Open Source ChromeOS Cryptography Software - Page 3

Cryptography Software for ChromeOS

  • The Leading All-In-One Vacation Rental Software for Property Managers Icon
    The Leading All-In-One Vacation Rental Software for Property Managers

    Hostaway helps you grow your property management business by automating and streamlining every aspect of your business

    The dashboard and mobile app allows users to manage their marketing, sales, accounting, reporting, payment and communication needs all in one place. As premium partners of channels such as VRBO, Booking.com, Airbnb, Homeaway and Expedia, with the ability to manage advanced setups, no other platform gives you the type of control and peace of mind that a Hostaway user has. The software is designed with teams in mind - it's easy to train staff and keep them happy while improving business at the same time! Hostaway also provides a booking engine, wordpress website and both marketing and sales tools for managing your valuable direct bookings.
    Learn More
  • Peer to Peer Recognition Brings Teams Together Icon
    Peer to Peer Recognition Brings Teams Together

    The modern employee engagement platform for the modern workforce

    Create a positive and energetic workplace environment with Motivosity, an innovative employee recognition and engagement platform. With Motivosity, employees can give each other small monetary bonuses for doing great things, promoting trust, collaboration, and appreciation in the workplace. The software solution comes with features such as an open-currency open-reward system, insights and analytics, dynamic organization chart, award programs, milestones, and more.
    Learn More
  • 1
    This is a project that simulates the German Military Enigma machine during WWII.. It is a project for beginers to learn to program and to meet people. If anyone is interested in helping, please email me @ dustin@rockhill.org
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    GMR Digital Signature System

    GMR Digital Signature System

    GMR digital signature system

    Private keys are insecure in cloud server infrastructure. Chrome: right click - translate into English! https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2018/Spectre-NG_18052018.html System that creates key pairs and digital signatures and is based on the presumed difficulty of prime factorization. Please install on a virtual machine with Linux! Windows is not supported! German: System, das Schlüsselpaare und digitale Signaturen erstellt, und auf der vermuteten Schwierigkeit der Primfaktorzerlegung fußt. Bitte in einer virtuellen Maschine mit Linux installieren! Windows wird nicht unterstützt! Spende einen Cappuccino: Bitcoin: 1HqrdnfQgi9B4LW8UEvLAwh7X5gXPCoQ5B Litecoin: LeCx44jGjHxiVZ8f6MyumLTCxPcp3ePKJT Paypal: paypal.me/GerritLeder
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    Hashish is a file and string hashing utility that computes cryptograhpic hashes. It is cross platform and includes a gui front end.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    platform independent solution to encrypt files on a portable Device. Files will be encrypted with TripleDES and hold in an XML-File. No local Installation needed.
    Downloads: 2 This Week
    Last Update:
    See Project
  • White Labeled Fintech Software Solutions | Centrex Icon
    White Labeled Fintech Software Solutions | Centrex

    Centrex is a full suite of white labeled fintech solutions built and designed for brokers, lenders, banks, investors, fintechs

    The Centrex products include: CRM, loan origination, loan and advance servicing software, syndication management, white labeled mobile app, money manager, underwriting, Esign, and website smart app builder. The Centrex services include: fintech software consulting, admin retainer services, and managed data cloud.
    Learn More
  • 5
    PyGestPayCrypt is the Python implementation of GestPayCrypt and GestPayCryptHS classes for italian Banca Sella GestPay online credit card payment system.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    An anonymizing peer-to-peer file storage network, similar to Freenet and Gnutella - only better, of course.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    Tristero is a framework for creating distributed peer-to-peer file sharing applications. It uses standard technologies for each component, reducing the work of implementing a particular network architecture to the novel aspects of that system and eliminat
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    A very powerful and secure encryption supporting multilevel algorithm hierarchy encryption(bit level),supports infinite length keys and equation creation utility(secondary key) for the utmost security.Support for multiple algorithms.All OS support(ja
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    HashTool

    HashTool

    Easily calculate hash values.

    HashTool calculates the most common hash and hmac values of files and strings by using the "Bouncy Castle Java cryptography API".
    Downloads: 1 This Week
    Last Update:
    See Project
  • Safety Compliance Made Easy Icon
    Safety Compliance Made Easy

    SiteDocs is a digital safety management software used to support work site compliance.

