Dar is a shell command that makes backup of a directory tree and files. Its features include splitting archives over several files, DVD, CD, ZIP, or floppies, compression, full or differential backups, strong encryption, proper saving and restoration of hard links, extended attributes, file forks, Door inodes, and sparse files, remote backup using pipes and external commands (such as ssh), and rearrangement of the "slices" of an existing archive. It can run commands between slices, before and after saving some defined files or directories (for a proper database backup, for example), and quickly retrieve individual files from differential and full backups. Several external GUIs exist as alternatives to its CLI interface, like kdar, DarGUI, SaraB, etc.
The CyaSSL embedded SSL library is a lightweight SSL library written in ANSI C and targeted for embedded and RTOS environments, primarily because of its small size, speed, and feature set. It is commonly used in standard operating environments and cloud services as well because of its royalty-free pricing and excellent cross platform support. CyaSSL supports industry standards up to the current TLS 1.2 and DTLS 1.2 levels, is up to 20 times smaller than OpenSSL, and offers progressive ciphers such as HC-128, RABBIT, and NTRU.
Botan is a crypto library written in C++. It provides a variety of cryptographic algorithms, including common ones such as AES, MD5, SHA, HMAC, RSA, Diffie-Hellman, DSA, and ECDSA, as well as many others that are more obscure or specialized. It also offers SSL/TLS (client and server), X.509v3 certificates and CRLs, and PKCS #10 certificate requests. A message processing system that uses a filter/pipeline metaphor allows for many common cryptographic tasks to be completed with just a few lines of code. Assembly and SIMD optimizations for common CPUs offers speedups for critical algorithms like AES and SHA-1.
MEO is a powerful data encryption application to encrypt or decrypt files of any type, including Microsoft Word, email, and PDF documents. It can also create self-extracting encrypted files. This is handy for those who like to view their encrypted files without installing any other encryption software. Also, many downloads supply a checksum or hash value for you to verify the integrity of your download. Meo allows you to create and verify MD5 checksums, SHA-1 hashes, and Tiger Tree hashes.
yaSSL is a C++ based SSL library for embedded and RTOS environments, designed for individuals who prefer to use the C++ language. For a C-based solution, please see CyaSSL. yaSSL supports the industry standards up to TLS 1.2, and also includes an OpenSSL compatibility interface.
NetCrack is cluster software developed to distribute a hashing algorithm's cracking process work using a brute force attack. Currently, it only supports the two most commonly used hashing algorithms: MD5 and SHA-1. Support is included for MySQL, safe mode, and others. It works like a client/server application, where the server is unique for each cluster network and its job is to distribute the cracking process work, coordinate the nodes, and prevent connections and data integrity errors.
tkpg is a program that provides a GUI front end to Philip Zimmermann's Pretty Good Privacy (PGP) public-key encryption system and also the GNU Privacy Guard (GnuPG/gpg) implementation. It utilizes the Clipboard Selection heavily to ease moving pgp-processed text both to and from any of your applications (such as mail reader, news reader, and editor). This removes the need to select the output text by hand or by typing in a filename, since it is usually placed in the Selection automatically for you.
PyCryptoPlus is a cryptographic module similar to PyCrypto, with which it shares the API. But PyCryptoPlus is written 100% in Python, so its primary interest is educational and scientific; if you want real speed, you're better checking out PyCrypto. It was not completely written from scratch, but integrates other cipher codes when available in Python and under appropriate licenses. It contains, among other things: Block cipher algorithms (Serpent, Blowfish, Twofish, DES, 3DES, AES, Rijndael, and PRESENT); modes of operation (CMAC, ECB, CBC, CTR, and XTS); paddings (bit padding, zeros, PKCS7, PKCS12, ISO 10126, and ANSI X.923); and one-way functions (MD5, SHA1/SHA2, Whirlpool, RipeMD, RadioGatun, HMAC, and PBKDF2).