305 skills found · Page 8 of 11
vinarmani / Bfp EncryptNode.js library to encrypt and decrypt data using the Bitcoin File Protocol on Bitcoin Cash
amandesai01 / SecureDrive🔐 Encrypt/Decrypt Files on the go to keep your data secure.
wunmi-adb / UseEncryptionA custom hook to encrypt and decrypt data in your react functional component
vishakh-abhayan / EncrystorageA lightweight and secure solution for encrypting and decrypting sensitive data in the local storage of web browsers.
SRV1030 / CryptDAllows users to encrypt their texts,video, image, pr zip file. Saves their encrypted file from their local storage and allows them to decrypt it to regain the orignal file. Based on flutter/dart this app increases the overall privacy of data. Data can be ebcrypted using SALSA20, AES , or Fernet Algorithms
MrMDrX / Video Encryptor🔐 Video Encryptor is a Python application that allows users to compress, encrypt, and decrypt video files. It provides a simple and intuitive graphical interface for selecting files and applying encryption algorithms. The application is designed to enhance data security and facilitate the secure storage and transfer of video content.
haris989 / Chrome Passwords To Google FormWhen you request Google Chrome to save your password on a given website, it stores it in a "Login Data" file (sqlite database file). In order to securely store the password, the password is encrypted using user's window's credentials. This program decrypts the passwords in user's machine and then copys them to the same directory in which program is present. So if the executable version of this program is plugged into any computer running windows and Google Chrome, running this program will copy all the Chrome saved passwords into a text file. Please dont misuse this program. I will not be responsible for any destructive outcomes of this program.
rbonestell / DUKPTCoreA .NET Standard implementation of TDES DUKPT, both PIN and Data variants.
MuonRay / Quantum Encryption Of Images Using Bitwise XOR And QRNGArticle here: http://muonray.blogspot.com/2022/02/quantum-encryption-of-images-in-python.html The definition of image encryption used here is an extension of data encryption in general: using the bitwise XOR operation of the original image pixels and the random key image pixels, with the key image being either a pseudo-random stream cipher or the quantum random stream cipher or anti-correlated entangled information shared over a secure channel. In either case we Perform bitwise XOR operation on the encrypted image and the key image. It can be seen from the image encryption and decryption that they are all the same operation. According to the above bitwise XOR operation, we assume: xor(a,b)=c You can get: xor(c,b)=a Or: xor(c,a)=b In summary, we assume that a is the original image data and b is the key, then c calculated by xor(a,c) is the encrypted ciphertext. This is a simple summary of the encryption and decryption process as used in the coding in this repository. Encryption process: Perform a bitwise XOR operation on the image a and the key b to complete the encryption and obtain the ciphertext c. Decryption process: Perform a bitwise XOR operation on the ciphertext c and the key b, complete the decryption, and get the image a. We can use our quantum random numbers generator in 2 ways to create our image encryption key: (1) as a random number generator seed source (2) using the random superposition of the H and V modes We can also use the shared set of correlated images, captured using the single CCD, from our entangled photon source with Alice getting one half and Bob getting the anti-correlated half. This provides the perfect key, with the quantum images shared over a separate channel hidden from the encrypted classical images. The file exchange channel is 2 way: Alice can use Her key to encrypt the image, Bob can use His key to decrypt the image OR Bob can use His key to encrypt the image, Alice can use Her key to decrypt the image. The XOR Cipher in this use can also be extended as a component in more complex overlay network ciphers if need be however for computational efficiency it is not necessary. It is just as effectual to have 1 quantum cipher as many, so in effect the system is completely hidden, by virtue of hidden variables, and is encrypted in an information condensate.
yashpatel2911 / Data Encryption DecryptionData Encryption Decryption is aimed to provide a security layer to data so that if the data is stolen in the case then the data receiver must not be able to see the data. We used two encryption layers which are AES and RSA layer. Any file like music, video, pdf or text file can be encrypted using this program. This is a prototype of the ASE project.
isears / TelepathDecrypt TLS data with keys found in memory dumps
martinusso / OpencryptTwo-way encryption (encrypt and decrypt) data using PHP with OpenSSL
Howard20181 / Magisk Modules DisablerA module that makes it possible to disable modules without decrypting data.
interrupt21h / Twodots DecryptDecrypting "Two Dots" data storage
MyNameIsMeerkat / EncryptedYAMLA Python module that wraps the PyYAML module's functionality with the ability to encrypt/decrypt with Blowfish to provide simple data at rest protection.
shetabit / AESEncrypt and Decrypt data with AES algorithm
untsop / My Legacy CliA cli tool to decrypt MyLegacy exported data
fnando / Parsel JsEncrypt and decrypt data with a given key.
Kjuib / EncryptLaravel5Duplicate the encryption function of php Laravel v5. This will allow those php apps to decrypt this data.
foundertherapy / Django Redis SecureThis is a Django library that is used to encrypt data stored to Redis, and decrypt it when getting it.