Explore projects
-
-
-
Mark Loveless / NPC
GNU General Public License v2.0 or laterNPC - Nearly Perfect Crypto. Extremely fast and the ultimate crypto program since it uses one time pads. However, key management is a complete bitch.
Updated -
Mark Loveless / Ncrypt
GNU General Public License v2.0 or laterUnix-based command line file encryption tool that uses the three AES candidate algorithms - Rijndael, Serpent, and Twifish.
Updated -
elktree / ecc
BSD 3-Clause "New" or "Revised" LicensePackage ecc makes public key elliptic curve cryptography easier to use.
Updated -
This is school project for subject Cryptography, Faculty of Electrical Engineering, University of Banja Luka. Code Protector is used for secure source code exchange. Successfully decrypted code can be runned in application.
Archived 0Updated -
Qt app to play dice against other users.
Updated -
Stormblest / valens
MIT LicenseA python3 pip-installable package wrapping a C implementation of NTRUEncrypt
Updated -
Authenticated FBP is an extension to FBP that ensures a correct file distribution from the intended source to the receivers.
Updated -
Juan Ruiz Segura / wci
GNU General Public License v3.0 onlyTexts analysis, C program. Create dictionaries from files or inputs. Useful for languages, cryptography, hack, and forensic. Análisis estadistico de textos para estudio criptográfico temático o enseñanza de idiomas, crea diccionario
Updated -
José Eduardo / ark6
The UnlicenseCriptografia com uma variante do RC6, com maior número de rounds, maior chave, maior resistência contra ataque chi^2.
Updated -
-
bzt / stegano
GNU General Public License v3.0 onlyMultiplatform steganography app with GUI, CLI and WebService, supports WEBP and AES.
Updated -
niansa / es3crypt-oss
GNU General Public License v3.0 or laterEasy Save 3 save file decryption/encryption librarywith optional CLI and web GUI using layout files
Updated -
-
pqc-cdt / cdt-ssha
Othercdt-ssha is a utility that detects and analyzes SSH keys within a system, assessing their necessity for replacement with more secure counterparts based on Post-Quantum Cryptography (PQC).
Updated -
pqc-cdt / cdt-nwa
Othercdt-nwa is a network traffic analysis tool for identifying cipher suites, that require migration to Post-Quantum Cryptography (PQC)
Updated -
pqc-cdt / cdt-pma
Othercdt-pma, part of the crypto-detection-tool project, scans installed packages via apt, identifying insecure ones and reporting potential dependencies affected for comprehensive vulnerability assessment
Updated