses. MonoDecrypt can also encrypt texts using monoalphabetic substitution.

No download Website Updated 23 Sep 2008 rsavalidator

Screenshot
Pop 21.45
Vit 1.42

rsavalidator is a small dependency free RSA signature validator implemented in C.

Download No website Updated 12 Sep 2008 Crypto Server

Screenshot
Pop 21.79
Vit 1.00

cryptod is a program that listens on a TCP port or unix socket, receives information on that port, and performs the requested action. Common actions are aes256 encrypting/decrypting, base64 encoding/decoding, and RMD160 hashing. Interfacing with the daemon is well documented, and you are also easily able to obtain statistics from the server.

Download Website Updated 14 Feb 2011 ctunnel

Screenshot
Pop 98.71
Vit 3.22

ctunnel is a program for tunneling and proxying TCP or UDP connections via a cryptographic tunnel. ctunnel can be used to secure any existing TCP or UDP based protocol, such as HTTP, Telnet, FTP, RSH, MySQL, VNC, DNS, XDMCP, NFS, etc. You can also chain or bounce connections to any number of intermediary hosts.

Download Website Updated 09 Nov 2010 Shrew Soft VPN client

Screenshot
Pop 65.27
Vit 2.25

The Shrew Soft VPN Client for Unix is a free IPsec Client for FreeBSD, NetBSD, and Linux based operating systems. It can be used to communicate with systems running ipsec-tools. The Unix client utilizes the IPsec kernel support included with the operating system, and comes with the complete Internet Key Exchange daemon and client front end application source code. A Windows version is also available.

Download Website Updated 09 Oct 2012 eurephia

Screenshot
Pop 93.99
Vit 5.87

eurephia is an authentication plug-in for OpenVPN. It enhances the OpenVPN authentication process by using user name and password authentication in addition to SSL certificates. If too many failed attempts are registered, the user account and/or IP address will be blocked. For Linux servers, iptables support is also included, which can be used to restrict each user's network access through the VPN channel. OpenVPN 2.2 or later is required.

Download Website Updated 12 May 2014 Mandos

Screenshot
Pop 418.86
Vit 63.70

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

No download Website Updated 19 Oct 2008 Loxodo

Screenshot
Pop 25.06
Vit 45.25

Loxodo is a password vault that is compatible with Password Safe V3.

Screenshot

Project Spotlight

WiKID Two-Factor Authentication System

A self-hosted, dual-source two-factor authentication system.

Screenshot

Project Spotlight

Packet Peeper

A network protocol analyzer for Mac OS X.