Simple CryptographyScripts that illustrate basic cryptography concepts based on Coursera Standford Cryptography I course and more.
Swift CryptoOpen-source implementation of a substantial portion of the API of Apple CryptoKit suitable for use on Linux platforms.
AnonlinkPython implementation of anonymous linkage using cryptographic linkage keys
CryptonLibrary consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenges from CTFs
XortoolA tool to analyze multi-byte xor cipher
X25519Public key cryptography library for Ruby providing the X25519 Diffie-Hellman function
LibpkiEasy-to-use high-level library for PKI-enabled applications
KsuidJava implementation of K-Sortable Globally Unique IDs
CryptographyCryptography Android application code samples / cipher collection for app users
GuardedboxOnline client-side manager for secure storage and secrets sharing.
UfonetUFONet - Denial of Service Toolkit
Cl TlsAn implementation of TLS and related specifications in Common Lisp
PowersoftauAn independent implementation of the Powers of Tau MPC ceremony.
DatasafeDatasafe - flexible and secure data storage and document sharing using cryptographic message syntax for data encryption
IndurativeEasily create authenticated data structures
Sephia FiveA secure and PGP enabled webmail module for Phosphorus Five
RbnaclRuby FFI binding to the Networking and Cryptography (NaCl) library (a.k.a. libsodium)
Curl CollisionsAn implementation of Heilman et al.'s differential attack on IOTA's Curl hashing function.
PysyftA library for answering questions using data you cannot see
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Simon Speck Cexample C language implementation of SIMON and SPECK lightweight block ciphers.
Polpol /pɵl/ is a modern command line password manager with deniable encryption
HaliteHigh-level cryptography interface powered by libsodium
AesAES-128 hardware implementation
StreebogGOST R 34.11-2012: RFC-6986 cryptographic hash function
Fernet Java8Java 8 implementation of the Fernet Specification
Aeternityæternity: solving scalability problems by making sense of state-channels
HbcAPI of homomorphic binary operations such as binary comparisons or binary divisions using the library HElib
BplibA bilinear pairing library for petlib
Virgil Crypto PhpVirgil PHP Crypto Library is a high-level cryptographic library that allows you to perform all necessary operations for secure storing and transferring data and everything required to become HIPAA and GDPR compliant.
Siv ModeRFC 5297 SIV mode of operation in Java
RecryptTransform encryption library for Scala
AirassemblyLow-level language for encoding AIR of computations
Tf EncryptedA Framework for Encrypted Machine Learning in TensorFlow
Ciphey⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Sdk JsTanker client-side encryption SDK for JavaScript
LiboqsC library for prototyping and experimenting with quantum-resistant cryptography
TfheTFHE: Fast Fully Homomorphic Encryption Library over the Torus
PynaclPython binding to the Networking and Cryptography (NaCl) library
BlockchainCompilation of useful documents and scientific papers about Blockchain & cryptocurrencies.
KeysKey management is hard
AcraDatabase security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("transparent") encryption. SQL, NoSQL.