Browse free open source Cryptography software and projects below. Use the toggles on the left to filter open source Cryptography software by OS, license, language, programming language, and project status.

  • AI-First Supply Chain Management Icon
    AI-First Supply Chain Management

    Supply chain managers, executives, and businesses seeking AI-powered solutions to optimize planning, operations, and decision-making across the supply

    Logility is a market-leading provider of AI-first supply chain management solutions engineered to help organizations build sustainable digital supply chains that improve people’s lives and the world we live in. The company’s approach is designed to reimagine supply chain planning by shifting away from traditional “what happened” processes to an AI-driven strategy that combines the power of humans and machines to predict and be ready for what’s coming. Logility’s fully integrated, end-to-end platform helps clients know faster, turn uncertainty into opportunity, and transform the supply chain from a cost center to an engine for growth.
    Learn More
  • D&B Hoovers is Your Sales Accelerator Icon
    D&B Hoovers is Your Sales Accelerator

    For sales teams that want to accelerate B2B sales with better data

    Speed up sales prospecting with the rich audience targeting capabilities of D&B Hoovers so you can spend more sales time closing.
    Learn More
  • 1
    mp3stegz is an application that apply steganographic (steganography) algorithm in mp3 files. mp3stegz will maintain original mp3 file's size and sound quality. The hidden message is compressed(zlib) and encrypted(Rijndael).
    Leader badge
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    This project provides a simple Java-based steganography tool that can hide a message inside a 24-bit colour image so that knowing how it was embedded, or performing statistical analysis, does not make it any easier to find the concealed information.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 3
    SteganoImage
    Utility for embedding hidden data into PNG files
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    Steganography program. Crypture encrypts (1024 bit key) and stores files in Windows bitmap files. Only 6 KB, with no install required. Fills all bits with noise, to slip by standard steganalysis methods. Data header is encrypted and scattered as well.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Dun and Bradstreet Connect simplifies the complex burden of data management Icon
    Dun and Bradstreet Connect simplifies the complex burden of data management

    Our self-service data management platform enables your organization to gain a complete and accurate view of your accounts and contacts.

    The amount, speed, and types of data created in today’s world can be overwhelming. With D&B Connect, you can instantly benchmark, enrich, and monitor your data against the Dun & Bradstreet Data Cloud to help ensure your systems of record have trusted data to fuel growth.
    Learn More
  • 5
    BMPE stands for Bitmap Editor and is an cross platform open source application written in java for editing and extracting messages from BMP files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    MandelHash

    MandelHash

    MD5 hash used to position and color two overlaid Mandelbrot sets.

    I'm using an MD5 hash of a username and password field to generate some entropy which is used to generate color pallets and positions / scaling of two Mandelbrot sets. These two images are overlaid to create interesting pictures which represent the entered credentials. I'm interested in all things security, this is mostly just for fun, but could possibly be used to help users identify mistakes in their password entry prior to submission and enforce a tighter failed password lockout policy. Please enjoy with a modern HTML5 enabled browser.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    This is a PHP library that can be used to hide data (messages or files) in images using steganography techniques. The data in the image only exists symbolically and thus only you and the intended recipient will know of the existence of that hidden data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    zcahttpproxy

    TV proxy with cas descrambler.

    Multicast UDP to HTTP proxy with Interzet CAS Descrambler. 10.10.2019 New epg map file: http://github.com/ViPetroFF/zcahttpproxy/blob/master/TVGMapNames.ini EPG resource: http://www.teleguide.info/ To update epg map run: "setupM3U.cmd". Obsolete support page: http://code.google.com/p/zcahttpproxy/
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next