Decryption Software

View 113 business solutions

Browse free open source Decryption software and projects below. Use the toggles on the left to filter open source Decryption software by OS, license, language, programming language, and project status.

  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 1
    Ciphey

    Ciphey

    Decrypt encryptions without knowing the key or cipher

    Fully automated decryption/decoding/cracking tool using natural language processing & artificial intelligence, along with some common sense. You don't know, you just know it's possibly encrypted. Ciphey will figure it out for you. Ciphey can solve most things in 3 seconds or less. Ciphey aims to be a tool to automate a lot of decryptions & decodings such as multiple base encodings, classical ciphers, hashes or more advanced cryptography. If you don't know much about cryptography, or you want to quickly check the ciphertext before working on it yourself, Ciphey is for you. The technical part. Ciphey uses a custom-built artificial intelligence module (AuSearch) with a Cipher Detection Interface to approximate what something is encrypted with. And then a custom-built, customizable natural language processing Language Checker Interface, which can detect when the given text becomes plaintext.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 2
    SOPS

    SOPS

    Simple and flexible tool for managing secrets

    sops is an editor of encrypted files that supports YAML, JSON, ENV, INI and BINARY formats and encrypts with AWS KMS, GCP KMS, Azure Key Vault, age, and PGP. For the adventurous, unstable features are available in the develop branch, which you can install from source. To use sops as a library, take a look at the decrypt package. We rewrote Sops in Go to solve a number of deployment issues, but the Python branch still exists under python-sops. We will keep maintaining it for a while, and you can still pip install sops, but we strongly recommend you use the Go version instead. If you're using AWS KMS, create one or multiple master keys in the IAM console and export them, comma separated, in the SOPS_KMS_ARN env variable. It is recommended to use at least two master keys in different regions. If you want to use PGP, export the fingerprints of the public keys, comma separated, in the SOPS_PGP_FP env variable.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 3
    ArcThemALL!
    It supports files and folders multi-compression (UPX, ZIP, 7Z) and archives extraction (several formats). It includes an intelligent UPX compression mode, self-extracting archive creation, encryption/decryption, external compressors and much more.
    Downloads: 31 This Week
    Last Update:
    See Project
  • 4
    dotNet Disk Imager

    dotNet Disk Imager

    Lightweight RAW and ZIP disk images reader and writer to USB or SD

    IMPORTANT!!! Since this is new software, your web browser, operating system or even possibly antivirus software may report security alerts against this tool. Please ignore that messages until this tool gets widely spread. This program is highly inspired by Win32 Disk Imager and sort of copies it's function. However, I've added some features, like verification of readed/writed image file and the most important is on the fly support for zipped images. Another features worth mentioning are simultaneous write to multiple devices at one time or wiping of device filesystem and partitions. I would be happy to hear your feedback and I'm ready to listen to your suggestions. Feel free to request new features, if I found them interesting I will definitely implement them. Requires .NET Framework 4.6.1 (download here: http://go.microsoft.com/fwlink/?LinkId=671729 ) Supports Windows 7 and newer. If you need older Windows support, use Win32 Disk Imager. Please write a review.
    Downloads: 21 This Week
    Last Update:
    See Project
  • Build apps or websites quickly on a fully managed platform Icon
    Build apps or websites quickly on a fully managed platform

    Get two million requests free per month.

    Run frontend and backend services, batch jobs, host LLMs, and queue processing workloads without the need to manage infrastructure.
    Try it for free
  • 5
    transfer.sh

    transfer.sh

    Easy and fast file sharing from the command-line

    Easy and fast file sharing from the command-line. This code contains the server with everything you need to create your own instance. Transfer.sh currently supports the s3 (Amazon S3), gdrive (Google Drive), storj (Storj) providers, and local file system (local). For easy deployment, we've created a Docker container. For the usage with a AWS S3 Bucket, you just need to specify the following options, provider, aws-access-key, aws-secret-key, bucket, and s3-region. If you specify the s3-region, you don't need to set the endpoint URL since the correct endpoint will used automatically. To use a custom non-AWS S3 provider, you need to specify the endpoint as defined from your cloud provider. In preparation you need to create an access grant (or copy it from the uplink configuration) and a bucket. To get started, login to your account and go to the Access Grant Menu and start the Wizard on the upper right.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    HackBrowserData

    HackBrowserData

    Decrypt passwords/cookies/history/bookmarks from the browser

    HackBrowserData is an open-source tool that could help you decrypt data ( password|bookmark|cookie|history|credit card|download|localStorage|extension ) from the browser. It supports the most popular browsers on the market and runs on Windows, macOS and Linux. This tool is limited to security research only, and the user assumes all legal and related responsibilities arising from its use! The author assumes no legal responsibility! Installation of HackBrowserData is dead-simple, just download the release for your system and run the binary.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    MemGuard

    MemGuard

    Secure software enclave for storage of sensitive information in memory

    This package attempts to reduce the likelihood of sensitive data being exposed when in memory. It aims to support all major operating systems and is written in pure Go. Sensitive data is encrypted and authenticated in memory with XSalsa20Poly1305. The scheme used also defends against cold-boot attacks. Memory allocation bypasses the language runtime by using system calls to query the kernel for resources directly. This avoids interference from the garbage collector. Buffers that store plaintext data are fortified with guard pages and canary values to detect spurious accesses and overflows. The effort is taken to prevent sensitive data from touching the disk. This includes locking memory to prevent swapping and handling core dumps. Kernel-level immutability is implemented so that attempted modification of protected regions results in an access violation.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    aws-encryption-sdk

    aws-encryption-sdk

    AWS Encryption SDK

    The AWS Encryption SDK is a client-side encryption library designed to make it easy for everyone to encrypt and decrypt data using industry standards and best practices. It enables you to focus on the core functionality of your application, rather than on how to best encrypt and decrypt your data. The AWS Encryption SDK is provided free of charge under the Apache 2.0 license. With the AWS Encryption SDK, you define a master key provider (Java and Python) or a keyring (C, C#/.NET, and JavaScript) that determines which wrapping keys you use to protect your data. Then you encrypt and decrypt your data using straightforward methods provided by the AWS Encryption SDK. The AWS Encryption SDK does the rest. Without the AWS Encryption SDK, you might spend more effort on building an encryption solution than on the core functionality of your application.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9

    ProxyCrypt

    Encrypted volumes through command line

    ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Encryption and decryption are made on the fly, allowing you to use encrypted volumes like normal ones. Designed for paranoids and advanced users, it is also fast, very lightweight, open source and easy to recompile. See the features below. It works as a "proxy" for the AIM driver or the ImDisk driver. AIM driver is included in the full package. See the documentation for more informations and an example of use: https://sourceforge.net/p/proxycrypt/doc/ Requirements: - Windows 7 or later - Arsenal Image Mounter or ImDisk Virtual Disk Driver - Administrative privileges - 64-bit CPU with SSE3 instructions - About 1 GB of RAM temporarily required for password checking with default settings Hashes of all versions: https://sourceforge.net/p/proxycrypt/doc/Hash
    Downloads: 18 This Week
    Last Update:
    See Project
  • Test your software product anywhere in the world Icon
    Test your software product anywhere in the world

    Get feedback from real people across 190+ countries with the devices, environments, and payment instruments you need for your perfect test.

    Global App Testing is a managed pool of freelancers used by Google, Meta, Microsoft, and other world-beating software companies.
    Try us today.
  • 10
    StrongKey CryptoEngine

    StrongKey CryptoEngine

    FIDO strong authentication, encryption, digital signature engine

    StrongKey CryptoEngine (SKCE) 2.0 is a "crypto Swiss Army knife" server to perform cryptographic functions through web services, while freeing application developers to focus on business functionality. Its modules include: - A FIDO Engine to support FIDO U2F key registrations/authentications - An encryption engine to encrypt/decrypt files using AES/TDES keys - Escrowing keys to on-premises key management system (StrongAuth KeyAppliance/SAKA) - Integration to cloud storage services (AWS S3, Azure and Eucalyptus Walrus) - A signing engine to digitally sign documents, code, etc. with FIPS 140-2 HSM support - An LDAP Engine for AD/LDAP integration for authorization decisions SKCE is battle-tested and in production at one of the largest e-commerce companies in the world, protecting more than 50M documents within the business process; see http://bit.ly/14VPYlO for the case study. Download StrongKey CryptoCabinet (SKCC) on this site to see how to use SKCE.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 11
    Cryptomni is a program which can encrypt and decrypt files using the one-time pad cipher. If a key is truly random, kept secret, and never reused, this encryption algorithm can be proven to be unbreakable.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 12

    CryptKeeper

    Encryption/Decryption Application

    Basic text file encryption & decryption. Can encrypt text files with or without formatting. CryptKeeper is the upgraded version of EnCREEPtor.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 13
    A program for encrypt/decrypt files or text inside clipboard with a password or a certificate located either in certificate storage (certmgr.msc) or in a .cer file. You just have to drag and drop files and folder to the application.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 14
    An encryption/decryption engine which can encrypt any file(text, pdf , doc, rtf , gpg , mp3 , mp4 etc..) or any data on your PC such that only you with the valid password can decrypt it.Also it will compress the file while encrypting it.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 15
    Secret File

    Secret File

    File Encryption/Decryption using password

    Secret File is a free and easy to use encryption/decryption app that can encrypt nearly any kind of file format using passwords. Files can be stored as personal or sent over the internet as confidential as the data of files are securely encrypted at the binary level itself and can be decrypted at any time and anywhere. You can also use multi-level protection for more secureness.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 16
    Speedcrypt File Encryption

    Speedcrypt File Encryption

    A File Encryptor with many Options and Powerful Algorithms!

    Speedcrypt is a software to encrypt your data that implements some of the most powerful and secure algorithms in the world. It also uses the most sophisticated password derivation techniques, with very robust HASH Functions. Speedcrypt implements libraries such as Bouncy Castle and others among the most used in the world of cryptography! Speedcrypt is a free program for encrypt the files which helps you to manage in a secure way. The files are encrypted using the best and most Secure Encryption algorithms currently known: AES-GCM, AES RIJNDAEL, PGP, AES (String Crypto 256 Bit Key) SERPENT, CHACHA20, XCHACHA20-POLY1305. Speedcrypt is it really free, more than that: it is Open Source. You can have a look at its full source code and check whether the security features are implemented correctly.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 17
    EncrypIT

    EncrypIT

    Program to quickly and easily encrypt or decrypt files or directories

    Program to quickly and easily encrypt or decrypt files or directories using Encrypting File System (EFS) as well as add and remove domain user EFS permissions to a file. There is also a button to view the info on an encrypted file as well as for backing up a users EFS PFX certificate.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    Downloads: 2 This Week
    Last Update:
    See Project
  • 19
    Crypt Tool

    Crypt Tool

    A simple password manager for Windows based on OpenSSL

    A simple password manager for Windows based on OpenSSL (included). Allow encryption, decryption of messages, passwords, files and images with AES 256 CBC algorithm. Integrated FTP(S) client. Console based commands, random password generator. Stand alone application need no installer, runable from USB sticks. Working with Windows 7-11 (OpenSSL 1.1.1s 32 Bit) Read Wiki for more details.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 20
    Ncrypt is intended to give you security in an insecure environment. If you are wanting to encrypt files, wishing to hide your activites from prying eyes, and want to "cover your tracks", Ncrypt is for you.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 21

    jCrypto

    jCryptor is a Java-based cryptographic tool used for any file type

    jCryptor is a Java-based cryptographic tool used for any kind of file. It implements the Data Encryption Standard (DES) to encrypt and decrypt files. The Graphical user interface is based on the java-swing components. It is fast and efficcient
    Downloads: 3 This Week
    Last Update:
    See Project
  • 22
    OhCrypt Encryption Tool
    OhCrypt lets you easily encrypt and decrypt files using some of the most popular algorithms, like AES, Blowfish and Serpent. With OhCrypt, you can secure your data with a password-based encryption algorithm through a clean and simple interface. It demonstrates state of the art of cryptology techniques, such as password hashing and salt. Ohcrypt also features self-extractable and self-destructive encrypted files
    Downloads: 3 This Week
    Last Update:
    See Project
  • 23
    BitShade

    BitShade

    AES Cipher, Base64 encoder, SHA calculator

    BitShade is a graphic utility to encrypt/decrypt with AES, base64 encode/decode, calculate the SHA checksum. It is cross platform, written in Java.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 24
    This project is dedicated to creating encryption programs, along with their decryption counterparts. The encryptor will encrypt any file (that I've tested) and decrypt a file.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25
    This software adds OpenSSL encryption and decryption commands to the menu that pops up when you right-click on a file or folder in Windows XP/Vista/7/8/10 (32-bit or 64-bit). To encrypt or decrypt a file or folder, just right-click on it and select the desired command.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next

Open Source Decryption Software Guide

Open source decryption software is a type of software that allows users to protect their data from unauthorized access. It provides an effective and secure way of encrypting or decrypting data so that it can be stored and transmitted securely. The open source decryption software works by converting plain text into an encrypted form, which is then reverted back to the original plain text when needed. This encryption process protects the user’s data against anyone trying to gain access without their authorization.

The primary benefit of open source decryption software is its cost-effectiveness as it does not require costly proprietary licenses or dedicated hardware for implementation. Also, because the code used to build the program is available publicly, any changes made in order to improve security or functionality can be shared with other users freely and quickly via public forums, meaning that errors are detected faster than they would be on closed sourced applications. Furthermore, being open source allows developers around the world to contribute new features and improvements more efficiently than they could on a closed sourced application where employees of a single company typically work on updates behind closed doors.

In terms of security, open source decryption programs adopt strong encryption algorithms used by professionals worldwide and often offer options for key length which allow users to select stronger levels of protection their data requires (512 bits up to 4096 bits). Open Source Encryption Software also provides increased transparency over its processes; allowing users access what has been encrypted/decrypted and how it is done through a detailed audit log – this helps identify potential vulnerabilities in advance rather than relying on third-party vendors who may have implemented weak encryption or unknown algorithms otherwise hard for auditors detect without prior knowledge about them.

Finally, Open Source Decryption Software offers customers control over their own information because no one else has access unless given permission by the owner themselves; making it ideal for those wanting full privacy from outside sources such as governments agencies looking into user behaviors online or companies monitoring web use patterns through network traffic capture systems like Deep Packet Inspection (DPI). All these features make open source decryption software attractive for businesses looking for reliable security measures at affordable prices while still keeping complete control over all aspects associated with their protected precious information.

Features Offered by Open Source Decryption Software

  • Encryption: Open source decryption software provides the ability to encrypt data so that it cannot be accessed by third parties. This is done by transforming plaintext into an unreadable code, usually using algorithms such as AES or RSA.
  • Decryption: An additional feature of open source decryption software is the ability to decrypt encrypted data so that plaintext can be accessed. This allows users to view and use the original data without any risk of it being viewed by unauthorized parties.
  • Authentication: The software also provides authentication features, which are used to verify a user's identity when attempting to access encrypted data. By preventing unauthorized access, these authentication methods ensure that only those with the correct credentials can gain access to sensitive information.
  • Key Management: Open source decryption software comes with key management tools that enable users to create and store encryption keys in a secure location (such as cloud storage). This ensures that these keys remain available even if they are lost or stolen, while still providing protection against unauthorized access.
  • Security Monitoring: Lastly, open source decryption software offers security monitoring capabilities that alert users when suspicious activities occur with their encryption keys and other related assets. By quickly detecting attempted breaches, users can take action before any serious damage is done.

Types of Open Source Decryption Software

  • Data Recovery: Software designed to recover lost, corrupted or deleted data from a variety of storage media. This includes hard drives, memory cards, flash drives and other devices.
  • Password Managers: A type of open source decryption software designed to securely store and manage multiple passwords across different systems.
  • File Crypter/Decrypter: Software that enables users to encrypt and decrypt files so that only authorized people have access to them. It can also be used for authentication purposes.
  • Encryption Tools: Applications that help protect data stored online by using strong encryption algorithms such as AES 256-bit or RSA 2048-bit. It also protects connections during web browsing activities.
  • Disk Encryptors: An open source decryption tool which secures hard drives with password protection or hardware keys – preventing unauthorized access to the disks’ data.
  • Anti-Malware Utilities: Open source software designed to detect, quarantine and remove malicious programs such as viruses, malware and spyware from computers and networks in order to prevent infections.

Advantages Provided by Open Source Decryption Software

  1. Cost-effective: Open source decryption software is generally cost-effective as it typically has no associated fees, such as those for purchasing and maintaining licences. This makes it accessible to people who are on a budget or lack the necessary funding for a commercial solution.
  2. Flexibility: Open Source solutions provide their users with greater flexibility than proprietary ones. The user can customize the code to fit their specific needs, allowing them to make changes quickly and easily. Additionally, since open source systems are not tied down by a single vendor's roadmap, they can keep pace with industry trends faster than many other decryption solutions.
  3. Streamlined Processes: Since open source solutions are developed collaboratively, they tend to be more streamlined than commercially available counterparts. This means that developers aren’t forced to reinvent the wheel when creating new projects - instead, they can use existing components that have already been tested and improved upon by others in the community. This saves time and resources which makes open source decryption software more cost efficient than alternative solutions.
  4. Scalability: Open Source software is easily scalable as well because its codebase is freely available, meaning anyone can find out more information about how each component works without having to purchase expensive licenses every time an upgrade is needed. Additionally, this scalability also positions open source decryption software as an ideal option for larger organizations that need access to robust yet economical security measures that enable agile growth over time.
  5. Security: As previously mentioned due to its collaborative nature Open Source decryption software tends towards better security practices when compared with propriety products where developers may not be familiar with all aspects of the code due to its proprietary license restrictions making it potentially vulnerable from bugs or malicious actors seeking exploits in these areas. Furthermore, since open source software is regularly vetted by multiple individuals across different backgrounds it minimizes any potential vulnerabilities earlier than most commercial counterparts thus leaving less space for attackers attempting exploit any issue discovered within the system.

