Showing 77 open source projects for "dmg decrypt key"

View related business solutions
  • The full-stack observability platform that protects your dataLayer, tags and conversion data Icon
    The full-stack observability platform that protects your dataLayer, tags and conversion data

    Stop losing revenue to bad data today. and protect your marketing data with Code-Cube.io.

    Code-Cube.io detects issues instantly, alerts you in real time and helps you resolve them fast. No manual QA. No unreliable data. Just data you can trust and act on.
    Learn More
  • Run applications fast and securely in a fully managed environment Icon
    Run applications fast and securely in a fully managed environment

    Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.

    Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
    Try for free
  • 1
    AWS Encryption SDK for Java
    The AWS Encryption SDK is a client-side encryption library designed to make it easy for everyone to encrypt and decrypt data using industry standards and best practices. It enables you to focus on the core functionality of your application, rather than on how to best encrypt and decrypt your data. The AWS Encryption SDK is provided free of charge under the Apache 2.0 license. With the AWS Encryption SDK, you define a master key provider (Java and Python) or a keyring (C, C#/.NET, and JavaScript) that determines which wrapping keys you use to protect your data. ...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 2
    dotenvx

    dotenvx

    A secure dotenv–from the creator of `dotenv`

    ...Designed by the creator of the classic dotenv library, dotenvx preserves the familiar workflow while adding safeguards against one of the biggest risks with plain environment files: plaintext secrets exposure. It offers CLI commands that can encrypt and decrypt .env files, inject environment variables at runtime, and support conventions like layered environment file loading similar to Next.js or dotenv-flow. Beyond basic runtime usage, dotenvx includes tooling for key management, listing .env files in structured views, and operations like variable rotation and scoped overrides, bringing more robust secrets handling to modern app stacks.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 3
    jarrid-keyper

    jarrid-keyper

    Keyper by Jarrid is a suite of crypto key management APIs

    Keyper by Jarrid is a suite of crypto key management APIs to simplify key creation, management, deployment, and encryption/decryption in a standardized and secure way. Operations are file-based and can be easily automated, tracked, audited, and managed via file-based processes such as GitOps. Fully integrated with cloud KMS services such as AWS KMS or GCP KMS, leverage managed crypto key generation and reduce infrastructure maintenance burden.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4
    aws-encryption-sdk

    aws-encryption-sdk

    AWS Encryption SDK

    The AWS Encryption SDK is a client-side encryption library designed to make it easy for everyone to encrypt and decrypt data using industry standards and best practices. It enables you to focus on the core functionality of your application, rather than on how to best encrypt and decrypt your data. The AWS Encryption SDK is provided free of charge under the Apache 2.0 license. With the AWS Encryption SDK, you define a master key provider (Java and Python) or a keyring (C, C#/.NET, and JavaScript) that determines which wrapping keys you use to protect your data. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • Outbound sales software Icon
    Outbound sales software

    Unified cloud-based platform for dialing, emailing, appointment scheduling, lead management and much more.

    Adversus is an outbound dialing solution that helps you streamline your call strategies, automate manual processes, and provide valuable insights to improve your outbound workflows and efficiency.
    Learn More
  • 5
    OpenPGP.js

    OpenPGP.js

    OpenPGP implementation for JavaScript

    ...The idea is to implement all the needed OpenPGP functionality in a JavaScript library that can be reused in other projects that provide browser extensions or server applications. It should allow you to sign, encrypt, decrypt, and verify any kind of text, in particular e-mails, as well as managing keys. Version 3.0.0 of the library introduces support for public-key cryptography using elliptic curves. We use native implementations on browsers and Node.js when available.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    SOPS

    SOPS

    Simple and flexible tool for managing secrets

    sops is an editor of encrypted files that supports YAML, JSON, ENV, INI and BINARY formats and encrypts with AWS KMS, GCP KMS, Azure Key Vault, age, and PGP. For the adventurous, unstable features are available in the develop branch, which you can install from source. To use sops as a library, take a look at the decrypt package. We rewrote Sops in Go to solve a number of deployment issues, but the Python branch still exists under python-sops. We will keep maintaining it for a while, and you can still pip install sops, but we strongly recommend you use the Go version instead. ...
    Downloads: 18 This Week
    Last Update:
    See Project
  • 7
    react-native-keychain

    react-native-keychain

    Keychain Access for React Native

    ...Both setGenericPassword and setInternetCredentials are limited to strings only, so if you need to store objects etc, please use JSON.stringify/JSON.parse when you store/access it. On API levels that do not support Android keystore, Facebook Conceal is used to en/decrypt stored data. The encrypted data is then stored in SharedPreferences. Since Conceal itself stores its encryption key in SharedPreferences, it follows that if the device is rooted (or if an attacker can somehow access the filesystem), the key can be obtained and the stored data can be decrypted. Therefore, on such a device, the concealed encryption is only an obscurity. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 8
    FreeRDP

