Explore projects
-
Randy Barlow / yubibomb
GNU General Public License v3.0 onlyDon't you love when you accidentally tap your Yubikey when you have your IRC client in focus and you send 987947 into Freenode? Want to be able to have that experience without having to reach all the way over to your laptop's USB port? Now you can!
Updated -
-
zykure / wxsecom
GNU General Public License v2.0 or laterImplementation of the SECOM cipher algorithm as described by Dirk Rijmenants. The cipher is designed as easy-to-use, yet secure, field cipher and based somewhat on the infamous russian VIC cipher.
Updated -
Java based open-source file encryption software project.
Updated -
Juan Ruiz Segura / wci
GNU General Public License v3.0 onlyTexts analysis, C program. Create dictionaries from files or inputs. Useful for languages, cryptography, hack, and forensic. Análisis estadistico de textos para estudio criptográfico temático o enseñanza de idiomas, crea diccionario
Updated -
ethereum2-av / walletd
Apache License 2.0Updated -
Stormblest / valens
MIT LicenseA python3 pip-installable package wrapping a C implementation of NTRUEncrypt
Updated -
Examples shown in my dissertation
Updated -
Yawning Angel / tuplehash
BSD 3-Clause "New" or "Revised" LicenseUpdated -
A secure way to log in using an identification and password without the password being sent on the network or known by the server.
Archived 0Updated -
A collection of threshold cryptosystems using https://dalek.rs 's Rust implementation of https://ristretto.group
Archived 0Updated -
Enigma style algorithm for text encryption.
Updated -
Jens Guballa / SubstitutionBreaker
MIT LicenseThis project provides a Python implementation for breaking classical substitution ciphers.
Updated -
Cristian Souza / Steganography
GNU General Public License v3.0 onlySteganography in images with Python
Archived 0Updated -
bzt / stegano
GNU General Public License v3.0 onlyMultiplatform steganography app with GUI, CLI and WebService, supports WEBP and AES.
Updated -
-
This file contains a few samples taken from a vulnerable encryption function.
Updated -
Twuni / SHA3.js
MIT LicenseA pure JavaScript implementation of the Keccak family of cryptographic hashing algorithms, most notably including Keccak and SHA3.
Updated -
Using the combination of two algorithm to secure a file with format of .PDF , .Txt ,and .Docx
Updated -