Encryption

Explore 51 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
The Matasano Crypto Challenges Logo

A set of 48 practical programming exercises in cryptography and application security

0
APFS FUSE Driver for Linux Logo

A read-only FUSE driver that enables Linux systems to mount and access Apple File System (APFS) volumes, including encrypted and fusion drives.

0
RsaCtfTool Logo

A utility that attempts to decrypt data from weak RSA public keys and recover private keys using multiple integer factorization algorithms.

0
ELFcrypt Logo

ELFcrypt encrypts ELF binaries with obfuscation and anti-debugging features to protect against reverse engineering.

0
Firezone Logo

An open source platform for secure remote access management with granular access control

0
xxUSBSentinel Logo

Windows anti-forensics USB monitoring tool with the ability to shutdown the computer upon detecting the unplugging of a specified USB device.

0
AWS Cloud Security Logo

AWS Cloud Security offers security services and compliance tools for securing data and applications on AWS.

0
Passpie Logo

A command-line password manager that encrypts credentials using GnuPG and stores them in YAML files with git synchronization support.

0
Themis Logo

Themis is an open-source cryptographic services library that provides high-level encryption and data protection capabilities for securing data during authentication, storage, messaging, and network exchange.

0
Nebula Logo

Nebula is a scalable overlay networking tool emphasizing performance, simplicity, and security.

0
Nuke My LUKS Logo

A network-triggered emergency tool that overwrites LUKS encryption headers with random data to prevent forced decryption in high-risk situations.

0
AWS Key Management Service Logo

A cloud-based key management service for encrypting and digitally signing data.

0
Kubespot (AWS) AWS EKS Setup for PCI-DSS, SOC2, HIPAA Logo

A Terraform module that provides a compliance-focused AWS EKS setup with security hardening for PCI-DSS, SOC2, and HIPAA requirements.

0
Image Steganography Tool Logo

Simple C++ Encryption and Steganography tool for hiding files inside images using LSB encoding.

0
Chamber Logo

Chamber is a command-line tool for managing secrets by storing them in AWS SSM Parameter Store with path-based API support for improved performance.

0
libfvde Logo

A library to access FileVault Drive Encryption (FVDE) encrypted volumes on Mac OS X systems.

0
helm-secrets Logo

A Helm plugin that decrypts encrypted value files using sops encryption and integrates with cloud secret managers for secure secrets management in Kubernetes deployments.

0
SOPS Logo

SOPS is an encrypted file editor that supports multiple formats and integrates with various key management services including AWS KMS, GCP KMS, Azure Key Vault, age, and PGP.

0
Reverse Engineering HID iClass Master Keys Logo

Exploiting a vulnerability in HID iClass system to retrieve master authentication key for cloning cards and changing reader settings.

0
libqcow Logo

A library for read-only access to QEMU Copy-On-Write (QCOW) image files, supporting multiple versions and compression formats for digital forensics analysis.

0
BlackBox Logo

Safely store secrets in version control repositories with GPG encryption support.

0
Red October Logo

Red October is a TLS-based encryption server that implements two-man rule authorization, requiring multiple users to collaborate for cryptographic operations.

0
Truehunter Logo

A portable forensic tool that detects encrypted containers like Truecrypt and Veracrypt by analyzing file headers, block cipher patterns, and entropy without external dependencies.

0
Confidant Logo

A secret management service that stores encrypted secrets in DynamoDB for secure credential and sensitive data management.

0