[go: up one dir, main page]

Showing 186 open source projects for "rsa"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Runn is a modern resource and capacity planning platform that gets remote teams on the same page. Icon
    Runn is a modern resource and capacity planning platform that gets remote teams on the same page.

    Runn is best suited for project managers, operations leads, resourcing managers and other people responsible for project delivery.

    Runn has a modern and easy-to-use interface that provides your team with a shared view of all the people and projects in your organization. Plan new work alongside existing projects and instantly see how changes to your plans and resourcing affect your company’s bottom line. Runn is intuitive to use and lets you quickly schedule work using simple drag and drop functionality. Runn also allows you to collaborate with your co-workers in real-time, seeing updates live without having to refresh your browser. Runn combines resource and capacity planning with integrated actual tracking and powerful forecasting to deliver meaningful insights and a full picture of your organization.
    Sign Up - 100% free until July!
  • 1
    Java JWT

    Java JWT

    Java implementation of JSON Web Token (JWT)

    ...The Algorithm defines how a token is signed and verified. It can be instantiated with the raw value of the secret in the case of HMAC algorithms, or the key pairs or KeyProvider in the case of RSA and ECDSA algorithms. Once created, the instance is reusable for token signing and verification operations. When using RSA or ECDSA algorithms and you just need to sign JWTs you can avoid specifying a Public Key by passing a null value. The same can be done with the Private Key when you just need to verify JWTs.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 2
    noVNC

    noVNC

    VNC client web application

    noVNC is a VNC client JavaScript library as well as an application built on top of that library. noVNC runs well in any modern browser, including mobile browsers (iOS and Android).
    Downloads: 24 This Week
    Last Update:
    See Project
  • 3
    Certbot

    Certbot

    Get free HTTPS certificates forever from Let's Encrypt

    Certbot is a fully-featured, easy-to-use, extensible client for the Let's Encrypt CA. It fetches a digital certificate from Let’s Encrypt, an open certificate authority launched by the EFF, Mozilla, and others. This certificate then lets browsers verify the identity of web servers and ensures secure communication over the Web. Obtaining and maintaining a certificate is usually such a hassle, but with Certbot and Let’s Encrypt it becomes automated and hassle-free. With just a few simple...
    Downloads: 140 This Week
    Last Update:
    See Project
  • 4
    Cloudflare Worker JWT

    Cloudflare Worker JWT

    Lightweight JWT implementation with no dependencies for Cloudflare

    cloudflare-worker-jwt is a JavaScript library for handling JSON Web Tokens (JWTs) inside Cloudflare Workers. It enables authentication, token validation, and signature verification for serverless applications.
    Downloads: 5 This Week
    Last Update:
    See Project
  • Combine Jira and SCM data to improve team performance Icon
    Combine Jira and SCM data to improve team performance

    For engineering leaders who need to foster alignment with the business and streamline their operations for better efficiency and higher productivity

    Jellyfish is the leading Engineering Management Platform, providing complete visibility into engineering organizations, the work they do, and how they operate. By analyzing engineering signals from Git and Jira, qualitative team feedback, and contextual business data from roadmapping, incident response, HR, calendar, and collaboration tools, Jellyfish enables engineering leaders to align engineering decisions with business initiatives and deliver the right software, efficiently, on time. With Jellyfish, engineering leaders can focus their teams on what matters most to the business, driving strategic decisions and delivering results.
    Learn More
  • 5
    phpseclib

    phpseclib

    PHP secure communications library

    ...MIT-licensed pure-PHP implementations of SSH-2, SFTP, X.509, an arbitrary-precision integer arithmetic library, Ed25519 / Ed449 / Curve25519 / Curve449, ECDSA / ECDH (with support for 66 curves), RSA (PKCS#1 v2.2 compliant), DSA / DH, DES / 3DES / RC4 / Rijndael / AES / Blowfish / Twofish / Salsa20 / ChaCha20, GCM / Poly1305. The only requirement that phpseclib 3.0 has is that you must be using PHP 5.6+. Using phpseclib2_compat will actually bring a few enhancements to your dependency.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6
    ruroco

    ruroco

    A tool that lets you execute commands on a server

    Ruroco is a tool that lets you execute commands on a server by sending UDP packets. The commands are configured on the server side, so the client does not define what is going to be executed, it only picks from existing commands.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Themis