    FreeRDP

    FreeRDP is a free remote desktop protocol library and clients

    ...Network tracing of RDP can be quite a challenge due to a number of factors such as encryption, compression, and the fact that these protocol features cannot always be disabled or worked around. One of the easiest way of decrypting RDP traffic is to configure the server with a self-signed certificate for which the private key is known, and then use this certificate with a network tracing tool to automatically decrypt the packets.
    Downloads: 104 This Week
    Last Update:
    See Project
  • 9
    Sealed Secrets for Kubernetes

    Sealed Secrets for Kubernetes

    A Kubernetes controller and tool for one-way encrypted Secrets

    Sealed Secrets provides declarative Kubernetes Secret Management in a secure way. Since the Sealed Secrets are encrypted, they can be safely stored in a code repository. This enables an easy-to-implement GitOps flow that is very popular among the OSS community. Sealed Secrets offers a powerful CLI tool (kubeseal) to one-way encrypt your Kubernetes Secret easily. The Sealed Secrets controller will decrypt any Sealed Secret into its equivalent Kubernetes Secret. Sealed Secrets are safe to...
    Downloads: 12 This Week
    Last Update:
    See Project
  • The AI workplace management platform Icon
    The AI workplace management platform

    Plan smart spaces, connect teams, manage assets, and get insights with the leading AI-powered operating system for the built world.

    By combining AI workflows, predictive intelligence, and automated insights, OfficeSpace gives leaders a complete view of how their spaces are used and how people work. Facilities, IT, HR, and Real Estate teams use OfficeSpace to optimize space utilization, enhance employee experience, and reduce portfolio costs with precision.
    Learn More
  • 10
    GopenPGP V3

    GopenPGP V3

    A high-level OpenPGP library

    GopenPGP V3 is a high-level OpenPGP cryptographic library developed by ProtonMail that provides a user-friendly API for common encryption and signing operations in Go, abstracting the complexity of the underlying OpenPGP standards and golang crypto primitives. This library lets developers perform key generation, message encryption and decryption, digital signing, and signature verification with straightforward functions that hide much of the boilerplate and nuance typically required when...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    FHEVM

    FHEVM

    Integrate FHE with blockchain applications

    FHEVM is a framework built by Zama to enable confidential smart contracts on EVM-compatible blockchains using Fully Homomorphic Encryption (FHE). It lets developers write Solidity contracts that handle encrypted inputs, encrypted state, arithmetic and logical operations on encrypted types, while maintaining privacy (data always encrypted), composability (encrypted state works alongside public state), and security (via threshold decryption, KMS, etc). The framework includes on-chain and...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 12
    seekthis
    🔐 SeekThis – File Encryption & Decryption Tool (AES) Secure your important files with SeekThis, a lightweight and efficient tool to encrypt and decrypt files using the AES (Advanced Encryption Standard) algorithm. With SeekThis, you can: ✅ Hide important files using your own key ✅ Protect data privacy quickly and easily ✅ Decrypt files only if you have the correct key ✅ Free and open-source! 📁 Encryption & Decryption made more convenient, secure, and personal. Try it now and keep your secret files safe 💼
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    otp

    otp

    This program takes stdin, xor's it with a key and outputs to stdio

    "otp" command line to encrypt / decrypt using the One Time Pad algorythm
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    BIP39-XOR

    BIP39-XOR

    Encrypt or decrypt 12, 15, 18, 21 or 24 BIP39 codewords array ("seed")

    Encrypt or decrypt 12, 15, 18, 21 or 24 BIP39 codewords array (so-called "seed phrase") using exclusive OR (XOR)/Vernam cipher (a.k.a. One Time Pad). If not input by a user, an encryption key is automatically generated at random. Encryption with such a key preserves integrity of BIP-39 checksums of all keys (that's distinct while also compatible with SeedXOR implementation).
    Downloads: 10 This Week
    Last Update:
    See Project
  • 15
    AuthPass.app

    AuthPass.app

    Password Manager based on Flutter for all platforms

    Password Manager based on Flutter for all platforms. Keepass 2.x (kdbx 3.x) compatible. Load/Decrypt kdbx using password and/or key file. Search through stored credentials. Organize passwords using groups. Desktop (Mac, Linux, Windows): Keyboard shortcuts for Search, Copy, Navigation, etc. Desktop & Mobile: Copy & paste support. Store master password in the KeyStore/KeyChain secured with biometric data. (Fingerprint, Face Unlock, etc.)
    Downloads: 2 This Week
    Last Update:
    See Project
  • 16
    FileEncryptor

    FileEncryptor

    File Encryption Program is a Python-based tool

    This File Encryption Program is a Python-based tool designed to securely encrypt and decrypt large files using a password-derived key. It employs robust cryptographic methods, including PBKDF2 with SHA-256 for key derivation and AES-GCM for encryption, making it suitable for processing large files efficiently.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Encrypted Password Database

    Enterprise level password management and automation

    The Encrypted Password Database is an enterprise level application for storing authentication information and automating application password management.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 18
    ExtPassword!