Who Uses Open Source Decryption Software?

  • Technicians: Professionals such as software engineers and equipment specialists who use open source decryption software to troubleshoot or debug issues with existing computer systems.
  • Hobbyists: Non-professional users such as tech enthusiasts, students, and home users who are interested in exploring the uses of open source decryption software for their own personal projects or experiments.
  • Security Experts: Proficient users like IT professionals and hackers who utilize open source decryption software to protect networks and find vulnerabilities in computer systems.
  • Businesses: Companies that may need a secure method of protecting sensitive data from malicious actors by using open source decryption tools.
  • Developers: Programmers and developers who create applications based on the principles of open source decoding tools.
  • Cryptographers: Experienced cryptography experts who use open source decryption software to make sure that any critical communication is both secure and private.
  • Educators: Academics, professors, instructors, etc., that rely on open sources for teaching students about data encryption techniques or demonstrating methods for decoding information securely.

How Much Does Open Source Decryption Software Cost?

Open source decryption software is often available for free and is a great way to help keep your data safe. While it may not be as comprehensive as commercial products, open source software typically includes some of the basic features needed for secure decryption. Many open source projects are maintained by volunteers who dedicate their time and resources to provide quality software at no cost. Since these types of applications are usually developed in the public domain, anyone can contribute code or help improve existing functions through bug reports and feature requests. There are also numerous websites dedicated to providing open source encryption solutions that offer detailed instructions on how to install and use the programs. These sites also typically provide support forums so users can get answers from experienced developers if they run into any issues with the software itself. In addition, some online platforms even offer packages with tutorials and best practices for using various open source encryption tools to better protect your data from unauthorized access or malicious intent. Ultimately, you don't have to spend a dime to take advantage of the many benefits associated with free open-source encryption software.

What Does Open Source Decryption Software Integrate With?

Open source decryption software can integrate with many types of software. This includes the use of databases, applications for e-commerce, content management systems, and other web development frameworks. Additionally, there are several programming languages which can be used to create scripts that are compatible with open source decryption software. These include HTML/CSS (Hypertext Markup Language/Cascading Style Sheets), PHP (PHP: Hypertext Preprocessor), JavaScript, Python, and Ruby. Furthermore, there are various user interface frameworks that allow developers to create engaging graphical environments through which users can interact with websites and applications. Examples of these include jQuery UI framework, ReactJS library from Facebook Inc., and AngularJS from Google Inc. Finally, there are many libraries available which developers can utilize for creating plugins to further extend the features of open source decryption software.

Trends Related to Open Source Decryption Software

  1. Open source decryption software is becoming increasingly popular as a way of protecting data and systems from unauthorized access.This is due to the fact that open source software is free to use, meaning that organizations and individuals can take advantage of its security features without having to invest in expensive proprietary solutions.
  2. Open source decryption software is also more secure than traditional methods, as it utilizes open source code which has been reviewed by many developers and is constantly being updated with the latest security patches.
  3. Open source solutions also allow users to easily customize their security settings, allowing them to tailor the software to their specific needs.
  4. Furthermore, open source decryption software is often more reliable than proprietary solutions as it is developed by a community of developers who are constantly working to improve the product.
  5. Additionally, open source solutions are typically much easier to deploy and maintain than traditional methods, meaning that they can be implemented quickly and with minimal disruption to business operations.

Getting Started With Open Source Decryption Software

  1. Getting started with using open source decryption software is actually quite easy. First, you will need to find a reliable open source software program for your needs. Researching the features and capabilities of different programs can help you make an informed decision about which product best fits your specific requirements.
  2. Once you have identified an appropriate program, download it to your computer. Many programs are offered as free downloads from their developers’ websites. Once the software is downloaded, follow the steps outlined in the user guide or instructions provided by the development team to install and then launch the program.
  3. Next, gather any information that is required by the program itself (such as passwords or encryption keys). It’s also important to note that many open source decryption programs require users to have a basic understanding of coding or programming languages such as Python, Ruby on Rails, JavaScript, HTML5, etc., so some familiarity with these languages may be necessary before proceeding further.
  4. Once all of this information has been collected and prepared in advance (and any necessary coding knowledge acquired), simply follow along with each step within the instructions provided by the program’s developers until completion of the setup process. At this point, you should be ready to begin decrypting data from various sources according to your specific needs.

Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.