608 projects tagged "Cryptography"

Download Website Updated 07 Sep 2002 strip-dump

Screenshot
Pop 24.08
Vit 1.48

strip-dump is a command line interface to print Strip account information written in Perl. Strip is a password and account manager for the Palm computing platform from zetetic.net.

Download Website Updated 11 Apr 2002 keyanalyze

Screenshot
Pop 16.16
Vit 1.78

keyanalyze is designed to analyze keyrings in the OpenPGP format (PGP and GnuPG). It looks at properties of connectivity to generate strongly-connected set analysis, as well as some arbitrary statistics including a "mean shortest distance" calculation to show the most connected keys. This code is also used to create a report based on an extremely large keyset once per month.

Download Website Updated 15 Jul 2001 pgp-mime-handler

Screenshot
Pop 18.00
Vit 68.56

RFC 2015 defines a proposed Internet standard for sending PGP-encrypted email. This PGP/MIME has been incorporated into several MUAs such as Mutt and (with the AEGYPTEN project) KMail. However, a lot of email clients still don't support it. pgp-mime-handler can decrypt/verify such messages via a pipe, so it can be used as an email filter in many programs or scripts.

Download Website Updated 25 Mar 2011 MuPO

Screenshot
Pop 69.40
Vit 7.53

MuPO (Multi-Purpose-Organizer) is a powerful PIM application for desktop and PDA systems. It features a hierarchical todo-list and notes, appointments, a project-time recorder, a calendar, recurring items, and more. It is fully searchable, and it includes a tool to sync several mupo-files. You can use it on an Agenda PDA, Compaq iPaq, or on a PC running Linux or Windows. Items can be encrypted.

No download Website Updated 21 May 2005 RC-Crypt

Screenshot
Pop 56.44
Vit 3.15

RC-Crypt can be used to encrypt or decrypt data using the RC5 algorithm. It operates on 128-bit data blocks, adding random characters for padding if necessary. The key size can be chosen by the user, but 64 bits or greater is recommended. It has many input/output options, making this a versatile piece of software suitable for embedding into scripts.

Download Website Updated 18 Aug 2001 AirSnort

Screenshot
Pop 147.87
Vit 1.00

AirSnort is a wireless LAN (WLAN) tool that recovers encryption keys. It operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered.

No download Website Updated 21 Aug 2001 Pseudo Random Number Generator Daemon

Screenshot
Pop 38.14
Vit 1.82

The Pseudo Random Number Generator Daemon (PRNGD) offers an EGD compatible interface for obtaining random data. It is intented to be used as an entropy source to feed other software, especially software based on OpenSSL. Like EGD, it calls system programs to collect entropy. Unlike EGD, it does not generate a pool of random bits that can be called from other software. Instead, it feeds the bits gathered into the OpenSSL PRNG, from which the "random bits" are obtained when requested. This way, PRNGD is never drained and can never block (unlike EGD), so it is also suitable to seed inetd-started programs. It also features a seed-save file, so that it is immediately usable after system start.

Download No website Updated 03 May 2002 OpenPGP Webmail

Screenshot
Pop 73.48
Vit 1.03

OpenPGP Webmail is a set of PHP scripts which allows anonymous Web users to send encrypted email to anyone with PGP or GPG keys. It is designed to run over SSL, and has a key search facility built in. GnuPG is required to do the encryption. The project is now abandonware. Anyone can take it over if they like.

Download Website Updated 20 Dec 2008 GNU Anubis

Screenshot
Pop 203.48
Vit 9.69

GNU Anubis is an SMTP message submission daemon. It represents an intermediate layer between the mail user agent (MUA) and mail transport agent (MTA), receiving messages from the MUA, applying to them a set of predefined changes, and finally inserting modified messages into an MTA routing network. The set of changes applied to a message is configurable on a system-wide and per-user basis. The built-in configuration language used for defining sets of changes allows for considerable flexibility and is easily extensible.

Download Website Updated 01 May 2007 RSA-Haskell

Screenshot
Pop 54.08
Vit 3.00

RSA-Haskell is a collection of command-line cryptography tools and a cryptography library written in Haskell. It is intended to be useful to anyone who wants to secure files or communications or who wants to incorporate cryptography in their Haskell application. The libraries include Haskell implementations of SHA1, EME-OAEP, EMSA-PSS, MGF, RSAES-OAEP, and RSA-PSS. These standards implement signature/verification, strong cryptography, and hashing.

Screenshot

Project Spotlight

WiKID Two-Factor Authentication System

A self-hosted, dual-source two-factor authentication system.

Screenshot

Project Spotlight

Packet Peeper

A network protocol analyzer for Mac OS X.