Tomb is asystem to makestrongencryption easyfor everydayuse. A tomb islike a lockedfolder that canbe safelytransported andhidden in afilesystem. Itskeys can bekept separate;for example,you can keepthe tomb onyour computerand its key ona USB stick.Tomb is writtenin code that iseasy to reviewand linkssharedcomponents: itconsists of aZShell scriptand desktopintegrationapps; it usesstandard GNUtools and thecrypto API ofthe Linuxkernel(dm-crypt) viacryptsetup.
The Mandossystem allowscomputers tohave encryptedroot filesystems and atthe same timebe capable ofremote orunattendedreboots. Thecomputers run asmall clientprogram in theinitial RAMdiskenvironmentwhich willcommunicatewith a serverover a network.All networkcommunicationis encryptedusing TLS. Theclients areidentified bythe serverusing a TLS keythat is uniqueto each client.The serversends theclients anencryptedpassword. Theencryptedpassword isdecrypted bythe c
MikroLock readsand writesencryptedminiLock files.It is a fastnativeimplementationof the openminilock fileformat. Despiteits name (andin contrast tothe originalimplementation),it can alsohandle bigfiles.Informationabout thecryptographicdetails:https://minilock.io.
sencrypt andsdecrypt areutilities forencrypting anddecrypting datawith the AES,DES, 3DES, andRC4 algorithms.It can readkeys from filesor ask for apassphrase anduse thattogether with asalt to derivea key using thePBKDF2 keyderivationfunction. sencrypt andsdecrypt areportable andcompatiblereimplementationsof the encryptand decryptutilities inSolaris/Illumos-basedoperatingsystems.
Due to thestructure ofpass, file- anddirectory namesare notencrypted inthe passwordstore.pass-tombprovides aconvenientsolution to putyour passwordstore in a tomband then keepyour passwordtree encryptedwhen you arenot using it. It uses thesame GPG key toencryptpasswords andtomb, thereforeyou don'tneed to managemore key orsecret.Moreover, youcan askpass-tomb toautomaticallyclose yourstore after agiven time.
BrowserNotebookdisplays,encrypts andstores noteslocally in theWeb browser.Unlike similarprograms, thetexts arestored nowhereelse than inyour browserand always inencrypted form.The plaintextis kept inmemory only. You can eitheruse the onlineversion withoutanyregistration orinstallation,or you candownload theoffline versionand use itwithoutInternetaccess.
GnuPG (the GNUPrivacy Guardor GPG) isGNU's toolfor securecommunicationand datastorage. It canbe used toencrypt dataand to createdigitalsignatures. Itincludes anadvanced keymanagementfacility and iscompliant withthe proposedOpenPGPInternetstandard asdescribed inRFC2440. Assuch, it ismeant to becompatible withPGP from NAI,Inc. Because itdoes not useany patentedalgorithms, itcan be usedwithout anyrestrictions.
Secrets can beused to split asecret textinto shares tobe distributedto friends.When allfriends agree,the shares canbe combined toretrieve theoriginal secrettext, forinstance togive consensualaccess to alost pin, apassword, alist ofpasswords, aprivatedocument or akey to anencryptedvolume. Secretsharing can beuseful in manydifferentsituations andthis tool is asimple and welldocumented freeand open sourceimplementationavailable foranyone to usefrom thiswebsite,
Naamari isAES&SHA-basedcrypto-synchronizerforcloud/remotefile storage,withcryptographicand transportmodules beingseparateapplications. It works with 4locations. 1st:local dir withoriginal files.2nd: dircontainingfolderstructure andnames of filesplaced intostorage (butnot content).3rd & 4th -storages: local(another localdir) and remote(say, a cloud).In storages,there are nofolders, fileshavepseudo-randomnames andencryptedcontent("flattening"). The mainmodule
gpgpwd is aterminal-basedpasswordmanager. Itstores a listof passwordsand theirassociatedusernames in aGnuPG-encryptedfile, andallows you toeasilyretrieve,change, and addto that file asneeded. Italso generatesrandompasswords whichyou can use,easily allowingyou to have one"masterpassword"(for your gpgkey), with oneunique andrandom passwordfor eachwebsite orservice youuse, ensuringthat your otheraccounts staysafe even ifone passwordgets leaked. gpgpwd can als
Briefly, t1hais a 64-bitHash Function: 1. Created for64-bitlittle-endianplatforms, inpredominantlyfor x86_64, butwithoutpenalties couldruns on any64-bit CPU. 2.In most casesup to 15%faster thanCity64, xxHash,mum-hash,metro-hash andall otherswhich are notuse specifichardwaretricks. 3. Notsuitable forcryptography.
Dowse is atransparentproxyfacilitatingthe awarenessof ingoing andoutgoingconnections,from, to, andwithin a localarea network. Dowse providesa central pointof soft controlfor all localtraffic: fromARP traffic(layer 2) toTCP/IP (layers3 and 4) aswell asapplicationspace, bychaining afirewall setupto a trasparentproxy setup. Acore featurefor Dowse isthat of hidingall thecomplexity ofsuch a setup.
Jaro Mail is anintegratedsuite ofinteroperabletools forGNU/Linux andApple/OSX tomanage e-mailcommunicationin a privateand efficientway, withoutrelying toomuch on on-lineservices, infactencouragingusers to storee-mail locally. Rather thanreinventing thewheel, JaroMail reusessome existingfree and opensource toolsworking sincemore than 10years,generatingtheirconfigurationsand setting upintegrationsautomatically.
This is ascoring serverbuilt usingRuby on Railsby the MilitaryCyberProfessionalsAssociation(MCPA). It isfree to use andextend underthe MITlicense. Thegoal of thisproject is toprovide astandardgeneric scoringserver thatprovides aneasy way to addand modifyproblems andtrackstatistics of aCyber Capturethe Flag event.
mlock reads andwritesencryptedminiLock files.It is a fastnativeimplementationof the minilockfile format.Despite itsname (and incontrast to theoriginalimplementation),it can alsohandle bigfiles.Informationabout thecryptographicdetails:https://minilock.io.
The OpenSSLProject is acollaborativeeffort todevelop arobust,commercial-grade,fully featured,and Open Sourcetoolkitimplementingthe SecureSockets Layer(SSLv2/v3) andTransport LayerSecurity(TLSv1) as wellas afull-strengthgeneral-purposecryptographylibrary.
gcaff is agraphicalOpenPGP/GPG keysigning tool.It simplifiessigningmultiple keys,as it wasintended forkeysigningparties. Itdisplays photoIDs for easieridentification,and allowsmulti-keysigning in onego.Certificationlevels can beadapted on aper-key basis,and it includesautomaticemailing thefinal signedkeys.
ZShaolinunleashes thepower ofGNU/Linux onyour Androidphone or tabletby installing asmall andpowerful shellenvironment. It comes withapplications toedit images,audio and videousing batchscripts one canwrite andupload. It doesnot requirerooting, noteven anInternetconnection towork.
PolarSSL is alight-weightcryptographicand SSL/TLSlibrary writtenin C. PolarSSLmakes it easyfor developersto includecryptographicand SSL/TLScapabilities intheir(embedded)applicationswith as littlehassle aspossible. Loosecoupling of thecomponentsinside thelibrary meansthat it is easyto separate theparts that areneeded, withoutneeding toinclude thetotal library.PolarSSL iswritten withembeddedsystems in mindand has beenported on anumber ofarchitectures,including