[go: up one dir, main page]

Showing 6 open source projects for "xor key decrypt"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Assembled is the only unified platform for staffing and managing your human and AI support team. Icon
    Assembled is the only unified platform for staffing and managing your human and AI support team.

    AI for world-class support operations

    Assembled is the only platform that unifies AI agents and intelligent workforce management to power fast and flexible support operations. Built for scale, we help teams automate over 50% of customer interactions, forecast with 90%+ accuracy, and optimize staffing across in-house and BPO teams. Orchestrate every chat, email, or call, balancing workloads between human and AI agents in real time — without sacrificing quality or control. Trusted by Stripe, Canva, and Robinhood, Assembled transforms support from a cost center into a strategic advantage. Our Workforce and Vendor Management tools connect forecasting, scheduling, and performance for smarter staffing decisions. AI Agents automate conversations across channels with your workflows and brand voice. AI Copilot empowers agents with real-time guidance, suggested replies, and one-click actions for faster, higher-quality resolutions.
    Learn More
  • 1
    Abdal 2-Key Triple DES Builder

    Abdal 2-Key Triple DES Builder

    encrypt / decrypt all your texts with Two-Key Triple DES

    If you need more security to send your messages, we introduce the new tool of Abdal security team called Abdal 2-Key Triple DES Builder. This tool can actually encrypt all your texts that are to be sent as a message between you and any person. Two-Key Triple DES is used to encrypt these messages. This algorithm performs 3 cryptographic processes on each block of information to reduce the penetration rate. The Abdal 2-Key Triple DES Builder tool has four modes for encrypting your data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    SecureFileShare

    SecureFileShare

    Simple Tool for en-/decrypt files.

    You can easily en-/decrypt files with a size limit of 100MB. This tool have also a contact list implemented, so you can store the public keys of your friends.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Khoorio

    Khoorio

    FTP client to encrypt/decrypt and upload/download files

    Khoorio is a FTP client that allows you to safely encrypt your files with the AES Rijndael cipher before uploading them to a FTP server. The key used to encrypt the files is derived by a key derivation function (HMAC-SHA1) as follows: encryptionKey = HMAC-SHA1(hash_plaintext_file,user chosen master password). With this key the user allows someone to decrypt a specific file, without the need to share his master password to that person. As it consists of a personalized key, the receiving party will only be allowed to decrypt those specific files for which he has received the key, unless he possesses the master password that was used to encrypt the files. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    EncryExchange

    Encrypted Message Exchange

    ----- New Version ----- v1.1 - Added new features, tidied and condensed the UI, tidied up the code and added better error handling and messages. ----- This Server-Client application allows the exchange of encrypted messages using the public key as the address of the mailbox. This system is designed to be used to exchange messages through networks and servers that can not be trusted. The client application is a C#.net application that is used as a mail client to send/receive and encrypt/decrypt messages. The server consists of a few ASP.net pages that handle the message exchange. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • LinkSquares: All-in-One Contract Management Platform Icon
    LinkSquares: All-in-One Contract Management Platform

    #1 Customer Rated CLM Any Contract. Every Department. One Platform.

    LinkSquares is the leading Contract Lifecycle Management (CLM) software designed to help legal, procurement, and business operations teams master the entire contract lifecycle, from creation to execution and renewal. The platform transforms how companies manage agreements by centralizing data, automating routine work, and providing actionable insights powered by AI. This single, connected source of truth helps teams eliminate manual processes, streamline workflows, boost visibility, and ensure compliance across thousands of contracts, ultimately reducing risk and administrative burden.
    Learn More
  • 5

    A Nibble of a Byte

    Bit manipulation and unique compression of limited data sets

    This project uses bit manipulation to do limited types of compression and single byte key character (XOR) manipulation. Both VB.Net and C# versions are available. There are two files associated either the VB.Net version (ANibbleOfAByte) or the C# version (CSharpNibbleOfAByte) that can be downloaded. One is a .exe that demonstrates various kinds of vb.net bit manipulation. (Both the C# and VB.Net exe's are available.)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    OnAccessFileEncryption

    OnAccessFileEncryption

    EaseFilter OnAcess File Encryption SDK

    Transparent file encryption performs real-time I/O encryption and decryption of the files in any block data with 16 bytes. The encryption uses a 256 bits symmetric key to encrypt or decrypt the data with AES encryption algorithm. Auto file encryption protects data "at rest", meaning the transparent data and files encryption. It provides the ability to comply with policies which can be applied by users, processes and file type. This allows only authorized users and processes to access the encrypted files, unauthorized users and processes can’t access the encrypted files. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next