Showing 205 open source projects for "symmetric"

View related business solutions
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 1
    GnuPG

    GnuPG

    Complete and free implementation of the OpenPGP standard

    GnuPG (GNU Privacy Guard) is a widely used free software encryption system that implements the OpenPGP standard to provide secure communication and data protection across multiple platforms. It uses a hybrid cryptographic approach combining symmetric encryption for performance with public-key cryptography for secure key exchange and identity verification. The software allows users to encrypt files and messages, create digital signatures, and manage cryptographic keys, making it a foundational tool for privacy-focused workflows. Because it is open source and licensed under the GNU GPL, GnuPG can be freely audited, modified, and redistributed, which has contributed to its adoption in security-sensitive environments. ...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 2
    FKILL

    FKILL

    Cross-platform tool to kill processes

    To kill a port, prefix it with a colon. For example: :8080. Run without arguments to use the interactive interface. Run fkill without arguments to launch the interactive UI. Force kill processes that did not exit within the given number of milliseconds. Kill all child processes along with the parent process. (Windows only). Ignore capitalization when killing a process. Note that the case is always ignored on Windows. Suppress all error messages. For example: Process doesn't exist.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Spring Cloud Config Server

    Spring Cloud Config Server

    External configuration (server and client) for Spring Cloud

    Spring Cloud Config provides server-side and client-side support for externalized configuration in a distributed system. With the Config Server, you have a central place to manage external properties for applications across all environments. The concepts on both client and server map identically to the Spring Environment and PropertySource abstractions, so they fit very well with Spring applications but can be used with any application running in any language. As an application moves through...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    PythonCall & JuliaCall

    PythonCall & JuliaCall

    Python and Julia in harmony

    Bringing Python® and Julia together in seamless harmony. Call Python code from Julia and Julia code from Python via a symmetric interface. Simple syntax, so the Python code looks like Python and the Julia code looks like Julia. Intuitive and flexible conversions between Julia and Python: anything can be converted, you are in control. Fast non-copying conversion of numeric arrays in either direction: modify Python arrays (e.g. bytes, array. array, numpy.ndarray) from Julia or Julia arrays from Python. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 5
    HttpKernel Component

    HttpKernel Component

    A structured process for converting a Request into a Response

    The HttpKernel component provides a structured process for converting a Request into a Response by making use of the EventDispatcher component. It's flexible enough to create full-stack frameworks, micro-frameworks or advanced CMS systems like Drupal. Every HTTP web interaction begins with a request and ends with a response. Your job as a developer is to create PHP code that reads the request information (e.g. the URL) and creates and returns a response (e.g. an HTML page or JSON string)....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Hangfire

    Hangfire

    An easy way to perform background job processing

    An easy way to perform background processing in .NET and .NET Core applications. No Windows Service or separate process required. Backed by persistent storage. Open and free for commercial use. Easy to set up, easy to use. No Windows Service, no Windows Scheduler, no separate applications required. Background jobs are regular static or instance .NET methods with regular arguments, no base class or interface implementation required. Once a background job was created without any exception,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    pwd.sh

    pwd.sh

    GnuPG symmetric secrets manager using Bash

    pwd.sh is a lightweight command-line utility designed to generate strong, secure passwords using simple and reproducible methods directly from the terminal. The tool focuses on usability and security by leveraging deterministic techniques that allow users to generate complex passwords without needing to store them. It is particularly useful for users who want to avoid password reuse while maintaining memorability or reproducibility. The script is designed to be minimal and portable, making...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    SOFAJRaft

    SOFAJRaft

    A production-grade java implementation of RAFT consensus algorithm

    SOFAJRaft is a production-level, high-performance Java implementation based on the RAFT consistency algorithm that supports MULTI-RAFT-GROUP for high-load, low-latency scenarios. With SOFAJRaft you can focus on your business area. SOFAJRaft handles all RAFT-related technical challenges. SOFAJRaft is very user-friendly, which provides several examples, making it easy to understand and use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    jwx

    jwx

    Implementation of various JWx (Javascript Object Signing

    ...Supports JWE messages with multiple recipients, both compact and JSON serialization. Most operations work with either JWK or raw keys e.g. *rsa.PrivateKey, *ecdsa.PrivateKey, etc). Opinionated, but very uniform API. Everything is symmetric, and follows a standard convention. Arguments are organized as explicit required paramters and optional WithXXXX() style options.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 10
    MNN

    MNN

    MNN is a blazing fast, lightweight deep learning framework

    MNN is a highly efficient and lightweight deep learning framework. It supports inference and training of deep learning models, and has industry leading performance for inference and training on-device. At present, MNN has been integrated in more than 20 apps of Alibaba Inc, such as Taobao, Tmall, Youku, Dingtalk, Xianyu and etc., covering more than 70 usage scenarios such as live broadcast, short video capture, search recommendation, product searching by image, interactive marketing, equity...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 11
    transcrypt git

    transcrypt git

    transparently encrypt files within a git repository

    A script to configure transparent encryption of sensitive files stored in a Git repository. Files that you choose will be automatically encrypted when you commit them, and automatically decrypted when you check them out. The process will degrade gracefully, so even people without your encryption password can safely commit changes to the repository's non-encrypted files. transcrypt protects your data when it's pushed to remotes that you may not directly control (e.g., GitHub, Dropbox clones,...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    AWS Encryption SDK for Java
    The AWS Encryption SDK is a client-side encryption library designed to make it easy for everyone to encrypt and decrypt data using industry standards and best practices. It enables you to focus on the core functionality of your application, rather than on how to best encrypt and decrypt your data. The AWS Encryption SDK is provided free of charge under the Apache 2.0 license. With the AWS Encryption SDK, you define a master key provider (Java and Python) or a keyring (C, C#/.NET, and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    schur

    schur

    Interactive Program For Calculating Properties Of Symmetric Functions

    Schur is a standalone program for interactively calculating properties of Lie groups and symmetric functions. Schur has been designed to answer questions of relevance to a wide range of problems of interest to chemists, mathematicians, computer scientists,...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 14
    Multron File Guardian

    Multron File Guardian

    A File Encrypter/Decrypter With Many/Hybrid Encryption Algorithms

    Multron File Guardian provides you a strong file encryption. Supported algorithms AES Serpent Twofish ThreeFish Camellia ChaCha20 SM4 HC RSA Hybrided With Symmetric Algorithms License = AAL You can set RSA Key Length (from 2048 to 16384) You can set Password-Iteration Rate. You can also set Symmetric Algorithm Key Size If you're about to share a file securely, then you may want to use one of Hybrid algorithms. You can compress your files before encryption. Authentication provided via Encrypt-then-MAC Method if you desire. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 15

    Beampath

    Beam dynamics simulations in linear accelerators and beamlines

    BEAMPATH is a 2D and 3D code for simulation of space charge dominated beam dynamics in linear particle accelerators and beam transport. The program is used for particle-in-cell simulation of axial-symmetric, quadrupole-symmetric and z-uniform beams in a channel containing RF gaps, radio-frequency quadrupoles, multipole lenses, solenoids, bending magnets, accelerating waveguides. Detailed description of model can be found in Y.K.Batygin, “Particle-in-cell code BEAMPATH for beam dynamics simulations in linear accelerators and beamlines” Nuclear Instruments and Methods in Physics Research A 539 (2005) 455–489.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 16

    file encrypt

    File encryption and decryption utility

    The fcrypt and fdecrypt programs provide a comprehensive symmetric encryption tool kit for encrypting and decrypting files.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 17
    QuickMAN is a Mandelbrot fractal generator with multicore support. ASM-optimized code can reach over 100 billion iterations per second. Features an easy-to-use GUI, realtime pan/zoom, multiple palettes, image logging, and saving in PNG format.
    Leader badge
    Downloads: 23 This Week
    Last Update:
    See Project
  • 18
    EDGE Toolkit

    EDGE Toolkit

    Cross-platform Integrated Security Suite written in Go

    Multi-purpose cross-platform hybrid cryptography tool for symmetric and asymmetric encryption, cipher-based message authentication code (CMAC/PMAC/GMAC/VMAC), recursive hash digest, hash-based message authentication code (HMAC), HMAC-based key derivation function (HKDF), password-based key derivation function (PBKDF2/Argon2/Scrypt), password-hashing scheme (Bcrypt/Argon2/Makwa), shared key agreement (ECDH/VKO/X25519), digital signature (RSA/ECDSA/EdDSA/GOST/SPHINCS+), X.509 CSRs, CRLs and Certificates, and TCP instant server with TLS 1.3 and TLCP encryption layers for small or embedded systems.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 19
    BRL-CAD

    BRL-CAD

    Open Source Solid Modeling CAD

    BRL-CAD is a powerful cross-platform constructive solid geometry solid modeling system that includes an interactive geometry editor, ray-tracing for rendering & geometric analyses, network distributed framebuffer support, image & signal-processing tools.
    Downloads: 82 This Week
    Last Update:
    See Project
  • 20

    Encrypted Password Database

    Enterprise level password management and automation

    The Encrypted Password Database is an enterprise level application for storing authentication information and automating application password management.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21

    Aria FE

    No nonsense file encryption, Linux and Windows

    Aria FE is a symmetric, no nonsense file encryption tool with a [very] minimal graphic interface. AES, Aria, Camellia, ChaCha20, and SM4 ciphers are supported.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    BMDFM

    BMDFM

    Binary Modular DataFlow Machine (BMDFM)

    Binary Modular DataFlow Machine (BMDFM) is a software package that enables running an application in parallel on shared memory symmetric multiprocessing (SMP) computers using the multiple processors to speed up the execution of single applications. BMDFM automatically identifies and exploits parallelism due to the static and mainly dynamic scheduling of the dataflow instruction sequences derived from the formerly sequential program. The BMDFM dynamic scheduling subsystem performs a symmetric multiprocessing (SMP) emulation of a tagged-token dataflow machine to provide the transparent dataflow semantics for the applications. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    arca_enc

    Encryption engine supports AES, Aria, Camellia, SM4, and ChaCha20

    Basic symmetric encryption engine, meant to be called from a script, so be used as a command line encryption tool as well. https://codeberg.org/BloodFeastMan/arca
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Midbar Desktop App

    Midbar Desktop App

    Standalone desktop app from the Midbar project

    This repository contains the standalone desktop application from the Midbar project. The app operates entirely offline and does not require an internet connection. GitHub repository: https://github.com/Northstrix/Midbar-Desktop-App
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    FTC

    Symmetric File and Text Encryption

    FTC cascades choice of Aria-256, AES-256, Camellia-256, SM4, or ChaCha20 for file and text encryption, the keystream generation is extremely robust I don't make cute interfaces, it just works.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB