Displaying 1 to 20 from 31 results


  •    Javascript

A small JavaScript library to generate YouTube-like ids from numbers. Use it when you don't want to expose your database ids to the user.

CyberChef - The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis

  •    Javascript

CyberChef is a simple, intuitive web app for carrying out all manner of "cyber" operations within a web browser. These operations include simple encoding like XOR or Base64, more complex encryption like AES, DES and Blowfish, creating binary and hexdumps, compression and decompression of data, calculating hashes and checksums, IPv6 and X.509 parsing, changing character encodings, and much more. The tool is designed to enable both technical and non-technical analysts to manipulate data in complex ways without having to deal with complex tools or algorithms. It was conceived, designed, built and incrementally improved by an analyst in their 10% innovation time over several years.

CTI Text Encryption


A text encryption tools. Able to encrypt with multiple password. Light weight, efficient, portable and able to translate to your language.

Dynamics Ax CipherLib


The Dynamics Ax CipherLib is a simple X.509 certificate based cipher implementation that allows to encrypt/decrypt S/MIME or XML messages with Dynamics Ax 4.0,

js-jose - JavaScript library to encrypt/decrypt data in JSON Web Encryption (JWE) format and to sign/verify data in JSON Web Signature (JWS) format

  •    Javascript

Library to encrypt and decrypt data in JSON Web Encryption (JWE) format and to sign data in JSON Web Signature (JWS) format. Leverages Browser's native web crypto API.

Cryptex - Secure secret storage and cryptographic key retrieval for Node.js

  •    Javascript

If you check database passwords into git, download credential files from S3 or some other server, provide plaintext keys to your continuous integration/deployment solution, or don't have the ability to limit engineers from getting production secrets, stop doing what you're doing. Following 12 Factor? Rock on. We have env var support already built-in.

ssh-key-decrypt - Decrypt and encrypted ssh private keys

  •    Javascript

Data can be either a string or a buffer. It is the contents of the key file.If the file is not encrypted, then the passphrase doesn't matter.

hls-decryptor - hls proxy that will decrypt segment files of another hls playlist

  •    Javascript

If the playlist contains encrypted segments hls-decryptor will decrypt them for you. I needed this to make encrypted streams work on my raspberry pi.

envenc - Seamlessly encrypt and decrypt your development keys in your .env

  •    Javascript

The 1Password for development environment variables.Seamlessly encrypt and decrypt your development keys in your .env.

bacon-cipher - A robust JavaScript implementation of Bacon’s cipher, a.k.a. the Baconian cipher.

  •    Javascript

bacon-cipher is a JavaScript implementation of Bacon’s cipher, a.k.a. the Baconian cipher. It can be used to encode plaintext to Bacon-ciphertext, or the other way around (i.e. decoding). Here’s an online demo.A string representing the semantic version number.

node-object-encrypter - Encrypt/decrypt javascript objects as base64 strings with optional TTL support

  •    Javascript

Encrypt/decrypt JavaScript objects as base64 strings with optional TTL support.Create an instance of encrypter, secret could be a string or an array of strings.

chrome-cookies-secure - Extract encrypted Google Chrome cookies for a url on a Mac or Linux

  •    Javascript

If format is not specified, object will be used as the format by default. Cookie order tries to follow RFC 6265 - Section 5.4, step 2 as best as possible.

aes-cross - A real cross platform AES encryption-decryption solution

  •    Java

Only all these 5 things are exactly the same can the AES encription and decryption be used anywhere. Most language supports ECB,CBC,CFB cipher mode (CBC is used widely), and all key sizes(128 is used widely). But the padding mode is different in different platforms, and it's also effected by cipher mode. You don't need any extra code on these platforms, just make sure using AES/CBC/PKCS5Padding ,and same iv, same key, the encription and decription will cross platforms. There're some platform don't support PKCS5Padding , that's the project to resolve it.

node-gpg - GPG encryption and decryption in node.js by way of the gpg command-line tool

  •    Javascript

This module is a wrapper around gpg for use within Node. Node-GPG takes care of spawning gpg, passing it the correct arguments, and piping input to stdin. It can also pipe input in from files and output out to files. Use Node-GPG if you are considering calling gpg directly from your application.

secure-conf - Secure Node.js Configuration Files

  •    Javascript

This library makes your application configuration files more secure by providing methods to encrypt at build-time & decrypt at runtime. NOTE: This module is not a substitute for your server/application security. Passwords are freely available in the RAM, a determined Hacker can get whatever she wants.

dumpdecrypted - Dumps decrypted mach-o files from encrypted applications、framework or app extensions

  •    Objective-C

Dumps decrypted mach-o files from encrypted applications、framework or app extensions.

natrium - libsodium node.js bindings

  •    Javascript

The examples below demonstrate the usage with promises. With ecmascript 7, you can await the promises to get the result as in synchronous code. This works for all the code below. To use the await keyword, it must be contained inside an async function.

laravel-optimus - Transform your internal id's to obfuscated integers based on Knuth's integer hash.

  •    PHP

Laravel wrapper for the Optimus Library by Jens Segers with multiple connections support. Optimus is a small open-source library that generates short, unique, non-sequential ids from numbers. With this library, you can transform your internal id's to obfuscated integers based on Knuth's integer hash. It is similar to Hashids, but will generate integers instead of random strings. It is also super fast. First, pull in the package through Composer.

Crypt12-Decryptor - Tool for decrypting WhatsApp Crypt12 databases

  •    Java

Tool for decrypting WhatsApp Crypt12 databases. The authenticated decryption operation has five inputs: K, IV, C, A and T. It has only a single output, either the plaintext value P or a special symbol 'FAIL' that indicates that the inputs are not authentic. A ciphertext C, initialization vector IV, additional authenticated data A and tag T are authentic for key K when they are generated with the encrypt operation with inputs K, IV, A and P, for some plaintext P. The authenticated decrypt operation will, with high probability, return 'FAIL' when its inputs were not created by the encrypt operation with the identical key. The additional authenticated data A is used to protect information that needs to be authenticated, but which must be left unencrypted. When using GCM to secure network protocol, this input could include addresses, ports, sequence numbers, protocol version numbers, and other fields that indicate how the plaintext should be handled, forwarded, or processed. In many situations, its desirable to authenticate these fields, though they must be left in the clear for the network to function properly. when this data is included in the AAD, authentication is provided without copying the data into the ciphertext. The primary purpose of the IV is to be a nonce, that is, to be distinct for each invocation of the encryption operation for a fixed key. It is acceptable for the IV to be generated randomly, as long as the distinctness of the IV is highly likely. The IV is authenticated, and it is not necessary to include it in in the AAD field.

We have large collection of open source products. Follow the tags from Tag Cloud >>

Open source products are scattered around the web. Please provide information about the open source projects you own / you use. Add Projects.