Search Results for "git:/git.code.sf.net/p/docfetcher/code" - Page 3

Showing 158 open source projects for "git:/git.code.sf.net/p/docfetcher/code"

View related business solutions
  • Get full visibility and control over your tasks and projects with Wrike. Icon
    Get full visibility and control over your tasks and projects with Wrike.

    A cloud-based collaboration, work management, and project management software

    Wrike offers world-class features that empower cross-functional, distributed, or growing teams take their projects from the initial request stage all the way to tracking work progress and reporting results.
    Learn More
  • The full-stack observability platform that protects your dataLayer, tags and conversion data Icon
    The full-stack observability platform that protects your dataLayer, tags and conversion data

    Stop losing revenue to bad data today. and protect your marketing data with Code-Cube.io.

    Code-Cube.io detects issues instantly, alerts you in real time and helps you resolve them fast. No manual QA. No unreliable data. Just data you can trust and act on.
    Learn More
  • 1
    Mobile-ID USAT applet

    Mobile-ID USAT applet

    The Remarc Mobile-ID USAT applet

    The Remarc Mobile-ID USAT applet this is a JavaCard applet with USIM Application Toolkit menu support. Basic functions of the Remarc Mobile-ID SAT applet: • Authentication function; • Signing function; • Changing PIN1/PIN2; • Changing PUK; • Unblock PIN1/PIN2; • View information - in a USAT menu is present a menu item with information of PIN usage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    JBrute

    JBrute

    Open Source Security tool to audit hashed passwords.

    ...Supported algorithms: MD5 MD4 SHA-256 SHA-512 MD5CRYPT SHA1 ORACLE-10G ORACLE-11G NTLM LM MSSQL-2000 MSSQL-2005 MSSQL-2012 MYSQL-322 MYSQL-411 POSTGRESQL SYBASE-ASE1502 INFORMIX-1170 To see syntax examples: https://sourceforge.net/p/jbrute/wiki/Examples To see last news: https://sourceforge.net/p/jbrute/blog FAQ: https://sourceforge.net/p/jbrute/wiki/FAQ/ General questions: jbrute-users@lists.sourceforge.net (you can suscribe to mailing list at https://lists.sourceforge.net/lists/listinfo/jbrute-users) Author: Gonzalo L. Camino Icon Art: Ivan Zubillaga Made in: Argentina :)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Predator encryption

    Small encryption

    I wrote this in 1997. Right now I have the basic code up. I have it in c++ too but I have yet to upload it. This program is good for small files but does not handle large files very well. It creates a binary key to increase the entropy of your file. It can use the key to reverse the entropy of your file. So, it encrypts and de-crypts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Perfect Random Numbers Project

    Creates binary random number file with perfect frequency/distribution.

    This project creates a binary file with almost perfect frequency and distribution. The binary file can then be used for cryptography.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Iris Powered By Generali - Iris puts your customer in control of their identity. Icon
    Iris Powered By Generali - Iris puts your customer in control of their identity.

    Increase customer and employee retention by offering Onwatch identity protection today.

    Iris Identity Protection API sends identity monitoring and alerts data into your existing digital environment – an ideal solution for businesses that are looking to offer their customers identity protection services without having to build a new product or app from scratch.
    Learn More
  • 5
    C.P.D.S Criptografia por Desloc. Simples
    Programa que le qualquer arquivo de texto(exceto arquivos do pacote Office) e com base em uma chave de QUINZE caracteres codifica o arquivo. Programa leve, rápido e potente.Obs: O arquivo a ser codificado deve estar dentro da mesma pasta onde o programa está salvo. Program that encrypts a text file,(except for Microsoft Office files) based on a 15 character key.PS, the file that will be coded must be salved in the same place where the program is salved at. English version coming soon.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    truecrypt-wxGTK3

    Truecrypt Ported to wxGTK3

    This is the final release of truecrypt (7.1a) ported to use wxGTK3 instead of 2.8. None of the underlying code has changed, instead the compile errors due to modern distros using and updated version of wxGTK have been resolved (for now).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Crypt

    Crypt

    Crypt encryption and decryption is based on ASCII Table Shift.

    Crypt is the developed based on the ASCII Table shift and it can customized based on the user requirements, right from the shifting order and the level of encryption or decryption. It can be integrated to any of the programming language with the custom build of the source code. It can secure from text file to binary code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Passencryption 2016 beta

    Passencryption 2016 beta

    PassEncryption is designed to encrypt files and generate passwords.

    PassEncryption is a software written in python designed to encrypt and decrypt files as well as generating passwords. PassEncryption uses RSA encryption method to generate passwords for each accounts with a personal encryption key. Windows 7 and more only. IMPORTANT: Current release doesn't work with 32 bits architectures, will be fixed in next update
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Endico - Text Encrypt

    Endico - Text Encrypt

    Fastest way to make secure text.

    ...How to use : Step one - Open Endico 14 Step two - Decide what to do (Text Encode/Text Decode) Step three - If You Selected Text Encode -> Then Type/Copy/Open .txt file to convert. Step four - Copy the converted text into clipboard to chat,mail,print process etc. Step five - If you want to Decode the code the again follow step two. Step six - Congratulations! you done it . ------------------------------------------------------------------------------------------------- Advantages and Applications 1. Fast and East TEXT encoding. 2. Fast and Easy Code decoding. 3. Easy User Interface & 24x7 Support. 4. Low system requirements. 6. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Run applications fast and securely in a fully managed environment Icon
    Run applications fast and securely in a fully managed environment

    Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.

    Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
    Try for free
  • 10
    µVault

    µVault

    Minimalistic File Protector

    µVault is a portable file protector and browser capable of creating a secure and hidden file system for your personal files. Visit the wiki for instructions and update information. https://sourceforge.net/p/microvault/wiki/Index/ µVault version 2.0 released! µVault 2.0 is a beta-stage release finally ready for public testing using a completely new filesystem structure that greatly increases the import/export speed of the software and completely removes the delay that occurred when opening or closing the program. A few minor changes were made to the UI as well in an attempt to make it a bit more user-friendly. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    zcahttpproxy

    TV proxy with cas descrambler.

    Multicast UDP to HTTP proxy with Interzet CAS Descrambler. 10.10.2019 New epg map file: http://github.com/ViPetroFF/zcahttpproxy/blob/master/TVGMapNames.ini EPG resource: http://www.teleguide.info/ To update epg map run: "setupM3U.cmd". Obsolete support page: http://code.google.com/p/zcahttpproxy/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    GDLOG

    Implementation of the GNFS for discrete logarithm problem in GF(p)

    GDLOG is an implementation of the General Number Field Sieve algorithm for discrete logarithm problem in GF(p).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Ampare PHP Encoder

    Ampare PHP Encoder

    Protect and Obfuscate Encode PHP File From reading ( Opensource )

    ...However , Advance and Intermediate able to find way to decode it. FAQ My script doesn't run or terminate Reference : http://php.net/manual/en/function.eval.php When Eval() function run an error code it will automatically terminate so the script doesn't run. Use it only 100% clean code. Please use PHP-Protect Script for better security too . by php protect it first and encode with our software so it second layer protection http://www.phpprotect.info/ I take my free time doing support. So please don't angry or rush me. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    sha3sum and then some

    sha3sum - A demonstration of the Keccak permutation.

    Hash mode interface to the Keccak code package. This program illustrates the use of the Keccak permutation. Usage is much more than a hash function. The NIST compatible settings are subject to change when they publish FIPS PUB 180-5. I wrote this program when evaluating the permutation and developing tree hashing for the Intel(R) MIC architecture.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 16
    BinaryCrypt

    BinaryCrypt

    Binary Conversion Calculator

    ...You can convert only decimal (as of right now) to any base up to base 64. You can also save your converted text to a file or open a converted text file to decrypt the message, and perform basic arithmetic in binary. The git repo for the C# code is located at: https://github.com/m1r4g3/BinaryCrypt-.Net
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    RSA Converter
    A multi-platform tool to convert RSA private keys between SFM format (modulus, public exponent, private exponent) and CRT format, in both ways.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    BEDBUG CSPRNG & Stream Cipher

