Cloud-Based Software Licensing - Zentitle by Nalpeiron
The #1 Software Licensing Solution. Release new Software License Models fast with no engineering. Increase software sales and drive up revenues.
1000’s software companies have used Zentitle to launch new software products fast and control their entitlements easily - many going from startup to IPO on our platform. Our software monetization infrastructure allows you to easily build or
Learn More
Award-winning proxy networks, AI-powered web scrapers, and business-ready datasets for download.
How the world collects public web data
Bright Data is a leading data collection platform, enabling businesses to collect crucial structured and unstructured data from millions of websites through our proprietary technology. Our proxy networks give you access to sophisticated target sites using precise geo-targeting. You can also use our tools to unblock tough target sites, accomplish SERP-specific data collection tasks, manage and optimize your proxy performance as well as automating all of your data collection needs.
Stegeek is very simple tool, that takes several files,encrypt, and mix them into one file. Also add some redundancy. The result is, that we have one archive and N keys. It should not be possible to guess N, if you have archive and up to N-1 keys.
Waste.net is a .NET-driven application geared towards providing a secure online encrypted file-sharing service. This is a purely managed .NET 2.0 port of the original Waste client/server.
Powerful 512bit pseudo random encryption, optimized for the x86-64 architecture. Coded in x86-64 assembly language, this has the potential to be one of the most powerful and fastest file encryption engines to date.
Quant offers a wide range of solutions for retail. Within one integrated software system, it allows you to efficiently combine the management of retail space, shelf labels and marketing materials with task management, reporting and automatic replenishment.
MpNT is a multi-precision number theory library that provides a base for building cryptographic applications. It may however be used in any domain where efficient integer, modular, and floating-point computations involving large numbers are required.
MUSASH provides a utility to digest text, file and a byte char. It also able to compare two files, compare file, text and char to a hash. It also allows user to search for a string that evaluates to a hash given. Supported algo: MD5, SHA1 and SHA2 family
secureDATA is a simple and easy to use encrypted personal information manager. It can store both textual information (passwords, usernames, electronic receipts, etc), and (as of v1.6) files. It uses AES-128 encryption via the Python Cryptography Toolkit.
B-Trust eDoc is a program built on top of LibDigiDoc a free implementation of the OpenXAdES standard for signing/encrypting files using smartcard tokens. It also contains Openssl and PKCS11 wrapper classes in C++ which might be useful to developers.
Queue Management System for Busy Service Providers | WaitWell
The queue management system that perfectly adapts to your workflows
The queue management system that perfectly adapts to your workflows. Improve operational efficiency in weeks with the most configurable enterprise queue system.
A simple, secure and free tool for encryption and signature for Microsoft Windows and Unix. Part of the IDEALX "OpenTrust" suite (IDX-PKI, IMC, IDX-smbldap-tools...), it provides confidentiality and security through X.509-PKCS certificates. Languages:
The Password Auditing Project will be a compilation of other, previously released password auditing programs, in such a fashion as to reap the best benefits of each portion. Pulling innovations from John the Ripper, Lepton, Rainbow Tables, and more.
An implementation of Shoup's "Practical Threshold Signature" in Java. This is an (n,k)-threshold signature system: at least k parties out of n must independently sign a piece of data to produce a valid group signature.
Package for coding and decoding files with Matheos algorithm from commandline or console in Linux/Unix Environment. Based on Keys stored in files or as hardware locks (on devices). Fast and strong coding. Fast encoding.ONLY BINARY PACKAGES FOR NOW!
A online tool to store passwords, transaction numbers and whatever you want Encrypted by 256Bit AES encryption Tan-Force uses DOJO and xajax and needs mcrypt-module for encryption Included: Dojo in Version 0.4 xajax 0.2.4
The OpenSSL shell/batch script collection offers insight in how to setup a hierarchical PKI structure consisting of a Root CA, several sub CA's and end entity digital certificates. The scripts are available for unix and windows.
The Free Digital Money project aims to promote ideas and stimulate further innovation in the field of digital money. It provides a e-money implementation that can be used by anyone to try out ideas, build sample applications, or for further development.
The Eclipse XML-Security Plug-In allows you to experiment with the W3C recommendations on digital signatures and encryption and to learn all about their background. Arbitrary XML documents can be canonicalized, signed, verified and en- or decrypted.
EverCrack cryptanalysis engine. The goal is cryptanalysis of any class of cipher. The focus now is the kernel - cryptanalysis of unilateral monalpha substitution ciphers extremely quickly, and later, cryptanalysis of complex ciphers for the kernel.