OrionUsable, easy and safe pure-Rust crypto
Stars: ✭ 227 (+167.06%)
Argon2rsThe pure-Rust password hashing library running on Argon2.
Stars: ✭ 157 (+84.71%)
Password4jPassword4j is a user-friendly cryptographic library that supports Argon2, Bcrypt, Scrypt, PBKDF2 and various cryptographic hash functions.
Stars: ✭ 124 (+45.88%)
MasterpasswordProject moved to https://gitlab.com/spectre.app
Stars: ✭ 1,122 (+1220%)
Lazysodium AndroidAn Android implementation of the Libsodium cryptography library. For the lazy dev.
Stars: ✭ 69 (-18.82%)
FscryptGo tool for managing Linux filesystem encryption
Stars: ✭ 534 (+528.24%)
Lockbox ExtensionExperimental Firefox extension for login management experiences, not being actively developed
Stars: ✭ 130 (+52.94%)
BitcrackerBitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
Stars: ✭ 463 (+444.71%)
HaliteHigh-level cryptography interface powered by libsodium
Stars: ✭ 933 (+997.65%)
Seal DemoDemos, Examples, Tutorials for using Microsoft SEAL library.
Stars: ✭ 63 (-25.88%)
Dfw1n OsintAustralian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
Stars: ✭ 63 (-25.88%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+1236.47%)
AcvpIndustry Working Group on Automated Cryptographic Algorithm Validation
Stars: ✭ 76 (-10.59%)
Fhe Toolkit LinuxIBM Fully Homomorphic Encryption Toolkit For Linux. This toolkit is a Linux based Docker container that demonstrates computing on encrypted data without decrypting it! The toolkit ships with two demos including a fully encrypted Machine Learning inference with a Neural Network and a Privacy-Preserving key-value search.
Stars: ✭ 1,123 (+1221.18%)
Recrypt RsA set of cryptographic primitives for building a multi-hop Proxy Re-encryption scheme, known as Transform Encryption.
Stars: ✭ 81 (-4.71%)
ShadowcloudUniversal cloud storage client
Stars: ✭ 62 (-27.06%)
VeracruzMain repository for the Veracruz privacy-preserving compute project.
Stars: ✭ 71 (-16.47%)
QuantumgateQuantumGate is a peer-to-peer (P2P) communications protocol, library and API written in C++.
Stars: ✭ 62 (-27.06%)
RaazCryptographic library for Haskell
Stars: ✭ 60 (-29.41%)
Awa SshPurely functional SSH library in ocaml.
Stars: ✭ 80 (-5.88%)
Pwned Passwords DjangoUtilities for working with the Pwned Passwords database from Django.
Stars: ✭ 71 (-16.47%)
SavjeecoinA simple blockchain in Javascript. For educational purposes only.
Stars: ✭ 1,097 (+1190.59%)
PinkmanPINkman is a library to help implementing an authentication by a PIN code in a secure manner. The library derives hash from the user's PIN using Argon2 function and stores it in an encrypted file. The file is encrypted with the AES-256 algorithm in the GCM mode and keys are stored in the AndroidKeystore.
Stars: ✭ 59 (-30.59%)
SsriStandard Subresource Integrity library for Node.js
Stars: ✭ 69 (-18.82%)
WolfsslwolfSSL (formerly CyaSSL) is a small, fast, portable implementation of TLS/SSL for embedded devices to the cloud. wolfSSL supports up to TLS 1.3!
Stars: ✭ 1,098 (+1191.76%)
PypinksignPinkSign – a friendly Python library for NPKI (공인인증서) certificates 🔑
Stars: ✭ 65 (-23.53%)
Dumb PasswordsDon't let your user be a victim of their own action
Stars: ✭ 77 (-9.41%)
Pwned Passwords🔐Go client library for checking values against compromised HIBP Pwned Passwords
Stars: ✭ 81 (-4.71%)
Beamsplitter💎 Beamsplitter - A new (possibly universal) hash that passes SMHasher. Built mainly with a random 10x64 S-box. Also in NodeJS
Stars: ✭ 83 (-2.35%)
Exonum ClientJavaScript client for Exonum blockchain
Stars: ✭ 62 (-27.06%)
LibblsBLS signatures, threshold encryption, distributed key generation library in modern C++. Actively maintained and used by SKALE for consensus, distributed random number gen, inter-chain communication and protection of transactions. BLS threshold signatures can be verified in Solidity, and used as random beacon (common coin)
Stars: ✭ 74 (-12.94%)
WaykichainPublic Blockchain as a Decentralized Finance Infrastructure Service Platform
Stars: ✭ 1,117 (+1214.12%)
Chrome Export PasswordsShow all your chromium passwords in format ready to import in other browser like FireFox
Stars: ✭ 80 (-5.88%)
ConstantineConstant time pairing-based or elliptic curve based cryptography and digital signatures
Stars: ✭ 61 (-28.24%)
PwnedpasswordsdllOpen source solution to check prospective AD passwords against previously breached passwords
Stars: ✭ 71 (-16.47%)
BrambleBramble is a hacking Open source suite.
Stars: ✭ 60 (-29.41%)
FrescoA FRamework for Efficient Secure COmputation
Stars: ✭ 83 (-2.35%)
MinisignA dead simple tool to sign files and verify digital signatures.
Stars: ✭ 1,105 (+1200%)
ComeoninPassword hashing specification for the Elixir programming language
Stars: ✭ 1,166 (+1271.76%)
Coniks JavaA CONIKS implementation in Java
Stars: ✭ 58 (-31.76%)
Lightning RfcLightning Network Specifications
Stars: ✭ 1,224 (+1340%)
Pathwar☠️ The Pathwar Project ☠️
Stars: ✭ 58 (-31.76%)
ThemisEasy to use cryptographic framework for data protection: secure messaging with forward secrecy and secure data storage. Has unified APIs across 14 platforms.
Stars: ✭ 1,232 (+1349.41%)
IpfsfbInterPlanetary File System for Business (IPFSfB) is an enterprise blockchain storage network based on InterPlanetary File System.
Stars: ✭ 57 (-32.94%)
WebcryptoW3C Web Cryptography API for Node.js
Stars: ✭ 79 (-7.06%)
BabasslA Brisk and Better Assured Cryptographic Toolkit
Stars: ✭ 68 (-20%)
CryptographyCryptography for Flutter developers: encryption, digital signatures, key agreement, etc.
Stars: ✭ 56 (-34.12%)
QtumQtum Core Wallet
Stars: ✭ 1,080 (+1170.59%)
LibtomcryptLibTomCrypt is a fairly comprehensive, modular and portable cryptographic toolkit that provides developers with a vast array of well known published block ciphers, one-way hash functions, chaining modes, pseudo-random number generators, public key cryptography and a plethora of other routines.
Stars: ✭ 1,080 (+1170.59%)
Merkle ToolsTools for creating Merkle trees, generating merkle proofs, and verification of merkle proofs.
Stars: ✭ 54 (-36.47%)
YubikeylockdSimple daemon for locking and unlocking macOS with Yubikey
Stars: ✭ 78 (-8.24%)
Gurvygurvy implements Elliptic Curve Cryptography (+Pairing) for BLS12-381, BLS12-377, BW6-761, and BN256. Originally developed (and used) by gnark
Stars: ✭ 66 (-22.35%)
Waves⛓️ Reference Waves Blockchain Node (client) implementation on Scala
Stars: ✭ 1,077 (+1167.06%)