    ExtPassword!

    Recover passwords stored on external drive

    ExtPassword! is tool for Windows that allows you to recover passwords stored on external drive plugged to your computer. ExtPassword! can decrypt and extract multiple types of passwords and essential information, including passwords of common Web browsers, passwords of common email software, dialup/VPN passwords, wireless network keys, Windows network credentials, Windows product key, Windows security questions. This tool might be useful if you have a disk with Windows operating system that cannot boot anymore, but most files on this hard drive are still accessible and you need to extract your passwords from it.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 19

    Java-Enigma

    Enigma Encryption Simulator in Java

    This program is an offline and stand-alone Java application which simulates the Enigma encryption machine that was used during World War II.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 20
    ClashX

    ClashX

    Rule-based proxy utility for macOS with intuitive menu bar interface

    ClashX — Rule-Based Proxy Utility for macOS ClashX is an open-source, rule-based proxy client designed specifically for macOS. Built on the powerful Clash core engine, it provides an intuitive menu bar interface for managing complex proxy configurations with ease. KEY FEATURES: • HTTP/HTTPS and SOCKS5 proxy protocol support • VMess, Shadowsocks, Trojan, VLESS protocol support • Surge-compatible configuration format • GeoIP-based routing rules • TUN mode for system-wide proxying • URL Scheme support for quick config import • Universal binary — native support for both Intel and Apple Silicon Macs • Lightweight menu bar app with minimal resource usage • macOS 10.14 (Mojave) through macOS 15 (Sequoia) compatibility INSTALLATION: Download the latest .dmg from the Files section, or install via Homebrew: brew tap clashx-pro/clashx && brew install --cask clashx RESOURCES: • Official Website: https://clashx.tech • Documentation & Tutorial: https://clashx.tech/tutorial
    Downloads: 30 This Week
    Last Update:
    See Project
  • 21
    MyPGP

    MyPGP

    PGP graphical user interface

    MyPGP provides a graphical user interface for pgp encryption and signing. It is fully compatible with OpenPGP, and GnuPG. It relies on BouncyCastle libraries for the cryptographic primitives. It uses file system folders to store keys, either single or key rings, organized as a nested tree of folders. It can also create lists of keys for bulk operations.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    virgosun teaching support

    virgosun teaching support

    Mentor, code c, c++, java, go, php, swift, .. DevSecOps virtual lab, .

    Menor, code c, c++, java, python, go, php, swift, .., DevSecOps virtual lab, .. This software is provided as a demonstration build. Redistribution of the binary is allowed for academic evaluation only. More previously completed projects will be released incrementally as executable packages are rebuilt for public distribution. www.youtube.com/embed/fzoISpZv5d0?rel=0
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    XORimg

    XORimg

    A secure open source tool for performing XOR operations on images

    XorImg Decryptor (Beta) A lightweight Windows utility designed to decrypt images encrypted via XOR operations, specifically compatible with files processed through xorimg.ru. This tool allows users to reconstruct original images by applying a stored XOR key, ensuring privacy and offline processing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    pgsodium

    pgsodium

    Modern cryptography for PostgreSQL using libsodium

    pgsodium is an encryption library extension for PostgreSQL using the libsodium library for high-level cryptographic algorithms. pgsodium can be used a straight interface to libsodium, but it can also use a powerful feature called Server Key Management where pgsodium loads an external secret key into memory that is never accessible to SQL. This inaccessible root key can then be used to derive sub-keys and keypairs by key id. This id (type bigint) can then be stored instead of the derived key.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 25
    transfer.sh

    transfer.sh

    Easy and fast file sharing from the command-line

    Easy and fast file sharing from the command-line. This code contains the server with everything you need to create your own instance. Transfer.sh currently supports the s3 (Amazon S3), gdrive (Google Drive), storj (Storj) providers, and local file system (local). For easy deployment, we've created a Docker container. For the usage with a AWS S3 Bucket, you just need to specify the following options, provider, aws-access-key, aws-secret-key, bucket, and s3-region. If you specify the...
    Downloads: 3 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next
MongoDB Logo MongoDB