24 skills found
ManojKumarPatnaik / Major Project ListA list of practical projects that anyone can solve in any programming language (See solutions). These projects are divided into multiple categories, and each category has its own folder. To get started, simply fork this repo. CONTRIBUTING See ways of contributing to this repo. You can contribute solutions (will be published in this repo) to existing problems, add new projects, or remove existing ones. Make sure you follow all instructions properly. Solutions You can find implementations of these projects in many other languages by other users in this repo. Credits Problems are motivated by the ones shared at: Martyr2’s Mega Project List Rosetta Code Table of Contents Numbers Classic Algorithms Graph Data Structures Text Networking Classes Threading Web Files Databases Graphics and Multimedia Security Numbers Find PI to the Nth Digit - Enter a number and have the program generate PI up to that many decimal places. Keep a limit to how far the program will go. Find e to the Nth Digit - Just like the previous problem, but with e instead of PI. Enter a number and have the program generate e up to that many decimal places. Keep a limit to how far the program will go. Fibonacci Sequence - Enter a number and have the program generate the Fibonacci sequence to that number or to the Nth number. Prime Factorization - Have the user enter a number and find all Prime Factors (if there are any) and display them. Next Prime Number - Have the program find prime numbers until the user chooses to stop asking for the next one. Find Cost of Tile to Cover W x H Floor - Calculate the total cost of the tile it would take to cover a floor plan of width and height, using a cost entered by the user. Mortgage Calculator - Calculate the monthly payments of a fixed-term mortgage over given Nth terms at a given interest rate. Also, figure out how long it will take the user to pay back the loan. For added complexity, add an option for users to select the compounding interval (Monthly, Weekly, Daily, Continually). Change Return Program - The user enters a cost and then the amount of money given. The program will figure out the change and the number of quarters, dimes, nickels, pennies needed for the change. Binary to Decimal and Back Converter - Develop a converter to convert a decimal number to binary or a binary number to its decimal equivalent. Calculator - A simple calculator to do basic operators. Make it a scientific calculator for added complexity. Unit Converter (temp, currency, volume, mass, and more) - Converts various units between one another. The user enters the type of unit being entered, the type of unit they want to convert to, and then the value. The program will then make the conversion. Alarm Clock - A simple clock where it plays a sound after X number of minutes/seconds or at a particular time. Distance Between Two Cities - Calculates the distance between two cities and allows the user to specify a unit of distance. This program may require finding coordinates for the cities like latitude and longitude. Credit Card Validator - Takes in a credit card number from a common credit card vendor (Visa, MasterCard, American Express, Discoverer) and validates it to make sure that it is a valid number (look into how credit cards use a checksum). Tax Calculator - Asks the user to enter a cost and either a country or state tax. It then returns the tax plus the total cost with tax. Factorial Finder - The Factorial of a positive integer, n, is defined as the product of the sequence n, n-1, n-2, ...1, and the factorial of zero, 0, is defined as being 1. Solve this using both loops and recursion. Complex Number Algebra - Show addition, multiplication, negation, and inversion of complex numbers in separate functions. (Subtraction and division operations can be made with pairs of these operations.) Print the results for each operation tested. Happy Numbers - A happy number is defined by the following process. Starting with any positive integer, replace the number by the sum of the squares of its digits, and repeat the process until the number equals 1 (where it will stay), or it loops endlessly in a cycle which does not include 1. Those numbers for which this process ends in 1 are happy numbers, while those that do not end in 1 are unhappy numbers. Display an example of your output here. Find the first 8 happy numbers. Number Names - Show how to spell out a number in English. You can use a preexisting implementation or roll your own, but you should support inputs up to at least one million (or the maximum value of your language's default bounded integer type if that's less). Optional: Support for inputs other than positive integers (like zero, negative integers, and floating-point numbers). Coin Flip Simulation - Write some code that simulates flipping a single coin however many times the user decides. The code should record the outcomes and count the number of tails and heads. Limit Calculator - Ask the user to enter f(x) and the limit value, then return the value of the limit statement Optional: Make the calculator capable of supporting infinite limits. Fast Exponentiation - Ask the user to enter 2 integers a and b and output a^b (i.e. pow(a,b)) in O(LG n) time complexity. Classic Algorithms Collatz Conjecture - Start with a number n > 1. Find the number of steps it takes to reach one using the following process: If n is even, divide it by 2. If n is odd, multiply it by 3 and add 1. Sorting - Implement two types of sorting algorithms: Merge sort and bubble sort. Closest pair problem - The closest pair of points problem or closest pair problem is a problem of computational geometry: given n points in metric space, find a pair of points with the smallest distance between them. Sieve of Eratosthenes - The sieve of Eratosthenes is one of the most efficient ways to find all of the smaller primes (below 10 million or so). Graph Graph from links - Create a program that will create a graph or network from a series of links. Eulerian Path - Create a program that will take as an input a graph and output either an Eulerian path or an Eulerian cycle, or state that it is not possible. An Eulerian path starts at one node and traverses every edge of a graph through every node and finishes at another node. An Eulerian cycle is an eulerian Path that starts and finishes at the same node. Connected Graph - Create a program that takes a graph as an input and outputs whether every node is connected or not. Dijkstra’s Algorithm - Create a program that finds the shortest path through a graph using its edges. Minimum Spanning Tree - Create a program that takes a connected, undirected graph with weights and outputs the minimum spanning tree of the graph i.e., a subgraph that is a tree, contains all the vertices, and the sum of its weights is the least possible. Data Structures Inverted index - An Inverted Index is a data structure used to create full-text search. Given a set of text files, implement a program to create an inverted index. Also, create a user interface to do a search using that inverted index which returns a list of files that contain the query term/terms. The search index can be in memory. Text Fizz Buzz - Write a program that prints the numbers from 1 to 100. But for multiples of three print “Fizz” instead of the number and for the multiples of five print “Buzz”. For numbers which are multiples of both three and five print “FizzBuzz”. Reverse a String - Enter a string and the program will reverse it and print it out. Pig Latin - Pig Latin is a game of alterations played in the English language game. To create the Pig Latin form of an English word the initial consonant sound is transposed to the end of the word and an ay is affixed (Ex.: "banana" would yield anana-bay). Read Wikipedia for more information on rules. Count Vowels - Enter a string and the program counts the number of vowels in the text. For added complexity have it report a sum of each vowel found. Check if Palindrome - Checks if the string entered by the user is a palindrome. That is that it reads the same forwards as backward like “racecar” Count Words in a String - Counts the number of individual words in a string. For added complexity read these strings in from a text file and generate a summary. Text Editor - Notepad-style application that can open, edit, and save text documents. Optional: Add syntax highlighting and other features. RSS Feed Creator - Given a link to RSS/Atom Feed, get all posts and display them. Quote Tracker (market symbols etc) - A program that can go out and check the current value of stocks for a list of symbols entered by the user. The user can set how often the stocks are checked. For CLI, show whether the stock has moved up or down. Optional: If GUI, the program can show green up and red down arrows to show which direction the stock value has moved. Guestbook / Journal - A simple application that allows people to add comments or write journal entries. It can allow comments or not and timestamps for all entries. Could also be made into a shoutbox. Optional: Deploy it on Google App Engine or Heroku or any other PaaS (if possible, of course). Vigenere / Vernam / Ceasar Ciphers - Functions for encrypting and decrypting data messages. Then send them to a friend. Regex Query Tool - A tool that allows the user to enter a text string and then in a separate control enter a regex pattern. It will run the regular expression against the source text and return any matches or flag errors in the regular expression. Networking FTP Program - A file transfer program that can transfer files back and forth from a remote web sever. Bandwidth Monitor - A small utility program that tracks how much data you have uploaded and downloaded from the net during the course of your current online session. See if you can find out what periods of the day you use more and less and generate a report or graph that shows it. Port Scanner - Enter an IP address and a port range where the program will then attempt to find open ports on the given computer by connecting to each of them. On any successful connections mark the port as open. Mail Checker (POP3 / IMAP) - The user enters various account information include web server and IP, protocol type (POP3 or IMAP), and the application will check for email at a given interval. Country from IP Lookup - Enter an IP address and find the country that IP is registered in. Optional: Find the Ip automatically. Whois Search Tool - Enter an IP or host address and have it look it up through whois and return the results to you. Site Checker with Time Scheduling - An application that attempts to connect to a website or server every so many minute or a given time and check if it is up. If it is down, it will notify you by email or by posting a notice on the screen. Classes Product Inventory Project - Create an application that manages an inventory of products. Create a product class that has a price, id, and quantity on hand. Then create an inventory class that keeps track of various products and can sum up the inventory value. Airline / Hotel Reservation System - Create a reservation system that books airline seats or hotel rooms. It charges various rates for particular sections of the plane or hotel. For example, first class is going to cost more than a coach. Hotel rooms have penthouse suites which cost more. Keep track of when rooms will be available and can be scheduled. Company Manager - Create a hierarchy of classes - abstract class Employee and subclasses HourlyEmployee, SalariedEmployee, Manager, and Executive. Everyone's pay is calculated differently, research a bit about it. After you've established an employee hierarchy, create a Company class that allows you to manage the employees. You should be able to hire, fire, and raise employees. Bank Account Manager - Create a class called Account which will be an abstract class for three other classes called CheckingAccount, SavingsAccount, and BusinessAccount. Manage credits and debits from these accounts through an ATM-style program. Patient / Doctor Scheduler - Create a patient class and a doctor class. Have a doctor that can handle multiple patients and set up a scheduling program where a doctor can only handle 16 patients during an 8 hr workday. Recipe Creator and Manager - Create a recipe class with ingredients and put them in a recipe manager program that organizes them into categories like desserts, main courses, or by ingredients like chicken, beef, soups, pies, etc. Image Gallery - Create an image abstract class and then a class that inherits from it for each image type. Put them in a program that displays them in a gallery-style format for viewing. Shape Area and Perimeter Classes - Create an abstract class called Shape and then inherit from it other shapes like diamond, rectangle, circle, triangle, etc. Then have each class override the area and perimeter functionality to handle each shape type. Flower Shop Ordering To Go - Create a flower shop application that deals in flower objects and use those flower objects in a bouquet object which can then be sold. Keep track of the number of objects and when you may need to order more. Family Tree Creator - Create a class called Person which will have a name, when they were born, and when (and if) they died. Allow the user to create these Person classes and put them into a family tree structure. Print out the tree to the screen. Threading Create A Progress Bar for Downloads - Create a progress bar for applications that can keep track of a download in progress. The progress bar will be on a separate thread and will communicate with the main thread using delegates. Bulk Thumbnail Creator - Picture processing can take a bit of time for some transformations. Especially if the image is large. Create an image program that can take hundreds of images and converts them to a specified size in the background