BEST Quran Code Software

  •        172

QuranCode is a comprehensive Quran similarity and numerical research tool with full support for the newly discovered Islamic numerology system, "Primalogy".



Related Projects

crypto-algorithms - Basic implementations of standard cryptography algorithms, like AES and SHA-1.

  •    C

These are basic implementations of standard cryptography algorithms, written by Brad Conte ( from scratch and without any cross-licensing. They exist to provide publically accessible, restriction-free implementations of popular cryptographic algorithms, like AES and SHA-1. These are primarily intended for educational and pragmatic purposes (such as comparing a specification to actual implementation code, or for building an internal application that computes test vectors for a product). The algorithms have been tested against standard test vectors. This code is released into the public domain free of any restrictions. The author requests acknowledgement if the code is used, but does not require it. This code is provided free of any liability and without any quality claims by the author.

Arabic Keyboard

  •    Javascript

New Arabic Keyboard Layout based on ISLAM-91 Map, where Arabic letters correspond to Latin letters of similar pronunciation, which makes it much faster and easier to type. Example: the Arabic Letter Meem quot;?quot; can be typed by pressing quot;Mquot;. Islam Adel

Daftar Istilah Islam Shahih

  •    Javascript

Ini adalah sebuah kumpulan dari istilah-istilah dalam agama Islam. Penjelasan yg terdapat dalam daftar ini diusahakan agar benar-benar shahih, sesuai dengan makna yg sebenarnya berdasarkan al-Qur'an dan al-Hadits tanpa ada penyelewengan/pembelokan makna

Botan - Crypto library for C++

  •    C++

Botan (Japanese for peony) is a cryptography library written in C++11. Botan's goal is to be the best option for cryptography in new C++ code by offering the tools necessary to implement a range of practical systems, such as TLS/DTLS, PKIX certificate handling, PKCS#11 and TPM hardware support, password hashing, and post quantum crypto schemes. In addition to the C++, botan has a C89 API specifically designed to be easy to call from other languages. A Python binding using ctypes is included, and several other language bindings are available.

sjcl - Stanford Javascript Crypto Library

  •    Javascript

The Stanford Javascript Crypto Library is a project by the Stanford Computer Security Lab to build a secure, powerful, fast, small, easy-to-use, cross-browser library for cryptography in Javascript. SJCL is secure. It uses the industry-standard AES algorithm at 128, 192 or 256 bits; the SHA256 hash function; the HMAC authentication code; the PBKDF2 password strengthener; and the CCM and OCB authenticated-encryption modes.

mundane - Mundane is a Rust cryptography library backed by BoringSSL that is difficult to misuse, ergonomic, and performant (in that order)

  •    Rust

Mundane is a Rust cryptography library backed by BoringSSL that is difficult to misuse, ergonomic, and performant (in that order). We use GitHub issues for issue tracking, and Gerrit for code reviews. See for more details.

halite - High-level cryptography interface powered by libsodium

  •    PHP

Halite is a high-level cryptography interface that relies on libsodium for all of its underlying cryptography operations. Halite was created by Paragon Initiative Enterprises as a result of our continued efforts to improve the ecosystem and make cryptography in PHP safer and easier to implement.

BouncyCastle - Lightweight Cryptography API for Java and CSharp

  •    Java

Bouncy Castle Crypto APIs is a lightweight cryptography API for Java and CSharp. It has provider for the Java Cryptography Extension and the Java Cryptography Architecture. It supports TLS, PKCS7, PKCS12, OpenPGP, S/MIME, OCSP, TSP, CMP, Extended Access Control, ASN and lot more.

CLR Security

  •    DotNet

The CLR security team codeplex site provides sample code and libraries of APIs to extend and debug the security APIs that ship with the .NET Framework. This codeplex site includes Security.Cryptography.dll which adds new cryptography algorithms to the .NET framework, as well ...

circl - Cloudflare Interoperable Reusable Cryptographic Library

  •    Go

CIRCL (Cloudflare Interoperable, Reusable Cryptographic Library) is a collection of cryptographic primitives written in Go. The goal of this library is to be used as a tool for experimental deployment of cryptographic algorithms targeting Post-Quantum (PQ) and Elliptic Curve Cryptography (ECC). 🚨 This library is offered as-is, and without a guarantee. Therefore, it is expected that changes in the code, repository, and API occur in the future. We recommend to take caution before using this library in a production application since part of its content is experimental.

elliptic - Fast Elliptic Curve Cryptography in plain javascript

  •    Javascript

Fast elliptic-curve cryptography in a plain javascript implementation.NOTE: Please take a look at before choosing a curve for your cryptography operations.

awesome-cryptography - A curated list of cryptography resources and links.

  •    Javascript

A curated list of cryptography resources and links. Your contributions are always welcome! Please take a look at the contribution guidelines first.

Conscrypt - Java Security Provider that implements parts of the Java Cryptography Extension and Java Secure Socket Extension

  •    Java

Conscrypt is a Java Security Provider (JSP) that implements parts of the Java Cryptography Extension (JCE) and Java Secure Socket Extension (JSSE). It uses BoringSSL to provide cryptographical primitives and Transport Layer Security (TLS) for Java applications on Android and OpenJDK.The core SSL engine has borrowed liberally from the Netty project and their work on netty-tcnative, giving Conscrypt similar performance.

Cryptography - Package designed to expose cryptographic primitives and recipes to Python developers

  •    Python

cryptography is a package which provides cryptographic recipes and primitives to Python developers. Our goal is for it to be your "cryptographic standard library". It supports Python 2.7, Python 3.4+, and PyPy 5.3+. cryptography includes both high level recipes and low level interfaces to common cryptographic algorithms such as symmetric ciphers, message digests, and key derivation functions. For example, to encrypt something with cryptography's high level symmetric encryption recipe.


  •    ActionScript

Cantillion is a Flash based program written in haXe that allows users to listen to, view and examine recordings from traditions such as Torah Trope, Koran recitation and Gregorian Chant.

javascript-obfuscator - A powerful obfuscator for JavaScript and Node.js

  •    TypeScript

JavaScript obfuscator is a powerful free obfuscator for JavaScript with a wide number of features which provides protection for your source code. It is not recommended to obfuscate vendor scripts and polyfills, since the obfuscated code is 15-80% slower (depends on options) and the files are significantly larger.

EMISymCrypto - Managed symmetric & asymmetric cryptography library

  •    DotNet

A managed symmetric & asymmetric cryptography library that supports Aes192, Aes256, DES, RC2, Rijndael, TripleDES, Blowfish, Twofish, RC4, ARC4.

Cryptosolic - The Cryptography & Software Licensing Framework for .Net


Cryptosolic is an Open Source Cryptography & Software Licensing Framework for .Net. More Information and Downloads available soon.

Keyczar - Toolkit for safe and simple cryptography

  •    Java

KeyczarKeyczar is an open source cryptographic toolkit designed to make it easier and safer for devlopers to use cryptography in their applications. Keyczar supports authentication and encryption with both symmetric and asymmetric keys. Keyczar was originally developed by members of the Google Security Team.

cjdns - An encrypted IPv6 network using public-key cryptography for address allocation and a distributed hash table for routing

  •    Assembly

Cjdns implements an encrypted IPv6 network using public-key cryptography for address allocation and a distributed hash table for routing. This provides near-zero-configuration networking, and prevents many of the security and scalability issues that plague existing networks. The cjdns developers.