Data Protection and Cryptography

71 tools and resources

Tags in this Category

FEATURED

Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.

Reach out!

NEW

A tool for recovering files by scanning block devices and extracting them based on 'magic bytes' in file contents.

Realtime privacy monitoring service for smartphones that analyzes how apps handle private information.

A demonstration of a method to delete a locked executable or currently running file from disk.

A network-based panic button to overwrite LUKS header and shutdown the computer in emergencies, making data recovery impossible.

A cloud-based key management service for encrypting and digitally signing data.

Zui Logo

Zui

0 (0)

Zui is a desktop app for exploring and working with data, powered by Zed's 'Super-Structured Data' approach.

Simple C++ Encryption and Steganography tool for hiding files inside images using LSB encoding.

stegfs Logo

stegfs

0 (0)

A steganographic file system in userspace for plausible deniability of files.

A cloud-native, event-driven data pipeline toolkit for security teams with extensible data processing and serverless deployment.

A machine learning-based approach to detect and prevent data breaches using natural language processing and machine learning algorithms.

Discover and protect sensitive data at scale with automated data discovery and security assessment.

TestDisk checks disk partitions and recovers lost partitions, while PhotoRec specializes in recovering lost pictures from digital camera memory or hard disks.

SOPS Logo

SOPS

0 (0)

SOPS is an editor of encrypted files supporting various formats and encryption methods.

A PHP 5.x polyfill for random_bytes() and random_int() created by Paragon Initiative Enterprises.

A library for generating random numbers and strings of various strengths, useful in security contexts.

Helm plugin for cryptographically signing and verifying charts with GnuPG integration.

Hide data in images while maintaining perceptual similarity and extract it from printed and photographed images.

Manage single-tenant hardware security modules (HSMs) on AWS.

Encode or encrypt strings to various hashes and formats, including MD5, SHA1, SHA256, URL encoding, Base64, and Base85.

Red October is a software-based two-man rule style encryption and decryption server.

Securely wipe files and drives with randomized ASCII dicks.

12
3
4