    Ideally designed for business that deals with Construction, Oil & Gas, Mining, Manufacturing, Mechanical, Electrical, Plumbing, Heating, and Excavating, SiteDocs is a perfect solution for any size business looking to modernize the way Safety Compliance is organized.
    Learn More
  • 10
    Hide & Reveal
    Composed of a Java steganographic library and GUI to use steganography. Primarily intended for research communities on security and steganography to implement new dissimulation and steganalysis algorithms. More information at www.hidereveal.org
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Open Legacy Storage Document: Generic Document Archiving on Disk and Network(using MINA) Framework in Java for huge number of docs(up to 2^192 documents), efficient(Java NIO), crypto, net transfert, web retrieve, J2EE and eMail archiving compatible.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    Scramble!
    “Scramble your social network data!” - With Scramble you can selective enforce you access control preferences for your content on social networks like Facebook or Twitter ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    TinyCrypt is a simple secure program for encrypting files. The core encryption code is only 76 lines of C code, based on the well known ARC4-D(768) algorithm.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    Password Cracker
    Crack the encrypted passwords (MD5,SHA, etc....)
    Downloads: 3 This Week
    Last Update:
    See Project
  • 15
    Ampare Hide Links

    Ampare Hide Links

    Ampare Hide Link is a script which auto hide real link on your website

    Ampare Hide Link is a script which auto hide link on your website to prevent user from knowing the final destination. Ampare Hide Link is using Defat Technology and other to protect your link on iframe and other tags. If you want to share some content but want to keep the url private. You can use Ampare Hide Link . It is free
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    BEDBUG CSPRNG & Stream Cipher

    BEDBUG CSPRNG & Stream Cipher

    A family of FLEA-inspired CSPRNGs and Stream Ciphers

    BEDBUG is a small, fast, cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It exhibits uniform distribution, mixes rapidly (with worst-case avalanche better than 16-bits), has no detected bias, and comes in three variants: BEDBUG128, with an internal state array of 128+3 32-bit words; BEDBUG256, with an internal state of 256+3 words; and BEDBUG512 with a 512+3-word state. The former permit seeding with a key of up to 4096 or 8192 bits, the latter with a 16384-bit key. The BEDBUG generator itself is a mere 5 lines of code: Three rotations; two pseudo-random lookups. The default BEDBUG configuration alternates the rotation constants unpredictably. These four sets of three values differ between BEDBUG128, BEDBUG256 and BEDBUG512 and were selected, tuned and tested in each case for optimal avalanche, which is never less than 16.5 bits. BEDBUG has passed stringent industry-standard tests for randomness, including NIST and DIEHARD.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    Bork is a very small, cross-platform file encryption utility. It is written in Java and designed to be included along with the files it encrypts for long-term storage (eg on CD-R). Its minimal external dependencies make it fairly futureproof.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18

    CheckMate

    Utility to generate and verify checksums/hashes

    CheckMate is a program designed to generate all kinds of checksums and/or hashes. Checksums can simply be displayed or saved and used to verify the integrity of a file later on.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    e3 = jabber + java + plugins + svg ||| web start link: http://complat.sourceforge.net/jnlp
    Leader badge
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    CryptoDock

    CryptoDock

    CryptoDock is a tool that hosts various crypto. algorithms.

    CryptoDock is free multi-platform application written in Java that hosts various hash and modern cryptographic algorithms you can use to protect your sensitive data on your computer. Available cryptographic algorithms: 1. NLSE-1 2. One Time Pad 3. AES Available hashing algorithms: 1. MD5 2. SHA-1 3. SHA-256 4. SHA-512 IMPORTANT: In order to run CryptoDock you need to have Java installed on your computer. Java is free and can be downloaded from - http://www.java.com/
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    DKIM for JavaMail is a small JAR that can be easily implemented in existing Java projects using JavaMail for sending DKIM signed emails.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    ESP32 CYD ESL with Firebase

    ESP32 CYD ESL with Firebase

    ESP32 CYD version of the Electronic Shelf Label.

    A version of the Electronic Shelf Label that utilizes the ESP32 CYD. GitHub repository: https://github.com/Northstrix/ESP32-Cheap-Yellow-Display-Electronic-Shelf-Label-with-Google-Firebase The tutorial is available at https://www.instructables.com/ESP32-CYD-ESL/ WebFlash: https://northstrix.github.io/ESP32-Cheap-Yellow-Display-Electronic-Shelf-Label-with-Google-Firebase/flash.html Format Flash area designated for SPIFFS with ESP32 Filesystem Uploader (https://github.com/me-no-dev/arduino-esp32fs-plugin/releases/) after using the WebFlash.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    Encrypti is a multi platform, easy to use encrypting tool for keeping your files secure. This application offers portability of encrypted files between various platforms. Secure your files with Encrypti!
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    A modern secure, robust, multithreaded, exception aware, internationalisable, portable GUI toolkit library designed for mission-critical work in C++ and Python forked from the FOX library. Replicates the Qt API in many places.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    GPG-Crypter
    GPG-Crypter is a graphical front-end to GnuPG(GPG) using the GTK3 toolkit and GPGME library. It has been developed to provide an easy access to GPG encryption and decryption. It supports encryption and decryption of text entered into the program's input fields. It also supports file encryption and decryption.
    Downloads: 1 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB