Create and control keys used to encrypt or digitally sign your data. Centrally manage keys and define policies across integrated services and applications from a single point. Encrypt data within your applications with the AWS Encrypt.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A PHP library that provides secure data encryption capabilities using keys or passwords, designed to minimize implementation errors.
A secure file and drive wiping tool that overwrites data with randomized ASCII characters to prevent data recovery.
Steganography brute-force utility with performance issues, deprecated in favor of stegseek.
A steganographic file system in userspace for plausible deniability of files.
A versatile steganography tool with various installation options and detailed usage instructions.
Red October is a TLS-based encryption server that implements two-man rule authorization, requiring multiple users to collaborate for cryptographic operations.
TestDisk checks disk partitions and recovers lost partitions, while PhotoRec specializes in recovering lost pictures from digital camera memory or hard disks.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.