    Themis

    Easy to use cryptographic framework for data protection

    ...Use Secure Message to send encrypted and signed data from one user to another, from client to server, to prevent MITM attacks and avoid single secret leakage. Based on ECC + ECDSA / RSA + PSS + PKCS#7.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 8
    pv-migrate

    pv-migrate

    CLI tool to easily migrate Kubernetes persistent volumes

    pv-migrate is a CLI tool/kubectl plugin to easily migrate the contents of one Kubernetes PersistentVolumeClaim to another. On Kubernetes, if you need to rename a resource (like a Deployment) or to move it to a different namespace, you can simply create a copy of its manifest with the new namespace and/or name and apply it. However, it is not as simple with PersistentVolumeClaim resources: They are not only metadata, but they also store data in the underlying storage backend. In these cases,...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 9
    Easy to use, easy to install, actively maintained and actively supported, phpseclib is the best way to utilize SSH, SFTP and RSA in PHP.
    Downloads: 29 This Week
    Last Update:
    See Project
  • Enterprise AI Agents for Every Customer Moment Icon
    Enterprise AI Agents for Every Customer Moment

    For enterprise companies looking for AI Agents

    From chat to voice to SMS, every conversation gets a smart, personalized response powered by your policies, tone, and data.
    Learn More
  • 10
    Cyphernight-MAX SEC
    Dexmond.com is the official website of Dexmond Technologies, dedicated to CypherNight: MAX-SEC V3, a professional-grade, multi-platform data encryption suite designed for securing, digitally signing, and managing sensitive files with uncompromising security. The core tool combines military-strength cryptography — AES-256-GCM for symmetric encryption, RSA-4096 (with OAEP padding) for asymmetric operations, Ed25519 digital signatures, and Argon2id for secure passphrase-based key derivation — to protect data against brute-force, offline, and alteration attacks. Unique features include per-chunk authentication, single-use uniqueness markers, encrypted key vaults, forced external archive loading for safe inspection of ZIP/RAR/ISO files, universal forensic archive extraction, and steganography (LSB hiding of files inside images). ...
    Downloads: 9,398 This Week
    Last Update:
    See Project
  • 11
    MultiPlayer

    MultiPlayer

    Stream Video/Audio files via SSH

    ...It comes with an intuitive interface and basic playback functions, which makes it suitable for any type of user, beginner or advanced. "Readme": - To use OpenSSH RSA-Key Encryption you can edit manually SSH-Server-Side configuration file 'for example: /etc/ssh/sshd_config' and add Line: 'PubkeyAcceptedAlgorithms +ssh-rsa' Also you can use for example 'Puttygen' to convert RSA-KeyFile to OpenSSH KeyFile Format - This Software runs with Java Runtime Environment 8 (x86). It is recommended to Install Java 8 JRE and set Environment Variable for binary directory...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 12
    Autonomous Patrimonial Agent

    Autonomous Patrimonial Agent

    Fully auditable AI agent for technical, symbolic, and financial impact

    ...It operates within a modular Linux environment and has passed a complete audit validated by Gemini 3 Pro. Key features include: 23 functional modules, PostgreSQL sandbox, GPG key (RSA 4096), structured memory, bilingual documentation, and monetization modules. SPANISH: REMI es un agente patrimonial autónomo, totalmente auditable, diseñado para impacto técnico, simbólico y financiero. Opera en un entorno modular Linux y ha pasado una auditoría completa validada con Gemini 3 Pro. Características clave: 23 módulos funcionales, sandbox PostgreSQL, clave GPG (RSA 4096), memoria estructurada, documentación bilingüe y módulos de monetización.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Multron File Guardian

    Multron File Guardian

    A File Encrypter/Decrypter With Many/Hybrid Encryption Algorithms

    Multron File Guardian provides you a strong file encryption. Supported algorithms AES Serpent Twofish ThreeFish Camellia ChaCha20 SM4 HC RSA Hybrided With Symmetric Algorithms License = AAL You can set RSA Key Length (from 2048 to 16384) You can set Password-Iteration Rate. You can also set Symmetric Algorithm Key Size If you're about to share a file securely, then you may want to use one of Hybrid algorithms. You can compress your files before encryption. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14

    Encrypted Password Database

    Enterprise level password management and automation

    The Encrypted Password Database is an enterprise level application for storing authentication information and automating application password management.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Encryption plugin for Pidgin, providing up to 4096 bit RSA encryption using the NSS crypto library from Mozilla. Keys are automatically transmitted and stored, making it very easy to use, but also resistant to man-in-the-middle attacks.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 16
    EJBCA, JEE PKI Certificate Authority
    EJBCA is an enterprise class PKI Certificate Authority built on JEE technology. It is a robust, high performance, platform independent, flexible, and component based CA to be used standalone or integrated in other JEE applications.
    Leader badge">
    Downloads: 141 This Week
    Last Update:
    See Project
  • 17

    file encrypt

    File encryption and decryption utility

    The fcrypt and fdecrypt programs provide a comprehensive symmetric encryption tool kit for encrypting and decrypting files.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 18
    AndroidKeyGen

    AndroidKeyGen

    Generate Android signature certificates easier and faster.

    Android APK Signing Certificate Generator, easier and faster to generate Android signing certificate. Implemented in C# (.Net Framework), does not depend on the Java environment. https://github.com/lalakii/AndroidKeyGen
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    EDGE Toolkit

    EDGE Toolkit

    Cross-platform Integrated Security Suite written in Go

    Multi-purpose cross-platform hybrid cryptography tool for symmetric and asymmetric encryption, cipher-based message authentication code (CMAC/PMAC/GMAC/VMAC), recursive hash digest, hash-based message authentication code (HMAC), HMAC-based key derivation function (HKDF), password-based key derivation function (PBKDF2/Argon2/Scrypt), password-hashing scheme (Bcrypt/Argon2/Makwa), shared key agreement (ECDH/VKO/X25519), digital signature (RSA/ECDSA/EdDSA/GOST/SPHINCS+), X.509 CSRs, CRLs and Certificates, and TCP instant server with TLS 1.3 and TLCP encryption layers for small or embedded systems.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    BlackBelt WASTE - ipv4/Tor/i2p +AI+Voice

    BlackBelt WASTE - ipv4/Tor/i2p +AI+Voice

    Modern, AI-Smart, WASTE p2p for ipv4, Tor and i2p + Voice Conference.

    Open Source - GPLv3 inc images. A WASTE client. Download and create your own WASTE networks. Move 1000's of GB's at 100MB+ per sec. (800 Mbits per sec) FULL pause and resume capable. Voice Conference, Chat, Transfer files and Participate in Forums in a secure environment. For Windows XP 32/64, Vista 32/64, Win7 32/64, Win8 32/64, Win 10, Win 11, Linux (WINE). *** User Based Access Control - for voice, chats, file transfers and uploads. (useful in NULLNETS) *** Distributed...
    Downloads: 19 This Week
    Last Update:
    See Project
  • 21
    rechne.exe

    rechne.exe

    Command-line calculator and libray.

    Easy-to-use command-line calculator for basic and scientific calculations.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    GoldBug - Encrypted Communications

    GoldBug - Encrypted Communications

    Chat Messenger. E-Mail-Client. Websearch. Filetransfer.

    GoldBug is a decentralized & secure communication suite that offers an integrated e-mail client, an instant messenger & a file transfer. Also included is an URL-RSS-DB & a p2p web search. Current vers. w/ McEliece Algorithm. GoldBug has been 2013 - 2023 ten years just another Graphical User Interface of the Spot-On Encryption Suite. Main GUI features: Minimal & colorful Interface with Tabs in the East. Microsoft & Qt MinGW deprecated Win32 & for Compiling: ●...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 23
    SwiftyRSA

    SwiftyRSA

    RSA public/private key encryption in Swift

    Public key RSA encryption in Swift. SwiftyRSA is used in the Scoop iOS app to encrypt driver license numbers before submitting them to Checkr through our API. To enable using public/private RSA keys on iOS, SwiftyRSA uses a couple techniques like X.509 header stripping so that the keychain accepts them.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Crypt-LE

    Crypt-LE

    Let's Encrypt / Buypass / ZeroSSL and other ACME-servers clients

    Crypt-LE is a Perl module and command-line client that facilitates obtaining SSL certificates from Let's Encrypt and other ACME-compatible Certificate Authorities. It supports various verification methods and simplifies certificate management processes. ​
    Downloads: 9 This Week
    Last Update:
    See Project
  • 25
    ...Small and larger RSA numbers have been factored by the software, such as the 100 decimal digit number RSA-100. The software factored the 321-bit RSA number relating to the "bank card case".
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next