thread while you do other things. For added complexity, have one thread handling re-sizing, have another bulk renaming of thumbnails, etc. Web Page Scraper - Create an application that connects to a site and pulls out all links, or images, and saves them to a list. Optional: Organize the indexed content and don’t allow duplicates. Have it put the results into an easily searchable index file. Online White Board - Create an application that allows you to draw pictures, write notes and use various colors to flesh out ideas for projects. Optional: Add a feature to invite friends to collaborate on a whiteboard online. Get Atomic Time from Internet Clock - This program will get the true atomic time from an atomic time clock on the Internet. Use any one of the atomic clocks returned by a simple Google search. Fetch Current Weather - Get the current weather for a given zip/postal code. Optional: Try locating the user automatically. Scheduled Auto Login and Action - Make an application that logs into a given site on a schedule and invokes a certain action and then logs out. This can be useful for checking webmail, posting regular content, or getting info for other applications and saving it to your computer. E-Card Generator - Make a site that allows people to generate their own little e-cards and send them to other people. Do not use Flash. Use a picture library and perhaps insightful mottos or quotes. Content Management System - Create a content management system (CMS) like Joomla, Drupal, PHP Nuke, etc. Start small. Optional: Allow for the addition of modules/addons. Web Board (Forum) - Create a forum for you and your buddies to post, administer and share thoughts and ideas. CAPTCHA Maker - Ever see those images with letters numbers when you signup for a service and then ask you to enter what you see? It keeps web bots from automatically signing up and spamming. Try creating one yourself for online forms. Files Quiz Maker - Make an application that takes various questions from a file, picked randomly, and puts together a quiz for students. Each quiz can be different and then reads a key to grade the quizzes. Sort Excel/CSV File Utility - Reads a file of records, sorts them, and then writes them back to the file. Allow the user to choose various sort style and sorting based on a particular field. Create Zip File Maker - The user enters various files from different directories and the program zips them up into a zip file. Optional: Apply actual compression to the files. Start with Huffman Algorithm. PDF Generator - An application that can read in a text file, HTML file, or some other file and generates a PDF file out of it. Great for a web-based service where the user uploads the file and the program returns a PDF of the file. Optional: Deploy on GAE or Heroku if possible. Mp3 Tagger - Modify and add ID3v1 tags to MP3 files. See if you can also add in the album art into the MP3 file’s header as well as other ID3v2 tags. Code Snippet Manager - Another utility program that allows coders to put in functions, classes, or other tidbits to save for use later. Organized by the type of snippet or language the coder can quickly lookup code. Optional: For extra practice try adding syntax highlighting based on the language. Databases SQL Query Analyzer - A utility application in which a user can enter a query and have it run against a local database and look for ways to make it more efficient. Remote SQL Tool - A utility that can execute queries on remote servers from your local computer across the Internet. It should take in a remote host, user name, and password, run the query and return the results. Report Generator - Create a utility that generates a report based on some tables in a database. Generates sales reports based on the order/order details tables or sums up the day's current database activity. Event Scheduler and Calendar - Make an application that allows the user to enter a date and time of an event, event notes, and then schedule those events on a calendar. The user can then browse the calendar or search the calendar for specific events. Optional: Allow the application to create re-occurrence events that reoccur every day, week, month, year, etc. Budget Tracker - Write an application that keeps track of a household’s budget. The user can add expenses, income, and recurring costs to find out how much they are saving or losing over a period of time. Optional: Allow the user to specify a date range and see the net flow of money in and out of the house budget for that time period. TV Show Tracker - Got a favorite show you don’t want to miss? Don’t have a PVR or want to be able to find the show to then PVR it later? Make an application that can search various online TV Guide sites, locate the shows/times/channels and add them to a database application. The database/website then can send you email reminders that a show is about to start and which channel it will be on. Travel Planner System - Make a system that allows users to put together their own little travel itinerary and keep track of the airline/hotel arrangements, points of interest, budget, and schedule. Graphics and Multimedia Slide Show - Make an application that shows various pictures in a slide show format. Optional: Try adding various effects like fade in/out, star wipe, and window blinds transitions. Stream Video from Online - Try to create your own online streaming video player. Mp3 Player - A simple program for playing your favorite music files. Add features you think are missing from your favorite music player. Watermarking Application - Have some pictures you want copyright protected? Add your own logo or text lightly across the background so that no one can simply steal your graphics off your site. Make a program that will add this watermark to the picture. Optional: Use threading to process multiple images simultaneously. Turtle Graphics - This is a common project where you create a floor of 20 x 20 squares. Using various commands you tell a turtle to draw a line on the floor. You have moved forward, left or right, lift or drop the pen, etc. Do a search online for "Turtle Graphics" for more information. Optional: Allow the program to read in the list of commands from a file. GIF Creator A program that puts together multiple images (PNGs, JPGs, TIFFs) to make a smooth GIF that can be exported. Optional: Make the program convert small video files to GIFs as well. Security Caesar cipher - Implement a Caesar cipher, both encoding, and decoding. The key is an integer from 1 to 25. This cipher rotates the letters of the alphabet (A to Z). The encoding replaces each letter with the 1st to 25th next letter in the alphabet (wrapping Z to A). So key 2 encrypts "HI" to "JK", but key 20 encrypts "HI" to "BC". This simple "monoalphabetic substitution cipher" provides almost no security, because an attacker who has the encoded message can either use frequency analysis to guess the key, or just try all 25 keys.
abhir98 / RansomwareProject Summary This project was developed for the Computer Security course at my academic degree. Basically, it will encrypt your files in background using AES-256-CTR, a strong encryption algorithm, using RSA-4096 to secure the exchange with the server, optionally using the Tor SOCKS5 Proxy. The base functionality is what you see in the famous ransomware Cryptolocker. The project is composed by three parts, the server, the malware and the unlocker. The server store the victim's identification key along with the encryption key used by the malware. The malware encrypt with a RSA-4096 (RSA-OAEP-4096 + SHA256) public key any payload before send then to the server. This approach with the optional Tor Proxy and a .onion domain allow you to hide almost completely your server. Features Run in Background (or not) Encrypt files using AES-256-CTR(Counter Mode) with random IV for each file. Multithreaded. RSA-4096 to secure the client/server communication. Includes an Unlocker. Optional TOR Proxy support. Use an AES CTR Cypher with stream encryption to avoid load an entire file into memory. Walk all drives by default. Docker image for compilation. Building the binaries DON'T RUN ransomware.exe IN YOUR PERSONAL MACHINE, EXECUTE ONLY IN A TEST ENVIRONMENT! I'm not resposible if you acidentally encrypt all of your disks! First of all download the project outside your $GOPATH: git clone github.com/mauri870/ransomware cd ransomware If you have Docker skip to the next section. You need Go at least 1.11.2 with the $GOPATH/bin in your $PATH and $GOROOT pointing to your Go installation folder. For me: export GOPATH=~/gopath export PATH=$PATH:$GOPATH/bin export GOROOT=/usr/local/go Build the project require a lot of steps, like the RSA key generation, build three binaries, embed manifest files, so, let's leave make do your job: make deps make You can build the server for windows with make -e GOOS=windows. Docker ./build-docker.sh make Config Parameters You can change some of the configs during compilation. Instead of run only make, you can use the following variables: HIDDEN='-H windowsgui' # optional. If present the malware will run in background USE_TOR=true # optional. If present the malware will download the Tor proxy and use it to contact the server SERVER_HOST=mydomain.com # the domain used to connect to your server. localhost, 0.0.0.0, 127.0.0.1 works too if you run the server on the same machine as the malware SERVER_PORT=8080 # the server port, if using a domain you can set this to 80 GOOS=linux # the target os to compile the server. Eg: darwin, linux, windows Example: make -e USE_TOR=true SERVER_HOST=mydomain.com SERVER_PORT=80 GOOS=darwin The SERVER_ variables above only apply to the malware. The server has a flag --port that you can use to change the port that it will listen on. DON'T RUN ransomware.exe IN YOUR PERSONAL MACHINE, EXECUTE ONLY IN A TEST ENVIRONMENT! I'm not resposible if you acidentally encrypt all of your disks! Step by Step Demo and How it Works For this demo I'll use two machines, my personal linux machine and a windows 10 VM. For the sake of simplicity, I have a folder mapped to the VM, so I can compile from my linux and copy to the vm. In this demo we will use the Ngrok tool, this will allow us to expose our server using a domain, but you can use your own domain or ip address if you want. We are also going to enable the Tor transport, so .onion domains will work without problems. First of all lets start our external domain: ngrok http 8080 This command will give us a url like http://2af7161c.ngrok.io. Keep this command running otherwise the malware won't reach our server. Let's compile the binaries (remember to replace the domain): make -e SERVER_HOST=2af7161c.ngrok.io SERVER_PORT=80 USE_TOR=true The SERVER_PORT needs to be 80 in this case, since ngrok redirects 2af7161c.ngrok.io:80 to your local server port 8080. After build, a binary called ransomware.exe, and unlocker.exe along with a folder called server will be generated in the bin folder. The execution of ransomware.exe and unlocker.exe (even if you use a diferent GOOS variable during compilation) is locked to windows machines only. Enter the server directory from another terminal and start it: cd bin/server && ./server --port 8080 To make sure that all is working correctly, make a http request to http://2af7161c.ngrok.io: curl http://2af7161c.ngrok.io If you see a OK and some logs in the server output you are ready to go. Now move the ransomware.exe and unlocker.exe to the VM along with some dummy files to test the malware. You can take a look at cmd/common.go to see some configuration options like file extensions to match, directories to scan, skipped folders, max size to match a file among others. Then simply run the ransomware.exe and see the magic happens 😄. The window that you see can be hidden using the HIDDEN option described in the compilation section. After download, extract and start the Tor proxy, the malware waits until the tor bootstrapping is done and then proceed with the key exchange with the server. The client/server handshake takes place and the client payload, encrypted with an RSA-4096 public key must be correctly decrypted on the server. The victim identification and encryption keys are stored in a Golang embedded database called BoltDB (it also persists on disk). When completed we get into the find, match and encrypt phase, up to N-cores workers start to encrypt files matched by the patterns defined. This proccess is really quick and in seconds all of your files will be gone. The encryption key exchanged with the server was used to encrypt all of your files. Each file has a random primitive called IV, generated individually and saved as the first 16 bytes of the encrypted content. The algorithm used is AES-256-CTR, a good AES cypher with streaming mode of operation such that the file size is left intact. The only two sources of information available about what just happen are the READ_TO_DECRYPT.html and FILES_ENCRYPTED.html in the Desktop. In theory, to decrypt your files you need to send an amount of BTC to the attacker's wallet, followed by a contact sending your ID(located on the file created on desktop). If the attacker can confirm your payment it will possibly(or maybe not) return your encryption key and the unlocker.exe and you can use then to recover your files. This exchange can be accomplished in several ways and WILL NOT be implemented in this project for obvious reasons. Let's suppose you get your encryption key back. To recover the correct key point to the following url: curl -k http://2af7161c.ngrok.io/api/keys/:id Where :id is your identification stored in the file on desktop. After, run the unlocker.exe by double click and follow the instructions. That's it, got your files back 😄 The server has only two endpoints: POST api/keys/add - Used by the malware to persist new keys. Some verifications are made, like the verification of the RSA autenticity. Returns 204 (empty content) in case of success or a json error. GET api/keys/:id - Id is a 32 characters parameter, representing an Id already persisted. Returns a json containing the encryption key or a json error The end As you can see, building a functional ransomware, with some of the best existing algorithms is not difficult, anyone with some programming skills can build that in any programming language.
EvotecIT / PSPGPPSPGP is a PowerShell module that provides PGP functionality in PowerShell. It allows encrypting and decrypting files/folders and strings using PGP.
initiummedia / Unlock PdfBatch decrypt PDF in a folder
abdullah-erturk / Encryption Decryption ToolEasily encrypt and decrypt any file or folder you want in Windows environment.
tomchavakis / Encrypto.NET Core Tool to encrypt/decrypt folders or files in a directory and text
NiiightmareXD / Simple CryptA simple and high level rust library to encrypt and decrypt texts, files, folders and any data with it
Mastercoder-hacker / M.bat@echo off color 1b cls @echo off color 1b cls set /p "A=>Password:" cls if %A%==moon goto desktop1 goto password :desktop1 cls color 0a cls echo. echo Date: %date% Time: %time% echo echo 1)Write text file. echo 2)Documents... echo 3) Info echo 4) Calculator echo 5) Notepad (open in your main Windows OS) echo 6) Close Windows Basic Edition echo 7) Open Google (Quick way) echo 8) Open The Folder Containing This Package (Quick way) echo 9) randomness echo 10) matrix echo 11) Open Info (In a message box) echo 12) CreateABatch.zip echo 13) OPEN C: echo 14) open D: echo 15) open E: echo 16) open F: echo 17) open g: echo 18) OS echo 19) SITES echo 20) OPEN PASSWORD GENERATOR echo 21) OPEN WEBSITE PINGER echo 22) OPEN CMD ACCOUNT echo 23) START GAME echo 24) OPEN EXTRA SITES set /p menuselect= if %menuselect% == 1 goto write if %menuselect% == 2 goto docs if %menuselect% == 3 goto info if %menuselect% == 4 goto calc if %menuselect% == 5 goto notepad if %menuselect% == 6 goto close if %menuselect% == 7 goto google if %menuselect% == 8 goto packageinfolder if %menuselect% == 9 goto random if %menuselect% == 10 goto randomtwo if %menuselect% == 11 goto openinfoinmsgbox if %menuselect% == 12 goto batch if %menuselect% == 13 goto c if %menuselect% == 14 goto d if %menuselect% == 15 goto e if %menuselect% == 16 goto f if %menuselect% == 17 goto g if %menuselect% == 18 goto desktop2 if %menuselect% == 19 goto desktop3 if %menuselect% == 20 goto desktop4 if %menuselect% == 21 goto desktop5 if %menuselect% == 22 goto desktop6 if %menuselect% == 23 goto desktop7 if %menuselect% == 24 goto desktop8 pause :c start c: pause :d start d: pause :e start e: pause :f start f: pause :g start g: pause :write cls echo Welcome to Write, an application which let's you write text files... echo What will be the name of your text? set /p writeone= Name: cls echo Ok, your file has been created. Have fun! pause cls set /p textone= pause echo You will be going back to the desktop pause goto desktop1 :docs cls echo 1)%writeone% echo 2)%writetwo% echo 3)%writethree% set /p browse= if %browse% == 1 goto textone if %browse% == 2 goto texttwo if %browse% == 3 goto textthree :textone cls echo %writeone% echo %textone% pause goto desktop1 :Installd11 ECHO THIS FILE IS MADE BY MURDHANYA PATHAK>>Menud11.txt pause :texttwo cls echo %writetwo% echo %texttwo% pause goto desktop1 :textthree cls echo %writethree% echo %textthree% pause goto desktop1 :info echo Windows Basic Edition (Shows Coding) echo Created by MURDHANYA PATHAK pause goto desktop1 :calc cls set /p equ= set /a equ=%equ% cls echo %equ% pause goto desktop1 :notepad START /MAX C:\Windows\NOTEPAD.EXE :close close :google START CHROME www.google.com pause :bootscreentwo goto bootscreen pause :random echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% pause :randomtwo echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% pause goto desktop1 :Install echo THIS DOCUMENT's OWNER IS MURDHANYA PATHAK>>Menu.txt PAUSE :openinfoinmsgbox msg * Windows Basic Edition (Shows Coding) Created by MURDHANYA PATHAK pause :batch cls echo Welcome to Project Folder Creator. echo Will create the following folder: echo %foldername% echo If this is okay, pause cls set foldername=Project_ONE md %foldername% cd %foldername% md cache cd cache md proxies cd.. md footage cd footage md img seq cd.. md preview md projectfiles md references md renders cd renders md passes cd.. cls cd.. start %foldername% cd %foldername% echo Batch Complete! tree pause :desktop2 @echo off cls color 0a cls cls set /p "D=>Password:" cls if %D% ==pass goto desktop21 pause :desktop21 color0a cls echo. echo Date: %date% Time: %time% echo echo 1) INSTALL OS echo 2) Start OS set /p menuselect= if %menuselect% == 1 goto Installos if %menuselect% == 2 goto os2 pause :Installos @echo off color 0a title Installer :ask1 cls echo. echo Please enter the Product ID for the OS set /p "id=>" if %id%==space@123 goto ask2 goto ask1 :ask2 cls echo Please enter your Product Key set/p "id=>" if %id%==15042008 goto ask3 goto ask2 :ask3 cls echo Please enter your password which will be for the OS. set /p "PASS=>" goto Installosd21 goto Installosd22 :Installosd21 cls echo. echo Your OS will start in hindi. echo Wizard is installing your OS. echo. echo @echo off >"OS.bat" echo color 0a >>"OS.bat" echo title OS >>"OS.bat" echo :username >>"OS.bat" echo cls >>"OS.bat" echo set /p "USER=>Username:-" >>"OS.bat" echo goto password >>"OS.bat" echo cls >>"OS.bat" echo :password >>"OS.bat" echo cls >>"OS.bat" echo set /p "A=>Password:" >>"OS.bat" echo cls>>"OS.bat" echo if %A%==%PASS% goto menu >>"OS.bat" echo goto password >>"OS.bat echo cls >>"OS.bat" echo :menu >>"OS.bat" echo findstr /v "moon" Menu.txt >>"OS.bat" echo set /p "B=>" >>"OS.bat" echo if %B%==1 edit >>"OS.bat" echo if %B%==2 ipconfig pause >>"OS.bat" echo if %B%==3 exit >>"OS.bat" echo goto menu >>"OS.bat" :Installosd22 cls echo. echo Press 1 to edit >>"Menu.txt" echo Press 2 to open IP Config >>"Menu.txt" echo Press 3 to exit >> "Menu.txt" echo Your software is installed now. start OS.bat pause>nul :os2 start OS.bat pause :desktop3 @echo off cls cls set /p "E=>Password:" cls if %E% ==pass goto desktop31 pause :desktop31 color 0a cls echo 1) Main Isro site by space echo 2) MY OWN BLOG echo 3) MY ISRO BLOG echo 4) MY YOUTUBE PAGE set /p menuselect= if %menuselect% == 1 goto spacesite if %menuselect% == 2 goto myblog1 if %menuselect% == 3 goto isroblog if %menuselect% == 4 goto myyoutubepage pause :spacesite start CHROME https://www.sites.google.com/view/isro-by-murdhanya pause :myblog1 start CHROME https://www.moon1504.blogspot.com pause :isroblog start CHROME https://www.moonisro.blogspot.com pause :myyoutubepage start CHROME https://https://www.youtube.com/channel/UCZ61L4oREBQpdUT4sm7GBvQ pause :desktop4 set /p "G=>Password:" cls if %G% ==pass goto desktop41 pause :desktop41 @echo off :Start2 cls goto Start :Start title Password Generator echo I will make you a new password. echo Please write the password down somewhere in case you forget it. echo --------------------------------------------------------------- echo 1) 1 Random Password echo 2) 5 Random Passwords echo 3) 10 Random Passwords echo Input your choice set input= set /p input= Choice: if %input%==1 goto A if NOT goto Start2 if %input%==2 goto B if NOT goto Start2 if %input%==3 goto C if NOT goto Start2 :A cls echo Your password is %random% echo Now choose what you want to do. echo 1) Go back to the beginning echo 2) Exit set input= set /p input= Choice: if %input%==1 goto Start2 if NOT goto Start 2 if %input%==2 goto Exit if NOT goto Start 2 :Exit exit :B cls echo Your 5 passwords are %random%, %random%, %random%, %random%, %random%. echo Now choose what you want to do. echo 1) Go back to the beginning echo 2) Exit set input= set /p input= Choice: if %input%==1 goto Start2 if NOT goto Start 2 if %input%==2 goto Exit if NOT goto Start 2 :C cls echo Your 10 Passwords are %random%, %random%, %random%, %random%, %random%, %random%, %random%, %random%, %random%, %random% echo Now choose what you want to do. echo 1) Go back to the beginning echo 2) Exit set input= set /p input= Choice: if %input%==1 goto Start2 if NOT goto Start 2 if %input%==2 goto Exit if NOT goto Start 2 pause :desktop5 set /p "H=>Password:" cls if %H% ==pass goto desktop51 pause :desktop51 :A @echo off Title Website Pinger color 0e echo Enter the website you would like to ping set input= set /p input= Enter your Website here: if %input%==goto A if NOT B echo Processing Your request ping localhost>nul echo ------------------------------------------------------------------------------------- echo If you do not clost this in 45 seconds you will go to **ENTER WEBSITE HERE** echo ------------------------------------------------------------------------------------- ping localhost>nul echo This is the IP= ping %input% set input= set /p input= If you want to open this adress please enter the IP here: start iexplore.exe %input% set input2= set /p input2= if %input% exit goto exit ping localhost -n 45 >nul start iexplore.exe **ENTER WEBSITE HERE** pause :desktop6 set /p "I=>Password:" cls if %I% ==pass goto desktop61 pause :desktop61 @echo off :home title Log in to CMD color 07 cls echo. echo Cmd Accounts echo ============= echo. echo [1] Log In echo [2] Sign Up echo [3] Exit echo. set /p op= if %op%==1 goto 1 if %op%==2 goto 2 if %op%==3 goto 3 goto error :2 cls echo Sign Up echo ====================================== echo. set /p newname="Enter new username:" if "%newname%"=="%newname%" goto inputname :inputname cd "%userprofile%\documents" if exist "cmdacoBin" goto skip if not exist "cmdacoBin" goto noskip :noskip md "cmdacoBin" goto skip :skip cd "%userprofile%\documents\cmdacoBin" if exist "%newname%.bat" goto namexist if not exist "%newname%.bat" goto skip2 :skip2 echo set realusername=%newname%> "%newname%.bat" goto next :next echo. set /p pswd=Enter new Password: if "%pswd%"=="%pswd%" goto inputpass :inputpass cd "%userprofile%\documents\cmdacoBin" echo set password=%pswd%>> "%newname%.bat" goto next1 :namexist echo. echo The entered username already exists. echo Press any key to return. . . pause >nul goto 2 :next1 cls echo Cmd Accounts echo ============ echo. echo Your account has been successfully created! echo. pause goto home :1 color 07 cls echo Cmd Accounts Log In echo ================================ echo. Set /p logname=Username: if "%logname%"=="%logname%" goto 2.1 :2.1 echo. set /p logpass="Password:" if "%logpass%"=="%logpass%" goto login :login cd "%userprofile%\documents\cmdacoBin" if exist "%logname%.bat" goto call if not exist "%logname%.bat" goto errorlog :call call "%logname%.bat" if "%password%"=="%logpass%" goto logdone goto errorlog :errorlog color 0c echo. echo Username or Password incorrect. echo Access denied. pause >nul goto home :logdone cls echo Command Prompt echo ============== echo. echo Successfully logged in! echo. pause goto account :account cls cd "%userprofile%\documents\cmdacoBin" call "%realusername%color.bat" call "%realusername%.bat" color %colorcode% cls echo. echo ------------------------------------------------------------------------------- echo %realusername% echo ------------------------------------------------------------------------------- @echo off break off Title Command Prompt color 0a cls echo Type "home" any time to go to the current user profile directory. echo Type "desktop" any time to go to the current user desktop. echo. echo Type help to see list of common commands like cd, rd, md, del, echo ren, replace, copy, xcopy, move, attrib, tree, edit, and cls. echo Type [command]/? for detailed info. echo. pause cls :cmd echo Directory: %CD% set /P CMD=Command: if "%CMD%" == "cls" goto cls if "%CMD%" == "home" goto home2 if "%CMD%" == "desktop" goto desktop if "%CMD%" == "red" goto red if "%CMD%" == "green" goto green if "%CMD%" == "normal" goto normal %CMD% cd C:\ goto cmd :cls cls goto cmd :home2 cd /d %USERPROFILE% cls goto cmd :desktop cd /d %SystemDrive%\Users\%USERNAME%\Desktop cls goto cmd :red color 0c cls goto cmd :green color 0a cls goto cmd :normal color 07 cls goto cmd pause :desktop7 set /p "J=>Password:" cls if %J% ==pass goto desktop71 pause :desktop71 @echo off color 1a :menus cls echo -------------------------------------------Welcome To Question Game!--------------------------------------------------- ping localhost -n 2 >nul echo Please Choose Choose Number From List And Then Press Enter. ping localhost -n 2 >nul echo List: Type 1 To Play Game. Type anything To See How To Play This Game. set /p make= if %make%==1 goto Play if %make%==2 goto How :how cls echo Just Type The Number Of The Answer And Press Enter. pause goto menus :Play cls echo Enter Your Name: set /p names= echo Hi %names%! ping localhost -n 2 >nul echo Lets Start With Level 1. ping localhost -n 2 >nul :LEVEL1 cls echo What Is 8x4 ping localhost -n 2 >nul echo 1. 36 ping localhost -n 2 >nul echo 2. 35 ping localhost -n 2 >nul echo 3. 32 set /p right=So What You Choose? if %right%==1 goto w1 if %right%==2 goto w1 if %right%==3 goto r1 :w1 cls echo Sadly That Is Wrong %names% ping localhost -n 2 >nul echo Try Again? (Y/N) set /p k= if %k%==y goto LEVEL1 if %k%==n goto sure1 :r1 cls echo Countralagations! Thats Right %names%! ping localhost -n 2 >nul echo Do You Want To Go Level 2 %names%? (Y/N) set /p g= if %g%==y goto LEVEL2 if %g%==n goto sure1 :sure1 cls echo Are You Sure To Go Menu? (Y/N) echo WARNING: Game Will Start Again If You Go To Menu. echo Note: NO GAME SAVES OR LOADS!!! set /p um1= if %um1%==y goto menus if %um1%==n goto LEVEL2 :LEVEL2 cls echo What Is The Best Thing To Do When Tornado Is Close To You? ping localhost -n 2 >nul echo 1. Go To A Car And Open All Windows. ping localhost -n 2 >nul echo 2. Lie Flat As Possible. ping localhost -n 2 >nul echo 3. Climb To A Tree. set /p z= if %z%==1 goto w2 if %z%==2 goto r2 if %z%==3 goto w2 :r2 cls echo Its Right %names%! Good Job! ping localhost -n 2 >nul echo Want Play Level 3 %names%? (Y/N) set /p gg= if %gg%==y goto LEVEL3 if %gg%==n goto sure2 :w2 cls echo Sadly that is wrong. echo Try Again %names%? (Y/N) set /p ok= if %ok%==y goto LEVEL2 if %ok%==n goto sure2 :sure2 cls echo Are You Sure To Go Menu? (Y/N) echo WARNING: Game Will Start Again If You Go To Menu. echo Note: NO GAME SAVES OR LOADS!!! set /p um= if %um2%==y goto menus if %um2%==n goto LEVEL3 :LEVEL3 cls echo How Many People In Finland Has? ping localhost -n 2 >nul echo 1. Mayby Up To: 5,500,100 ping localhost -n 2 >nul echo 2. Mayby: Up To: 7,400,500 ping localhost -n 2 >nul echo 3. Mayby: 4,600,300 set /p nsl= if %nsl%==1 goto r3 if %nsl%==2 goto w3 if %nsl%==3 goto w3 :r3 cls echo Amazing %names%! ping localhost -n 2 >nul echo Want To Go Level 4? (Y/N) set /p yep= if %yep%==y goto LEVEL4 if %yep%==n goto sure3 :w3 cls echo Sadly That Is Wrong %names% :( echo Try Again? (Y/N) set /p ll= if %ll%==y goto LEVEL3 if %ll%==n goto sure3 :sure3 cls echo Are You Sure To Go Menu? (Y/N) echo WARNING: Game Will Start Again If You Go To Menu. echo Note: NO GAME SAVES OR LOADS!!! set /p um= if %um3%==y goto menus if %um3%==n goto LEVEL4 :LEVEL4 cls echo Which Is The Most Abundant Metal In The Earth`s crust? ping localhost -n 2 >nul echo 1. Aluminum ping localhost -n 2 >nul echo 2. Iron ping localhost -n 2 >nul echo 3. Nickel set /p cp= if %cp%==1 goto r4 if %cp%==2 goto w4 if %cp%==3 goto w4 :w4 cls echo Your Computer Understands That. Windows Dosent Know The Answer Too. ping localhost -n 4 >nul echo Lets Try Again! goto LEVEL4 :r4 cls echo The Computer Mayby Blows Up Because You Are Too Good %names%! ping localhost -n 4 >nul echo Press 1 To Continue. . . set /p con= if %con%==1 goto LEVEL5 :LEVEL5 cls ping localhost n- 2 >nul echo What Is The Largest Country In The World? ping localhost n- 2 >nul echo 1. Canada ping localhost -n 2 >nul echo 2. Europe ping localhost -n 2 >nul echo 3. Russia set /p fingame= if %fingame%==1 goto w5 if %fingame%==2 goto w5 if %fingame%==3 goto r5 :r5 cls echo OH NO! YOUR PC BLOWS UP SHUT DOWN!!!! YOU ARE TOO GENIUS!!!!! %names%!!!!! ping localhost -n 4 >nul echo GAME COMPLETED! ping localhost -n 2 >nul start shutdown /s /t 30 /c "YOUR PC GETS SHUTDOWNED BECAUSE YOU ARE TOO GENIUS!!!!!!!!" :w5 echo Windows: OMG! Good That You Dont Know That %names%!!! :O ping localhost -n 2 >nul echo CMD: NOPE... Try Again? (Y/N) ping localhost -n 2 >nul echo Windows: NOOOOOOOOOOOOOO!!!!!!! %names%!!!!!!!!!!!! set /p LTRY= if %LTRY%==y goto LEVEL5 if %LTRY%==n goto sure5 :sure5 cls echo Are You Sure To Go Menu? (Y/N) echo WARNING: Game Will Start Again If You Go To Menu. echo Note: NO GAME SAVES OR LOADS!!! set /p um55= if %um55%==y goto menus if %um55%==n goto LEVEL5 pause :desktop8 set /p "H=>Password:" cls if %H% ==pass goto desktop81 pause :desktop81 @echo off echo *************************************************************** echo. echo Site Selector echo. echo *************************************************************** echo. echo Key: echo [1] Google - Search Engine echo [2] Hotmail - Mail Server echo [3] Yahoo - Search Engine/Mail Server echo [4] Facebook - Social Networking echo [5] Myspace - Social Networking echo [6] CNN - News echo [7] Weather - Weather echo [8] WikiHow - A How-To Website echo [9] Instructables - A How-To Website echo [10] YouTube - Online Videos echo [11] Answers - Online Encyclopedia echo [12] Wikipedia - Online Encyclopedia echo [13] Yandex - Email echo [14] GhostMail - Email echo [15] Zoho - Email echo [16] Penzu - Online Journal echo [17] OneDrive - Online File Storage echo [18] Elgoog - Google Terminal echo [19] CodeBeautify - Encryption echo [20] InfoEncrypt - Encryption echo. echo [e] Exit echo. echo *************************************************************** echo Enter the number of the website which you would like to go to: echo. set /p udefine= echo. echo *************************************************************** if %udefine%==1 start www.google.com if %udefine%==2 start www.hotmail.com if %udefine%==3 start www.yahoo.com if %udefine%==4 start www.facebook.com if %udefine%==5 start www.myspace.com if %udefine%==6 start www.cnn.com if %udefine%==7 start www.weather.com if %udefine%==7 start www.wikihow.com if %udefine%==9 start www.instructables.com if %udefine%==10 start www.youtube.com if %udefine%==11 start www.answers.com if %udefine%==12 start www.wikipedia.com if %udefine%==13 start www.yandex.com if %udefine%==14 start www.ghostmail.com if %udefine%==15 start www.zoho.com if %udefine%==16 start www.penzu.com if %udefine%==17 start www.onedrive.com if %udefine%==18 start www.elgoog.im/terminal if %udefine%==19 start www.codebeautify.org/encrypt-decrypt if %udefine%==20 start www.infoencrypt.com if %udefine%==e goto exit cls echo *************************************************************** echo. echo Thank You for using Site Selector by Blurryface21 echo. echo *************************************************************** echo Type [e] to exit or [b] to go back and select another site. echo. set /p udefine= echo. echo *************************************************************** if %udefine%==b goto top if %udefine%==e goto exit :exit cls echo *************************************************************** echo. echo Thank You for using Site Selector by Blurryface21 echo. echo *************************************************************** pause exit
EaseFilterSDK / FolderLockerExampleWith the folder locker you can prevent your protected files being read,written,deleted, renamed, copied out of the protected folder, allow you to authorize or deny the file access to specific user or process, also allow you to hide the files or automatically encrypt/decrypt the files
moeliciouz / X509CertificateCryptorA Powershell script to encrypt and decrypt files in a folder using x509 public certificate to encrypt and private key signed certificate to decrypt files
nghiant3223 / B KryptoA web application that encrypts, decrypts files, folders with secure cryptography algorithms using Express, Node and React
opencollective / Encrypt DirScripts for encrypting and decrypting a dir of folders
FinlayTheBerry / Project VaultProject Vault is a free and open source utility for encrypting and decrypting files and folders using the AES algorithm.
DZ-Cryptology / RSA Delphi Pascal Using OpenSSL LibraryThis Delphi project use OpenSSL library for encrypt/decrypt strings , This use private key for encrypt and Public key for decrypt , Don't forget to put the libeay32.dll in the same folder with your exe file
Bangkah / AegisCrypt WebAegisCrypt Web is a modern, high-performance encryption tool built with React and the Web Crypto API. It brings desktop-grade security (AES-256-GCM) to the browser, allowing users to encrypt and decrypt files and folders locally without data ever leaving their device.
darshan-open-source / DcryptorDcryptor is a free and open-source encryption tool written in C++ using Qt and OpenSSL. It offers a wide range of algorithms and cipher modes to encrypt and decrypt strings,files and folders. It is cross-platform compatible and provides a user-friendly GUI for secure data protection.
viehgroup / Hybrid EncryptionVIEH HYBRID ENCRYPTION PROJECT The main aim of this project is to make files more secure by using hybrid encryption, and to provide integrity of data. Hybrid Encryption Include:- ∙ AES Encryption Algorithm ∙ RSA Encryption Algorithm Background working of tool 1. Creates directories and files for generated RSA and AES keys and store it. 2. For encryption takes the AES key file reads it and decrypt it using RSA private key and then encrypt the selected file using AES key and store at local system. 3. For decryption takes the AES key file reads it and decrypt it using RSA private key and then decrypts the selected file using AES key and store at local system. GUI Snapshot:- Requirements:- Step 1:- Download the tool from given Link. Step 2:-Download pip packageStep 3:- Frist install the Prerequisites Crypto Packages for Linux/Windows by using Terminal /Command Prompt. For Linux: ∙ pip install pycryptodome ∙ pip install Crypto ∙ pip install ttkthemes For Windows: ∙ pip install pycryptodome ∙ pip install cryptography ∙ pip install paramiko ∙ pip install pycryptodomex ∙ pip install ttkthemes Once Completed this steps, You have successfully installed the program and now can run it Run python setup.py in cmd/terminal Use of Tool:- For Encryption: Step 1:- Select the file first. Step 2:- Choose the option Encryption. Step 3:- The file has been encrypted in a folder in the user of C drive with extension(.enc) and you get the message accordingly. For Decryption: Step 1:- Select the file from the folder in user of C drive with extension(.enc) Step 2:- Choose the option Decryption. Step 3:- The file has decrypted in folder in user of C drive and you got the message accordingly.
H3LL0U / VaultwyrA tool to encrypt/decrypt your files/folders with a password
flawedmatrix / GocryptsftpConcurrent SFTP proxy server that decrypts remote gocryptfs folders and serves locally
MitchellThompkins / Rclone DecryptA python utility for decrypting files and folders that were encrypted with rclone.