Liste des projets simples Logiciel Télécharger Carte

Cryptography
657 projects in result set
Dernière Mise à Jour: 2018-10-28 18:17

PeaZip

PeaZip is a free archiver tool. The application provides an unified, natively portable, cross-platform file manager and archive manager GUI for many Open Source technologies like 7-Zip, FreeArc, PAQ, UPX.

Create: 7Z, ARC, BZip/GZip, PEA, TAR, WIM, XZ, ZPAQ, ZIP files and more

Open and extract 150+ file types: ACE, CAB, DEB, ISO, RAR, ZIPX and more

Features of PeaZip includes extract, create and convert multiple archives at once, create self-extracting archives (sfx), split files, strong encryption with two factor authentication, encrypted password manager, secure deletion, find duplicate files, calculate hashes, export task definition as command line script.

Statut de développement: 5 - Production / écurie
Langage naturel: English, French, Spanish
Système d'exploitation: POSIX (Linux,BSD,Solaris etc..), Windows
Langage de programmation: Delphi/Kylix, Lazarus, Object Pascal
Interface utilisateur: GTK+, Qt, Win32 (MS Windows)
Activity Percentile: 615
Activity Ranking: 19Ranking
Register Date: 2010-08-16 15:30
Dernière Mise à Jour: 2011-12-24 09:29

MD5-utils

Utils の MD5 は MD5 ハッシュ関数操作のスクリプトです。クリプト オンライン サーバーを使用する 1 つまたは複数の hash(es) をクラックしようと 1 つまたは複数の単語をことができます。

(Traduction automatique)
Dernière Mise à Jour: 2014-06-14 04:01

WiKID Two-Factor Authentication System

The WiKID Strong Authentication System is a highly scalable, secure, self-hosted two-factor authentication system. It is simple to implement and maintain, allows users to be validated automatically, requires no hardware tokens, has a simple API for application support (via Ruby, PHP, Java, COM, Python, etc.), supports multiple domains, and supports replication for fault tolerance and scalability. It also supports mutual /host and transaction authentication, wireless tokens only domains, locked tokens (to your PC), anti-keystroke logger keypad PIN entry, etc.

Dernière Mise à Jour: 2013-05-30 23:47

John the Ripper

John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, lots of other hashes and ciphers are added in the community-enhanced version (-jumbo), and some are added in John the Ripper Pro.

Dernière Mise à Jour: 2014-01-31 13:57

Portable OpenSSH

Portable OpenSSH is a Unix/Linux port of OpenBSD's excellent OpenSSH, a full implementation of the SSH1 and SSH2 protocols. It includes sftp client and server support.

Dernière Mise à Jour: 2013-12-21 01:48

The GNU Privacy Guard

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Dernière Mise à Jour: 2018-10-10 08:18

VeraCrypt

VeraCrypt は IDRIX (http://www.idrix.fr) による無料のディスク暗号化ソフトウェアであり、TrueCrypt を起源としています。このソフトウェアは、システムやパーティション暗号化に使用されるアルゴリズムに対して強化されたセキュリティを提供し、日々進化し続けているブルートフォースアタックの手法に対抗しています。 たとえば、システム パーティションが暗号化されている場合 TrueCrypt は ハッシュ関数 PBKDF2 RIPEMD160 を 1000回しか繰り返しません。一方、VeraCrypt はこれを327661 回繰り返します。また、標準的なコンテナやパーティション暗号化の場合、TrueCrypt はせいぜい 2000回ですが VeraCryptは 655331回のRIPEMD160 と50万回のSHA-2及びWhirlpoolを使用します。 このセキュリティ強化により、暗号化ボリュームを最初に開く際わずかな遅延が生じますが、アプリケーションを使用する段階では全く影響がありません。これは暗号化ボリュームの正当な所有者は容認できることです。しかし、攻撃者が暗号化されたデータへのアクセスを得ることはより困難になります。 なお、VeraCrypt はTrueCrypt のストレージ形式とは互換性がありません。

Dernière Mise à Jour: 2011-09-13 21:28

WiKID Strong Authentication System

The WiKID Strong Authentication System is a highly scalable, secure two-factor authentication system. It is simple to implement and maintain, allows users to be validated automatically, requires no hardware tokens, has a simple API for application support (via Ruby, PHP, Java, COM, Python, etc.), supports multiple domains, and supports replication for fault tolerance and scalability. It also supports mutual /host and transaction authentication, wireless tokens only domains, locked tokens (to your PC), anti-keystroke logger keypad PIN entry, etc.

(Traduction automatique)
Dernière Mise à Jour: 2014-05-15 23:48

SILC

SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing and chat services. It can be used to send any kind of messages, in addition to normal text messages, including multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, SHA-2, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. The software is delivered as SILC Client for end users, SILC Server for system administrators, and SILC Toolkit for application developers.

(Traduction automatique)
Dernière Mise à Jour: 2008-11-22 18:17

mcrypt

mcrypt(および付属のlibmcryptライブラリ)は、古いUnixの暗号化手法の代替を目指していますが、ライセンスはGPLとし、アルゴリズムとモードはかつてよりも広範囲なサポートを行うことを意図しています。

Dernière Mise à Jour: 2014-06-16 08:30

Disk ARchive

Dar is a shell command that makes backup of a directory tree and files. Its features include splitting archives over several files, DVD, CD, ZIP, or floppies, compression, full or differential backups, strong encryption, proper saving and restoration of hard links, extended attributes, file forks, Door inodes, and sparse files, remote backup using pipes and external commands (such as ssh), and rearrangement of the "slices" of an existing archive. It can run commands between slices, before and after saving some defined files or directories (for a proper database backup, for example), and quickly retrieve individual files from differential and full backups. Several external GUIs exist as alternatives to its CLI interface, like kdar, DarGUI, SaraB, etc.

Dernière Mise à Jour: 2018-11-29 06:36

Password Safe

Password Safe はパスワードデータベースユーティリティです。ユーザはコンピュータ上で暗号化した形でより安全な形にパスワードを保っておくことができます。一つの安全な組み合わせを利用して、それらのロックを解除できます。

Dernière Mise à Jour: 2014-03-03 22:11

GNU Transport Layer Security Library

GnuTLS is a secure communications library implementing the SSL, TLS, and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.

Dernière Mise à Jour: 2014-04-08 23:14

GNUnet

GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP, TCP, HTTP, HTTPS, or direct 802.11 (WLAN). GNUnet supports accounting to provide contributing nodes with better service. The services built on top of the framework include anonymous file sharing and a virtual network providing IPv4-IPv6 transition via protocol translation over the P2P network.

Dernière Mise à Jour: 2014-03-18 22:57

JSch

JSch is a pure Java implementation of SSH2. It allows you to connect to an sshd server and use port forwarding, X11 forwarding, file transfer, etc. You can integrate its functionality into your own Java programs.