Encryption Software for Windows

View 60 business solutions

Browse free open source Encryption software and projects for Windows below. Use the toggles on the left to filter open source Encryption software by OS, license, language, programming language, and project status.

  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    VeraCrypt

    VeraCrypt

    Open source disk encryption with strong security for the Paranoid

    VeraCrypt is a free disk encryption software brought to you by IDRIX (https://www.idrix.fr) and based on TrueCrypt 7.1a. It adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. It also solves many vulnerabilities and security issues found in TrueCrypt. This enhanced security adds some delay ONLY to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted data. All released files are PGP signed with key ID=0x680D16DE, available on key servers and downloadable at https://www.idrix.fr/VeraCrypt/VeraCrypt_PGP_public_key.asc VeraCrypt can mount TrueCrypt volumes. It also can convert them to VeraCrypt format. Documentation: https://www.veracrypt.fr/en/Documentation.html FAQ : https://www.veracrypt.fr/en/FAQ.html
    Leader badge
    Downloads: 1,820 This Week
    Last Update:
    See Project
  • 2
    Shadowsocks for Windows

    Shadowsocks for Windows

    A secure socks5 proxy for Windows

    Shadowsocks for Windows is a free and open source, high-performance secured socks5 proxy designed to protect your internet traffic. It allows you to surf the web privately and securely, and offers a number of useful features such as HTTP proxy support, system proxy configuration, server auto switching and plugin support. Shadowsocks is incredibly fast, as it utilizes bleeding edge techniques with Asynchronous I/O and event-driven programming. It also has a flexible industry-level encryption algorithm that supports custom algorithms. Shadowsocks for Windows requires a Microsoft .NET Framework 4.7.2 or higher, as well as Microsoft Visual C++ 2015 Redistributable (x86).
    Downloads: 109 This Week
    Last Update:
    See Project
  • 3
    Advanced Onion Router
    Advanced Onion Router is a portable client for the OR network and is intended to be an improved alternative for Tor+Vidalia+Privoxy bundle for Windows users. Some of the improvements include UNICODE paths, support for HTTP and HTTPS proxy protocols on the same Socks4/Socks5 port with HTTP header filtering that generates fake identity-dependent headers every time the identity is changed (proxy chains are also supported), support for NTLM proxies, a User Interface that makes Tor's options and actions more accessible, local banlist for forbidden addresses, private identity isolation, a point-and-click process interceptor that can redirect connections from programs that don't support proxies, also giving them fake information about the local system and support for .onion addresses. Also, it can estimate AS paths for all circuits and prevent AS path intersections, it can restrict circuits to be built using only nodes from different countries, can change circuit lengths and more.
    Leader badge
    Downloads: 118 This Week
    Last Update:
    See Project
  • 4
    FreeOTFE

    FreeOTFE

    A free "on-the-fly" transparent disk encryption program for PC & PDAs.

    An upstream source site housing the original files for this mirror is no longer available. With this software, you can create one or more "virtual disks" on your PC/PDA. These disks operate exactly like a normal disk, with the exception that anything written to one of them is transparently, and securely, encrypted before being stored on your computer's hard drive.
    Downloads: 21 This Week
    Last Update:
    See Project
  • Secure User Management, Made Simple | Frontegg Icon
    Secure User Management, Made Simple | Frontegg

    Get 7,500 MAUs, 50 tenants, and 5 SSOs free – integrated into your app with just a few lines of code.

    Frontegg powers modern businesses with a user management platform that’s fast to deploy and built to scale. Embed SSO, multi-tenancy, and a customer-facing admin portal using robust SDKs and APIs – no complex setup required. Designed for the Product-Led Growth era, it simplifies setup, secures your users, and frees your team to innovate. From startups to enterprises, Frontegg delivers enterprise-grade tools at zero cost to start. Kick off today.
    Start for Free
  • 5
    WinRAR

    WinRAR

    Compress, Encrypt, Package and Backup with only one utility

    WinRAR is a powerful file archiver and compression tool that supports multiple file formats, including RAR and ZIP. It is widely used for compressing large files into smaller, more manageable sizes and decompressing files into their original format. WinRAR offers advanced features for both personal and professional use, such as file encryption, password protection, and splitting large files into smaller parts for easier storage or transfer. Its intuitive interface makes it easy for users to compress, encrypt, and share files quickly and efficiently.
    Downloads: 195 This Week
    Last Update:
    See Project
  • 6
    HackBrowserData

    HackBrowserData

    Decrypt passwords/cookies/history/bookmarks from the browser

    HackBrowserData is an open-source tool that could help you decrypt data ( password|bookmark|cookie|history|credit card|download|localStorage|extension ) from the browser. It supports the most popular browsers on the market and runs on Windows, macOS and Linux. This tool is limited to security research only, and the user assumes all legal and related responsibilities arising from its use! The author assumes no legal responsibility! Installation of HackBrowserData is dead-simple, just download the release for your system and run the binary.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 7
    Ciphey

    Ciphey

    Decrypt encryptions without knowing the key or cipher

    Fully automated decryption/decoding/cracking tool using natural language processing & artificial intelligence, along with some common sense. You don't know, you just know it's possibly encrypted. Ciphey will figure it out for you. Ciphey can solve most things in 3 seconds or less. Ciphey aims to be a tool to automate a lot of decryptions & decodings such as multiple base encodings, classical ciphers, hashes or more advanced cryptography. If you don't know much about cryptography, or you want to quickly check the ciphertext before working on it yourself, Ciphey is for you. The technical part. Ciphey uses a custom-built artificial intelligence module (AuSearch) with a Cipher Detection Interface to approximate what something is encrypted with. And then a custom-built, customizable natural language processing Language Checker Interface, which can detect when the given text becomes plaintext.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 8
    SOPS

    SOPS

    Simple and flexible tool for managing secrets

    sops is an editor of encrypted files that supports YAML, JSON, ENV, INI and BINARY formats and encrypts with AWS KMS, GCP KMS, Azure Key Vault, age, and PGP. For the adventurous, unstable features are available in the develop branch, which you can install from source. To use sops as a library, take a look at the decrypt package. We rewrote Sops in Go to solve a number of deployment issues, but the Python branch still exists under python-sops. We will keep maintaining it for a while, and you can still pip install sops, but we strongly recommend you use the Go version instead. If you're using AWS KMS, create one or multiple master keys in the IAM console and export them, comma separated, in the SOPS_KMS_ARN env variable. It is recommended to use at least two master keys in different regions. If you want to use PGP, export the fingerprints of the public keys, comma separated, in the SOPS_PGP_FP env variable.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 9
    dotNet Disk Imager

    dotNet Disk Imager

    Lightweight RAW and ZIP disk images reader and writer to USB or SD

    IMPORTANT!!! Since this is new software, your web browser, operating system or even possibly antivirus software may report security alerts against this tool. Please ignore that messages until this tool gets widely spread. This program is highly inspired by Win32 Disk Imager and sort of copies it's function. However, I've added some features, like verification of readed/writed image file and the most important is on the fly support for zipped images. Another features worth mentioning are simultaneous write to multiple devices at one time or wiping of device filesystem and partitions. I would be happy to hear your feedback and I'm ready to listen to your suggestions. Feel free to request new features, if I found them interesting I will definitely implement them. Requires .NET Framework 4.6.1 (download here: http://go.microsoft.com/fwlink/?LinkId=671729 ) Supports Windows 7 and newer. If you need older Windows support, use Win32 Disk Imager. Please write a review.
    Downloads: 20 This Week
    Last Update:
    See Project
  • Sales CRM and Pipeline Management Software | Pipedrive Icon
    Sales CRM and Pipeline Management Software | Pipedrive

    The easy and effective CRM for closing deals

    Pipedrive’s simple interface empowers salespeople to streamline workflows and unite sales tasks in one workspace. Unlock instant sales insights with Pipedrive’s visual sales pipeline and fine-tune your strategy with robust reporting features and a personalized AI Sales Assistant.
    Try it for free
  • 10
    ArcThemALL!
    It supports files and folders multi-compression (UPX, ZIP, 7Z) and archives extraction (several formats). It includes an intelligent UPX compression mode, self-extracting archive creation, encryption/decryption, external compressors and much more.
    Downloads: 26 This Week
    Last Update:
    See Project
  • 11
    A pronounceable password generator plugin for KeePass. NOTE: This project has been discontinued. It hasn't been worth it to maintain the project for a while now, so no more updates will be made to the plugin. The algorithm this plugin uses is based off FIPS-181 which was withdrawn by NIST a while back. The proliferation of password managers that seamlessly run on multiple platforms (some of which are free) has also removed almost all advantages of using randomly generated pronounceable passwords. If you have a use case for this plugin, reconsider it. If you still think using randomly generated pronounceable passwords are worth it for your use case, reconsider it some more.
    Downloads: 16 This Week
    Last Update:
    See Project
  • 12
    Ente

    Ente

    End-to-end encrypted cloud for photos, videos and 2FA secrets

    Ente is a fully open-source, end‑to‑end encrypted cloud platform designed for securely storing and managing your photos, videos, and 2FA secrets — without needing to trust the service provider. It includes cross‑platform clients and a CLI for self‑hosting needs.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13
    MemGuard

    MemGuard

    Secure software enclave for storage of sensitive information in memory

    This package attempts to reduce the likelihood of sensitive data being exposed when in memory. It aims to support all major operating systems and is written in pure Go. Sensitive data is encrypted and authenticated in memory with XSalsa20Poly1305. The scheme used also defends against cold-boot attacks. Memory allocation bypasses the language runtime by using system calls to query the kernel for resources directly. This avoids interference from the garbage collector. Buffers that store plaintext data are fortified with guard pages and canary values to detect spurious accesses and overflows. The effort is taken to prevent sensitive data from touching the disk. This includes locking memory to prevent swapping and handling core dumps. Kernel-level immutability is implemented so that attempted modification of protected regions results in an access violation.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    aws-encryption-sdk

    aws-encryption-sdk

    AWS Encryption SDK

    The AWS Encryption SDK is a client-side encryption library designed to make it easy for everyone to encrypt and decrypt data using industry standards and best practices. It enables you to focus on the core functionality of your application, rather than on how to best encrypt and decrypt your data. The AWS Encryption SDK is provided free of charge under the Apache 2.0 license. With the AWS Encryption SDK, you define a master key provider (Java and Python) or a keyring (C, C#/.NET, and JavaScript) that determines which wrapping keys you use to protect your data. Then you encrypt and decrypt your data using straightforward methods provided by the AWS Encryption SDK. The AWS Encryption SDK does the rest. Without the AWS Encryption SDK, you might spend more effort on building an encryption solution than on the core functionality of your application.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 15

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    cppcrypto provides optimized implementations of cryptographic primitives. Hash functions: BLAKE, BLAKE2, Echo, Esch, Groestl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, SHAKE, Skein, SM3, Streebog, Whirlpool. Block ciphers: Anubis, Aria, Camellia, CAST-256, Kalyna, Kuznyechik, Mars, Serpent, Simon, SM4, Speck, Threefish, Twofish, and Rijndael (AES) with all block/key sizes. Stream ciphers: HC-128, HC-256, Salsa20, XSalsa20, ChaCha, XChaCha. Encryption modes: CBC, CTR. AEAD modes: Encrypt-then-MAC (EtM), GCM, OCB, ChaCha-Poly1305, Schwaemm. Streaming AEAD. MAC functions: HMAC, Poly1305. Key derivation functions: PBKDF2, scrypt, Argon2, HKDF. Includes sample command-line tools: - 'digest' - for calculating and verifying file checksum(s) using any of the supported hash algorithms (similar to md5sum or RHash). - 'cryptor' - for file encryption using Serpent-256 algorithm in AEAD mode. Check out the cppcrypto web site linked below for programming documentation.
    Leader badge
    Downloads: 25 This Week
    Last Update:
    See Project
  • 16
    XorCryptWin

    XorCryptWin

    XOR Encryptor for Windows

    XOR encryption software for Windows. Generates random key files which it then uses to mimic the One-Time Pad encryption technique. Distributed together with RandFileGen, a program that can generate random files of any size and is extensible by plugins.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 17
    CrococryptFile

    CrococryptFile

    An encryption tool for creating file archives

    CrococryptFile is a file encryption tool which creates encrypted archives of files and folders. The encryption features of CrococryptFile can be compared to a ZIP utility that uses ZIP's AES encryption. However, there are significant differences. CrococryptFile... - encrypts all file and folder information including filenames, time/date and filesize information, - disguises any information of the archive's content, because all data and meta-data is simply integrated into a giant file dump. =Crypto Suites= For a full list of and details about supported crypto suites, please visit the CrococryptFile Homepage. Examples: - Password-based encryption (following PBKDF2) with AES-256, Twofish, Serpent, ... - Public key encryption using GPG/OpenPGP, Windows Keystore/CAPI with RSA/X.509 certificates - Cloaked (headerless) Password-based Encryption (AES-Twofish-256 cascaded) - ...
    Leader badge
    Downloads: 7 This Week
    Last Update:
    See Project
  • 18
    AxCrypt

    AxCrypt

    Simple encryption tool

    AxCrypt is a file encryption software that provides a simple, secure way to encrypt sensitive files for personal or business use. It supports 128-bit and 256-bit AES encryption, ensuring robust security for data stored on your computer or in the cloud. AxCrypt is known for its user-friendly interface, allowing users to encrypt, decrypt, and securely share files with others using just a few clicks. The software also integrates with popular cloud storage services like Google Drive and Dropbox, offering seamless protection for files across platforms. Additionally, AxCrypt provides password management, file compression, and secure file deletion features, making it a comprehensive solution for data security.
    Downloads: 31 This Week
    Last Update:
    See Project
  • 19

    ProxyCrypt

    Encrypted volumes through command line

    ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Encryption and decryption are made on the fly, allowing you to use encrypted volumes like normal ones. Designed for paranoids and advanced users, it is also fast, very lightweight, open source and easy to recompile. See the features below. It works as a "proxy" for the AIM driver or the ImDisk driver. AIM driver is included in the full package. See the documentation for more informations and an example of use: https://sourceforge.net/p/proxycrypt/doc/ Requirements: - Windows 7 or later - Arsenal Image Mounter or ImDisk Virtual Disk Driver - Administrative privileges - 64-bit CPU with SSE3 instructions - About 1 GB of RAM temporarily required for password checking with default settings Hashes of all versions: https://sourceforge.net/p/proxycrypt/doc/Hash
    Downloads: 19 This Week
    Last Update:
    See Project
  • 20
    SafeNotes - Encrypted Journaling

    SafeNotes - Encrypted Journaling

    SafeNotes - A encrypted and easy-to-use journaling application

    SafeNotes is an encrypted and user-friendly note-taking application designed to keep your personal notes and journal entries safe and organized. With SafeNotes, you can easily create, edit, and manage your notes, all while ensuring your data is protected through robust AES-256 encryption and password hashing. The app features a sleek and intuitive interface built with MaterialSkin, offering light and dark themes to suit your preferences. SafeNotes is perfect for anyone looking to keep their notes and journal entries secure and organized. Download SafeNotes today and experience the peace of mind of knowing your personal information is safe.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 21
    XOR encrypt v2.0

    XOR encrypt v2.0

    Encrypt Your Text documents with XOR encryption

    This software provides an easy graphical way to encrypt your text documents from source code , text files ,scripts even jpeg files .It is a enhanced version of my earlier project https://sourceforge.net/p/xorencrypt which used win32 GUI . This is a demonstration of working of XOR encryption which was used by Germans in World War II (http://en.wikipedia.org/wiki/Lorenz_cipher) . Besides from XOR'ing the message with password after every encryption the key changes pseudorandomly. The password you provide is hashed ( SHA256 ) and saved into the encrypted file to check if the password provided is correct.This algorithm has limitations in general more the numbers of relative characters in the password to plaintext more secure will be the encryption. XOR encrypt has a 3.5 of 5 editors rating from softpedia http://www.softpedia.com/get/Security/Encrypting/XOR-Encrypt.shtml
    Downloads: 10 This Week
    Last Update:
    See Project
  • 22
    Simple File Encryptor - for Windows

    Simple File Encryptor - for Windows

    Encrypt files and folders or create your own encrypted text files.

    Simple File Encryptor (SFE) is a small, easy to use file and folder encryption app for windows. SFE provides 256bit AES password protected secure encryption for files. - Encrypting/Decrypting Text - Create and export secure encrypted text files. - Encrypting/Decrypting files or folders - Select any file type or folder to encrypt. Opt to compress before encryption and also to remove the unencrypted file after. - New Encrypt Box - A permanent secure folder on your hard drive. Drag files in and they are instantly encrypted. SFE is a reliable and totally free (no ads or banners) file encryption solution for Windows. Check out these youtube demo's http://www.youtube.com/watch?v=pBr4e-E8pt0 http://www.youtube.com/watch?v=-W1oq-Ej3Zo&feature=youtu.be Check out the new FAQ page http://www.turnssoft.com/faq1.html Check out the feedback and reviews on the Turnssoft website: http://www.turnssoft.com/your-feedback1.html
    Leader badge
    Downloads: 9 This Week
    Last Update:
    See Project
  • 23
    Speedcrypt File Encryption

    Speedcrypt File Encryption

    A File Encryptor with many Options and Powerful Algorithms!

    Speedcrypt is a software to encrypt your data that implements some of the most powerful and secure algorithms in the world. It also uses the most sophisticated password derivation techniques, with very robust HASH Functions. Speedcrypt implements libraries such as Bouncy Castle and others among the most used in the world of cryptography! Speedcrypt is a free program for encrypt the files which helps you to manage in a secure way. The files are encrypted using the best and most Secure Encryption algorithms currently known: AES-GCM, AES RIJNDAEL, PGP, AES (String Crypto 256 Bit Key) SERPENT, CHACHA20, XCHACHA20-POLY1305. Speedcrypt is it really free, more than that: it is Open Source. You can have a look at its full source code and check whether the security features are implemented correctly.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 24

    XOR Encryptor/Decryptor

    Encrypts and decrypts files using XOR operation.

    Encrypts and decrypts files using XOR operation.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 25
    BIP39-XOR

    BIP39-XOR

    Encrypt or decrypt 12, 15, 18, 21 or 24 BIP39 codewords array ("seed")

    Encrypt or decrypt 12, 15, 18, 21 or 24 BIP39 codewords array (so-called "seed phrase") using exclusive OR (XOR)/Vernam cipher (a.k.a. One Time Pad). If not input by a user, an encryption key is automatically generated at random. Encryption with such a key preserves integrity of BIP-39 checksums of all keys (that's distinct while also compatible with SeedXOR implementation).
    Downloads: 5 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.