    BEDBUG CSPRNG & Stream Cipher

    A family of FLEA-inspired CSPRNGs and Stream Ciphers

    ...It exhibits uniform distribution, mixes rapidly (with worst-case avalanche better than 16-bits), has no detected bias, and comes in three variants: BEDBUG128, with an internal state array of 128+3 32-bit words; BEDBUG256, with an internal state of 256+3 words; and BEDBUG512 with a 512+3-word state. The former permit seeding with a key of up to 4096 or 8192 bits, the latter with a 16384-bit key. The BEDBUG generator itself is a mere 5 lines of code: Three rotations; two pseudo-random lookups. The default BEDBUG configuration alternates the rotation constants unpredictably. These four sets of three values differ between BEDBUG128, BEDBUG256 and BEDBUG512 and were selected, tuned and tested in each case for optimal avalanche, which is never less than 16.5 bits. BEDBUG has passed stringent industry-standard tests for randomness, including NIST and DIEHARD.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    MOTE CSPRNG & Stream Cipher

    MOTE CSPRNG & Stream Cipher

    A family of small-state CSPRNGs and Stream Ciphers

    ...MOTE exhibits uniform distribution, mixes extremely rapidly, has no detected bias, and comes in three variants: MOTE8, with an internal state array of 8+4 32-bit words; MOTE16, with an internal state of 16+4 words; and MOTE32 with a 32+4-word state. The former permit seeding with a key of up to 256 or 512 bits, the latter with a 1024-bit key. Reduced to essentials, MOTE is only 5 lines of code: Ten arithmetic and bitwise operations in all. It's called MOTE because a PRNG can't be made much smaller (or faster) without introducing bias or severely reducing avalanche. MOTE alternates its shift and rotation constants unpredictably, and has passed the most stringent industry-standard tests for randomness and security, including NIST & DIEHARD.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    SES Super-Encypherment Scrambler

    SES Super-Encypherment Scrambler

    SES brings back the uncrackable onetime pad, with a digital twist.

    SES brings back the uncrackable onetime pad, with a digital twist. It is well known that a random key of message-length is the only provably unbreakable cipher. SES uses cryptographic strength pseudo-random keys of message-length for its many encipherments, in addition to offering true one-time pad capability for the intrepid. SES is built on ISAAC, Bob Jenkins' unbroken CSPRNG, a fast and simple stream cipher placed in the Public Domain in 1996. SES now gives you the ability to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    SecureQEMU is an open source emulation-based software protection scheme providing protection from reverse code engineering (RCE) and software exploitation using encrypted code execution and page-granularity code signing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Simple console application generating passwords in quite easy and simple way. Application allows user to copy generated passwords to clipboard.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    ISC - The ISAAC Stream Cipher

    ISC - The ISAAC Stream Cipher

    ISC lets you encrypt & decrypt text and files of any type up to 4GB

    ISAAC is a cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It was developed by Bob Jenkins from 1993-1996 and placed in the Public Domain. ISAAC is fast - especially when optimised - and portable to most architectures in nearly all programming and scripting languages. After more than 20 years of existence ISAAC has not been broken, and the little program you have here allows you to use it to encrypt and decrypt text of arbitrary length, files of any...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    XOR encrypt v2.0

    XOR encrypt v2.0

    Encrypt Your Text documents with XOR encryption

    This software provides an easy graphical way to encrypt your text documents from source code , text files ,scripts even jpeg files .It is a enhanced version of my earlier project https://sourceforge.net/p/xorencrypt which used win32 GUI . This is a demonstration of working of XOR encryption which was used by Germans in World War II (http://en.wikipedia.org/wiki/Lorenz_cipher) . Besides from XOR'ing the message with password after every encryption the key changes pseudorandomly. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25

    CryptoX

    AES Encryption Program

    v2.0.0 (Latest) ---CHANGE LOG--- v1.0.0 - Original Release v1.0.1 - Source Code Cleanup v2.0.0 - Now Features File Encryption Protect your privacy! Encrypt your messages and files with a cryptographic strength of up to 256 bits before sending them to others!
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB