Home > By category > Security & Privacy > Encryption Tools
Sort by : Name|Date|Downloads|Rating|

Listing of Encryption Tools in Security & Privacy

SSHA Attack is a small prog for pen testers and security engineers to use in password/small clear-text auditing of SSHA hashes. It can also be treated as a SSHA crack tool but it was written with no malicious intent in mind. Use at your own risk..

  • Platform: Linux

Easy Email Encryption Lite is for sending and receiving encrypted email messages (up to 40 KB) and is designed to be both secure and easy to use. It works with any email program including Outlook Express. It uses a symmetric key method; thus the key used for decryption is the same as the key used for encryption.

  • Platform: WinOther

Hide Folder Pro provides a quick and easy way to protect sensitive information on your computer from children, employers, and anyone else who uses your computer, including law enforcement and hackers!.

  • Publisher: Ifavor Soft
  • Date: 16-05-2012
  • Size: 1004 KB
  • Platform: WinOther

Estelar Protect A Folder is easy to use advanced security software which lets a user to protect a folder, file and removable drives using a password to restrict access from unwanted users. It's a complete solution to password protect unprotected folders that may lead to theft, data-loss, and infraction of your privacy, costing you money, data loss and embarrassment.

  • Platform: WinOther

Primary Cryption -- a data protection tool. Uses thousands of prime numbers as sources of pseudorandom digits for performing extremely strong encryption of multiple files. The key is an average ordinary file; its content is used to select the primes..

  • Platform: WinOther

iSSL is a minimalistic cryptographical API that uses the ciphers RSA and AES to establish SSL-alike, secure encryptedcommunications between two peers communicating through a network socket, including session key generation and public key exchange..

  • Platform: Linux, Mac OS X, Unix
  • f_TEA
  • License: Freeware
  • Price: 0.00
  • Rating

Flash/PHP adaptation of the XTEA encryption algorithm. Allows encryption/decryption of sensitive data using 128-bit key. May be used for network data (HTTP) or offline for implementations like secure CD-ROM projects..

  • Platform: Linux, Mac OS X, WinOther
  • pup2p
  • License: Freeware
  • Price: 0.00
  • Rating

pup2p is a remaster of the Puppy Linux livecd distro and is aimed at use with the anonymous network I2P. It includes I2P as well as a number of I2P related apps..

  • Platform: WinOther
  • DeCrypto
  • License: Freeware
  • Price: 0.00
  • Rating

In DeCrypto you will find a collection of scripts for helping decrypt messages. Eventully I am going to put these scripts together into a nice interface..

  • Platform: Linux, Mac OS X, WinOther
  • EGBShell
  • License: Freeware
  • Price: 0.00
  • Rating

EGBShell - GUI for Extreme GPU Bruteforcer, this is essentially a configurator which, after settings it runs EGB console window (you can even close the shell and EGB will continue its work). Added a few tricks, such as shutdown/standby computer after the attack, auto-launch all types of attacks, without the need to manually modify the parameter AttackMode etc.

  • Publisher: Geograph
  • Date: 16-05-2012
  • Size: 1597 KB
  • Platform: WinOther

This project tries to supply some randomness extractors' implementations written in JavaME for further use in cryptographic mobile applications..

  • Platform: WinOther

This is an experimental program that encrypt/decrypt/divide/join files. This program uses a new algorithm made by me, this algorithm is experimental and I working on it, every day this algoritm will be better..

  • Platform: Linux, Unix, WinOther
  • sha
  • License: Freeware
  • Price: 0.00
  • Rating

sha is a file hashing utility that uses the NIST's SHA-1, SHA-256, SHA-384, & SHA-512 hash algorithms. It can be used for file integrity checking, remote file comparisons, etc. The portable algorithm implementations can be useful in other projects too.

  • Publisher: saddi.com
  • Date: 14-05-2012
  • Size: 70 KB
  • Platform: Linux, Unix

The Algebraic Toy Cipher is a toy cipher for algebraic research. It is scalable in the number of bits and in the number of rounds. Works over two fields GF(2)/P, being one for the s-box invertion and the other for the mixing layer linear transformation.

  • Platform: Linux, Mac OS X, WinOther

SharedSecret is a program used to negotiate a shared secret (password) by two hosts in secure way over the Internet. The software is written in C, based on client/server architecture with initial intention to run on POSIX-Compliant Operating Systems..

  • Platform: Linux, Unix

C code to encrypt files or strings using AES 256 , AES 256 CTR or RC4 encryption methods ,the code is optimized to very fast code execution on Win32 when new AMD or Intel processors are available ,public domain.

  • Platform: WinOther
  • tkpgp
  • License: Freeware
  • Price: 0.00
  • Rating

tkpgp is a gui front-end to the Gnu Privacy Guard PGP implementation. It provides a selection-based channel that enables simple and convenient integration with other applications..

  • Platform: Linux, Unix
  • SicHer
  • License: Freeware
  • Price: 0.00
  • Rating

SicHer is an encryption client that will allow secure chat across the internet using AES and a Diffe-Hellman key exchange..

  • Platform: Linux, Mac OS X, WinOther

LockLizard SWF Flash security player software with DRM controls. View SWF files protected with Lizard Flashguard Flash Security. Note that publishers of secure SWF files may have implemented DRM controls to stop copying, stop printing, stop decompiling, and expire content to protect copyright and prevent intellectual property theft.

  • Platform: WinOther
  • otpenc
  • License: Freeware
  • Price: 0.00
  • Rating

otpenc is a console application that facilitates the use of OTP (One-Time Pad) encryption with a unix pipe or as a stand alone utility..

  • Platform: Linux, Unix

Thumbnail steganography creates a thumbnail from a source image and stores data in it by altering it's color channels. To decipher the data, a new thumbnail is made from the original image and the differences between the pixels are calculated..

  • Platform: Linux, Mac OS X, WinOther

The MD5Revolution is a small tool to calculate the MD5 checksum of entered strings. More features and additionally information about the tool, can be found under: http://md5r.x303.cc/.

  • Platform: WinOther

Peer-to-Peer direct communication services.

  • Platform: Linux, Mac OS X, WinOther

Power Hasher is a program that allow you to get the hash code of multiple files at once, and export the results to a file, making easy for this file to be imported and the files checked. Currently it supports MD5, SHA1, SHA256, SHA384 and SHA512..

  • Platform: Linux, WinOther
  • MTCrypt
  • License: Freeware
  • Price: 0.00
  • Rating

MTCrypt is a simple and efficient front end for mounting/dismounting TrueCrypt volumes. While it does have all the extensive features of the UI that comes with TrueCrypt it is intended to be much more nimble then the large GUI in TrueCrypt , especially for new and casual users of disk encryption.

  • Platform: WinOther

Mime Tool is a simple interactive application designed to help you encode / decode texts and files via MIME Base64 encoding..

  • Platform: WinOther

CryptoHawk can calculate hashes (md2,md4,md5,sha-1,sha-256 and hmac). It can also perform cryptanalysis like frequency analysis for substutition cipher and exhaustive key search for rotation cipher, as well as searching internet databases for md5 hashes.

  • Platform: Linux, Unix, WinOther
  • CryptoPy
  • License: Freeware
  • Price: 0.00
  • Rating

CryptoPy is a pure python implmentation of cryptographic algorithms and applications. The algorithms are developed for readability more than speed. The collection now includes IEEE 802.11i specific algorithms that generated the test vectors for 802.11i.

  • Platform: Linux, Mac OS X, Unix, WinOther

An Open-Source GUI for encryption of several filetypes using various algorithms..

  • Platform: WinOther

Tool for security and forensic professionals that eases collecting digital evidence like Internet chats, browsing or Outlook/Outlook Express emailing history from a computer. All major Messengers and Browsers supported. Analyzed information persisted in the database.

  • Publisher: Belkasoft
  • Date: 11-05-2012
  • Size: 11715 KB
  • Platform: WinOther

New Downloads

Smart Defrag

Smart Defrag 6 guarantees you
maximum Hard Drive performance
& highest data access
speed.

PDF Editor Mac

PDF Editor Mac is a OS X free
application that allows users
to add text, insert images,
put watermarks to label their
...

EtherSensor PCAP Edition

EtherSensor is a
high-performance (over 20Gbps+
links) platform for extracting
events and messages from
network traffic ...

SSuite Penumbra Editor

SSuite Penumbra is a full
featured word editor that
creates rich text documents to
make writing documents more
...

Print Conductor

Print Conductor is batch
printing software. It prints
multiple PDF files, plain
texts, Microsoft Office and
OpenOffice ...

Q-Eye Portable QVD/QVX
files Editor

Portable Freeware QlikView
QVD/QVX files editor

Debut Free Screen Capture
Software

Debut Screen Capture Software
Free for Windows allows you to
capture video from your PC.
Debut Free can record video
from ...

Efficient Diary

Efficient Diary is a
completely free while still
cross-platform and powerful
electronic diary software
package. The ...

Miraplacid Text Driver SDK

Generates virtual printer
driver to extract text from
printable documents, then save
it to file or upload to a
server. ...

My SCUBA Diary for Linux

My SCUBA Diary is a free,
lightweight logbook to manage
your dives. Designed to
minimize distractions and only
include ...