C++ Decryption Software

View 104 business solutions

Browse free open source C++ Decryption Software and projects below. Use the toggles on the left to filter open source C++ Decryption Software by OS, license, language, programming language, and project status.

  • Passwordless Authentication and Passwordless Security Icon
    Passwordless Authentication and Passwordless Security

    Identity is everything. Protect it with Duo.

    It’s no secret — passwords can be a real headache, both for the people who use them and the people who manage them. Over time, we’ve created hundreds of passwords, it’s easy to lose track of them and they’re easily compromised. Fortunately, passwordless authentication is becoming a feasible reality for many businesses. Duo can help you get there.
    Get a Free Trial
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    A simple working implementation of 64-bit DES encryption/decryption alogrithm in C++. Could act as guide to undestanding the algorithm. Its buggy so help me out :-)
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    Cypher is an encryption program that uses the AES (Rijndael) algorithm to encrypt and decrypt files. You can use Cypher to protect sensitive data from unwanted access.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    A Plugin for Pegasus Mail, supporting S/MIME Encryption, Decryption, Signing and Signature verifying. In addition, key management is provided.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    Azrar

    Azrar

    Encryption addressing long-term data secrecy

    Most of today's cryptographic standards will be broken with tomorrow's computational power. Azrar is a user-friendly tool for the encryption/decryption of single files - preferably compressed archives - addressing long-term data secrecy. Thus, Azrar provides the possibility to use webspace for secure data transfer between two communication/transfer partners (encryption only, network transfer not yet included in current version). Data in encrypted files are secret/private indefinitely. To achieve long-term data secrecy, Azrar differs from other approaches in terms of not to rely on effective computational deficiencies. It combines a one-time pad with a stream cipher method using the strong cryptographic hash function (family) Skein. Azrar fulfills business requirements for secure data transfer and supports several operating systems natively. It does not use a runtime environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    BP-Tools

    BP-Tools

    Set of useful tools for payment service development

    The BP-Tools set consist from applications supporting EFT testing, benchmarking and transaction service development. BP-Tools suite currently consists of following three components: - BP-CCALC: Cryptographic Calculator - BP-CardEdit: Thales P3 Input/Output file editor - BP-EMVT: EMV Tool - BP-HCMD: Thales HSM Commander
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Bigram Table Generator

    Bigram Table Generator

    A program to generate random reciprocal bigram tables

    A command-line program to encrypt/decrypt a message using a random reciprocal bigram table and write a bigram table to a text file. Executing the program without any command-line arguments starts bigram in message encryption/decryption mode. The program prompts for a password or passphrase and a message to encrypt/ decrypt. After the message is entered the ciphertext is displayed. Executing the program with command-line arguments causes bigram to generate a random bigram table to print to screen or save to disk depending on whether the -f filename argument was given. If the -p passphrase argument is given a specific table is generated and is repeatable each time the same passphrase is given. This program was written to supplement the Enigma Simulator by Dirk Rijmenants. http://users.telenet.be/d.rijmenants/en/enigmasim.htm Enigma message procedures: http://users.telenet.be/d.rijmenants/en/enigmaproc.htm
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Gryptonite

    Gryptonite

    Cross-platform encrypted password and file database

    A user-friendly, cross-platform utility for managing and accessing your most secret data. It stores passwords and whole files, so it can literally store any information you want to keep secret. Access your most-used passwords/URLs right out of a desktop tray icon. For advanced users, it includes a separate utility called Grypto-Transforms, which has a universal hash calculator with all the major hash functions, generic encrypt/decrypt functions and a base64/hex converter. It's not just easy to use, it's also highly secure. Security experts will be happy to know that it uses AES with CCM and has a solid security concept.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Gryptonite (formerly GPassword Manager)

    Gryptonite (formerly GPassword Manager)

    Simple but Powerful, Cross-Platform Password Management Utility

    A simple but powerful cross-platform utility for managing and accessing your most secret data. It stores passwords and whole files, so it can literally store any information you want to keep secret. Access your most-used passwords/URLs right out of a desktop tray icon. For advanced users, it includes a separate utility called Grypto-Transforms, which has a universal hash calculator with all the major hash functions, generic encrypt/decrypt functions and a base64/hex converter. Although the interface is simple and intuitive, the security is top-notch. It uses AES with CCM to secure and authenticate the data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Midbar

    Midbar

    Midbar is more than just an open source password vault!

    Midbar is more than just a password vault! It's made to significantly increase the cost of unauthorized access to its your personal data. Some tutorials: ESP32 V4.0: https://www.instructables.com/Midbar-V40/ Raspberry Pi Pico V2.0: https://www.instructables.com/Midbar-Raspberry-Pi-Pico-Version-V20/ ESP32 V5.0: https://www.instructables.com/Midbar-V50/ STM32F401CCU6 + Arduino Uno Version V1.0: https://www.instructables.com/Midbar-STM32F401CCU6-Arduino-Uno-Version/ RTL8720DN + Arduino Uno V1.0: https://www.instructables.com/Midbar-RTL8720DN-Arduino-Uno-Version/ ESP8266 V2.0: https://www.instructables.com/Midbar-ESP8266-Version-V20/ STM32F407VET6 + Arduino Uno Version V1.0: https://www.instructables.com/Midbar-STM32F407VET6-Arduino-Uno-Version/ STM32F407VET6 Version V2.0: https://www.instructables.com/Midbar-STM32F407VET6-Version-V20/ ESP32 V6.0: https://www.instructables.com/Midbar-V60/ Teensy 4.1 V3.0: https://www.instructables.com/DIY-Hardware-Data-Vault-With-Teensy-41/
    Downloads: 0 This Week
    Last Update:
    See Project
  • Comprehensive Cybersecurity to Safeguard Your Organization | SOCRadar Icon
    Comprehensive Cybersecurity to Safeguard Your Organization | SOCRadar

    See what hackers already know about your organization – and stop them from getting in.

    Protect your organization from cyber threats with SOCRadar’s cutting-edge threat intelligence. Gain 360° visibility into your digital assets, monitor the dark web, and stay ahead of hackers with real-time insights. Start for free and transform your cybersecurity today.
    Free Trial
  • 10

    NCrypted

    NCrypted - simple file encryption software with GPU support

    NCrypted is a simple file encryption software. It is implemented on top of AES 128-bit algorithm. This software was designed to be as simple as possible, so you won't find any fancy, flashy gui elements or complicated advanced options. You can also use it directly from command line. NCrypted can automatically detect and take advantage of your NVidia graphics card to speed up the file processing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    NoFault is a library written in C used to encrypt or decrypt data with XOR encryption. KNoFault, NoFault32 and CLNoFault are direct applications of the library, which is easy to use in your own programs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Rcrypto

    Rcrypto

    Encryption Tool

    Rcrypto is the encryption and decryption software for windows XP,vista and 7 to keep your data secure from unauthorized users. It uses the highly secure algorithm to encrypt every byte of the file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Open En/decryption software. Current version allows for 2 keys, 1 at 32 bytes, and 1 at 20 bytes. Supports ASCII and Binary files in a multiple-executable polylithic architecture.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Szyfrator is a GUI application for Windows XP/Vista/7. It encrypts and decrypts text messages using the public RSA algorithm. It generates two 256 bit keys: public and private and was designed to be very easy to use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    badpi-cyphering

    symetric crypto based on PI calculation.

    encryption/decryption/key generation/CRC. You may use as a library (header *.hpp files)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Encrypt-roller is a encryption/decryption package. The goal of the project is to incorporate multiple encryption schemes and mechanisms to provide security and validity for files being stored or transferred.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    file encrypt

    File encryption and decryption utility

    The fcrypt and fdecrypt programs provide a comprehensive symmetric encryption tool kit for encrypting and decrypting files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    kokla
    Simple tool for file encryption and folder content encryption with AES 256. Files can also be hashed with a SHA1 signature. A command line version is available as well as a GUI version. One other useful feature is to encrypt messages for emails.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Rijndog is an easy to use file encryption/decryption package making use of the Rijndael AES algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    a tool used to hash, encrypt & decrypt files. it is integrated into the context menu of windows explorer.
    Downloads: 5 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.