Browse free open source Cryptography software and projects below. Use the toggles on the left to filter open source Cryptography software by OS, license, language, programming language, and project status.

  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 1
    CaesarCipher is a simple tool which helps you de/encrypt texts with the caesar cipher. This tool should not be used to encrypt sensitive data like passwords or personal information.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 2

    Cryptography Tools

    Classic & Modern Cryptography tools

    Cryptography Tools is a project to develop demonstration tools on classic (currently Caesar and Playfair) & modern crypto-systems, including private & public key encryptions, digital signatures, cryptographic hashes and authenticated encryption.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    A Secure, Firewall-Friendly Platform for Peer-to-Peer Networking. With a few mouse clicks, request remote access to colleagues' computer desktops, transfer files, sketch & chat, or videoconference. Automatic, authenticated & encrypted tunneling!
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    MD5-utils
    MD5-utils is a script for MD5 hash function manipulations. It can crypt one or more word(s) and try to crack one or more hash(es) using online servers.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 5
    AUM CSPRNG & Stream Cipher

    AUM CSPRNG & Stream Cipher

    A minimal CSPRNG reflecting the Zen of cipher design

    AUM is an extremely fast, small-state, cryptographically secure pseudo-random number generator and stream cipher. AUM exhibits uniform distribution, mixes rapidly, has no detected bias, and comes in three variants: AUM16, with an internal state array of 16+4 32-bit words; AUM32, with an internal state of 32+4 words; and AUM64 with a 64+4-word state. The former permit seeding with a key of up to 512 or 1024 bits, the latter with a 2048-bit key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    AceJudge is a system for managing programming contests. AceJudge's basic features include automatic judging of submitted programs, answering to clarification questions about problem descriptions, reevaluation of programs, real time ranking etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    BEDBUG CSPRNG & Stream Cipher

    BEDBUG CSPRNG & Stream Cipher

    A family of FLEA-inspired CSPRNGs and Stream Ciphers

    BEDBUG is a small, fast, cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It exhibits uniform distribution, mixes rapidly (with worst-case avalanche better than 16-bits), has no detected bias, and comes in three variants: BEDBUG128, with an internal state array of 128+3 32-bit words; BEDBUG256, with an internal state of 256+3 words; and BEDBUG512 with a 512+3-word state. The former permit seeding with a key of up to 4096 or 8192 bits, the latter with a 16384-bit key. The BEDBUG generator itself is a mere 5 lines of code: Three rotations; two pseudo-random lookups. The default BEDBUG configuration alternates the rotation constants unpredictably. These four sets of three values differ between BEDBUG128, BEDBUG256 and BEDBUG512 and were selected, tuned and tested in each case for optimal avalanche, which is never less than 16.5 bits. BEDBUG has passed stringent industry-standard tests for randomness, including NIST and DIEHARD.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    BinaryCrypt

    BinaryCrypt

    Binary Conversion Calculator

    With BinaryCrypt, you can convert between regular text, binary, hexadecimal, octal decimal and decimal. You can convert only decimal (as of right now) to any base up to base 64. You can also save your converted text to a file or open a converted text file to decrypt the message, and perform basic arithmetic in binary. The git repo for the C# code is located at: https://github.com/m1r4g3/BinaryCrypt-.Net
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Cracker-ng

    Cracker-ng

    Cracker-ng is a multiple file password finder.

    /!\ Developer(s) needed to optimize routines, multi-processing; any kind of help is accepted :)
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 10
    CryptoHelper is a Java program designed to aid in the decryption of classical ciphers, ie pre WWII ciphers. It brings together tools like frequency analysis, friedman tests, enciphering/deciphering for several clasical ciphers, and brute force algorithm
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Cryptography Workshop is a small yet powerful tool for cryptography and cryptanalysis. It's focused more on classic cryptography. It is currently in alpha and under development.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Easy-SEND is an implementation of the SEND (SEcure Neighbor Discovery) protocol for IPv6. It is aimed to be used for learning and testing purposes. SEND is described in RFC 3971. Easy-SEND includes a tool (CGAGen) to generate and verify CGAs (RFC 3972).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    This is a project that simulates the German Military Enigma machine during WWII.. It is a project for beginers to learn to program and to meet people. If anyone is interested in helping, please email me @ dustin@rockhill.org
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    FroZenLight connects simple line art and mathematics. The source of light can be positioned so that either symmetric reflection patterns or secret messages (Cryptography) are created. Example light patterns and math exercises for education are provided.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    This is a simple encryption tool to work with home-grown encryption algorithms. It can run as either a GUI, a command-line application, or a network proxy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    ISC - The ISAAC Stream Cipher

    ISC - The ISAAC Stream Cipher

    ISC lets you encrypt & decrypt text and files of any type up to 4GB

    ISAAC is a cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It was developed by Bob Jenkins from 1993-1996 and placed in the Public Domain. ISAAC is fast - especially when optimised - and portable to most architectures in nearly all programming and scripting languages. After more than 20 years of existence ISAAC has not been broken, and the little program you have here allows you to use it to encrypt and decrypt text of arbitrary length, files of any type, on a key-phrase of any complexity. ISC is a symmetric key encryption system, which means that both the sender and recipient of a message must possess the key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    JCrypTool - Eclipse based Crypto Toolkit
    JCrypTool moved to GitHub! See https://groups.google.com/d/topic/jcryptool-developers/nauEXL6vsbk/discussion for more information and visit our new project home at https://github.com/jcryptool
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    JCrypTool Plug-ins
    JCrypTool moved to GitHub! See https://groups.google.com/d/topic/jcryptool-developers/nauEXL6vsbk/discussion for more information and visit our new project home at https://github.com/jcryptool
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    MOTE CSPRNG & Stream Cipher

    MOTE CSPRNG & Stream Cipher

    A family of small-state CSPRNGs and Stream Ciphers

    MOTE is a fast, small-state, cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. MOTE exhibits uniform distribution, mixes extremely rapidly, has no detected bias, and comes in three variants: MOTE8, with an internal state array of 8+4 32-bit words; MOTE16, with an internal state of 16+4 words; and MOTE32 with a 32+4-word state. The former permit seeding with a key of up to 256 or 512 bits, the latter with a 1024-bit key. Reduced to essentials, MOTE is only 5 lines of code: Ten arithmetic and bitwise operations in all. It's called MOTE because a PRNG can't be made much smaller (or faster) without introducing bias or severely reducing avalanche. MOTE alternates its shift and rotation constants unpredictably, and has passed the most stringent industry-standard tests for randomness and security, including NIST & DIEHARD.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Mini md5 Cracker, como su nombre lo dice es un software para Windows de Crackeo de hash MD5 por Wordlist y Brute Force, escrito en C#, con GUI, sencillo, pequeño, rapido.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    ModularBipolynom

    ModularBipolynom

    Modular Polynom manipulation in Java

    XY modular Polynom manipulation in Java for calculating elliptic curves point order
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    NAC is a collection of tools for cryptography. The goal is to provide simple-to-use crypto tools (like an OTP, String and number generator, public key algorithm...) you can use under Linux, Windows...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    A Compiler from Protocol Scenarios to Interpreted Systems
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    This simple script is used to make an easy login script without the need for MySql! Perfect for admin accounts, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    PureBasic Shamir Secret Sharing

    PureBasic Shamir Secret Sharing

    Open-source PureBasic implementation of the Shamir Secret Sharing

    PureBasic Shamir Secret Sharing is an open-source, self-contained and educational implementation of the Shamir Secret Sharing Scheme, written entirely in PureBasic. Shamir Secret Sharing is a cryptographic method that splits a secret into multiple parts (shares), such that any combination of at least T shares can reconstruct the original secret, while any number of shares fewer than T reveals no usable information. This implementation operates over the finite field GF(257), allowing correct handling of all byte values (0–255) without loss, making it compatible with any type of string or binary-compatible data. Main Features Complete implementation of Shamir Secret Sharing Arithmetic over GF(257) Compatible with all character strings Robust Lagrange interpolation Safe modular inverse computation Shares encoded in hexadecimal (3 characters per byte) Clear, well-commented source code ⚠️ Disclaimer This project is intended for educational and demonstration
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB