Showing 76 open source projects for "encryption"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • 1
    age

    age

    A simple, modern and secure encryption tool (and Go library)

    ...The project is well-suited for personal data encryption, backup use-cases, scripting encryption workflows, and embedding encryption in tools. Because of its design philosophy, it avoids the bloat of many older encryption utilities while maintaining strong cryptographic hygiene. It’s especially useful for developers or system administrators who want to adopt encryption without learning a multitude of options.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    kcptun

    kcptun

    A stable and secure tunnel based on KCP with N:M multiplexing and FEC

    kcptun is a stable and secure tunnel based on KCP with N:M multiplexing and FEC. Available for ARM, MIPS, 386 and AMD64. kcptun is shipped with builtin packet encryption powered by various block encryption algorithms and works in Cipher Feedback Mode, for each packet to be sent, the encryption process will start from encrypting a nonce from the system entropy, so encryption to same plaintexts never leads to a same ciphertexts thereafter. kcptun made use of ReedSolomon-Codes to recover lost packets, which requires massive amount of computation, a low-end ARM device cannot satisfy kcptun well. ...
    Downloads: 44 This Week
    Last Update:
    See Project
  • 3
    HackBrowserData

    HackBrowserData

    Decrypt passwords/cookies/history/bookmarks from the browser

    HackBrowserData is an open-source tool that could help you decrypt data ( password|bookmark|cookie|history|credit card|download|localStorage|extension ) from the browser. It supports the most popular browsers on the market and runs on Windows, macOS and Linux. This tool is limited to security research only, and the user assumes all legal and related responsibilities arising from its use! The author assumes no legal responsibility! Installation of HackBrowserData is dead-simple, just download...
    Downloads: 57 This Week
    Last Update:
    See Project
  • 4
    Vault

    Vault

    Tool for secrets management and encryption as a service

    Manage secrets and protect sensitive data. Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. The shift from static, on-premise infrastructure to dynamic, multi-provider infrastructure changes the approach to security. Security in static infrastructure relies on dedicated servers, static IP addresses, and a clear network perimeter. Security in dynamic infrastructure is defined by ephemeral applications and servers, trusted sources of user and application identity, and software-based encryption. ...
    Downloads: 11 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 5
    Keybase client

    Keybase client

    Keybase Go library, client, service, OS X, iOS, Android, Electron

    ...You can connect with communities from Twitter, Reddit, and elsewhere. Don’t live dangerously when it comes to documents. Keybase can store your group’s photos, videos, and documents with end-to-end encryption. You can set a timer on your most sensitive messages. This distribution includes cryptographic software. The country in which you currently reside may have restrictions on the import, possession, use, and/or re-export to another country, of encryption software. BEFORE using any encryption software, please check your country's laws, regulations and policies concerning the import, possession, or use, and re-export of encryption software.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6
    SOPS

    SOPS

    Simple and flexible tool for managing secrets

    sops is an editor of encrypted files that supports YAML, JSON, ENV, INI and BINARY formats and encrypts with AWS KMS, GCP KMS, Azure Key Vault, age, and PGP. For the adventurous, unstable features are available in the develop branch, which you can install from source. To use sops as a library, take a look at the decrypt package. We rewrote Sops in Go to solve a number of deployment issues, but the Python branch still exists under python-sops. We will keep maintaining it for a while, and you...
    Downloads: 18 This Week
    Last Update:
    See Project
  • 7
    MemGuard

    MemGuard

    Secure software enclave for storage of sensitive information in memory

    This package attempts to reduce the likelihood of sensitive data being exposed when in memory. It aims to support all major operating systems and is written in pure Go. Sensitive data is encrypted and authenticated in memory with XSalsa20Poly1305. The scheme used also defends against cold-boot attacks. Memory allocation bypasses the language runtime by using system calls to query the kernel for resources directly. This avoids interference from the garbage collector. Buffers that store...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 8
    Syncthing

    Syncthing

    Open Source Continuous File Synchronization

    ...Syncthing is designed to first and foremost keep users’ data safe and protected against data loss and against attackers who would unlawfully try and access this data. It doesn’t store data anywhere else except on your computers and uses encryption to secure all your data. It is very easy to use, cross-platform and automatic. As such, it is very user-friendly and ideal for all users looking for a secure and easy-to-use file synchronization solution. Syncthing supports file versioning, relaying, ignoring files and many more. Different configurations offer different options to suit users’ specific requirements.
    Downloads: 89 This Week
    Last Update:
    See Project
  • 9
    GopenPGP V3

    GopenPGP V3

    A high-level OpenPGP library

    GopenPGP V3 is a high-level OpenPGP cryptographic library developed by ProtonMail that provides a user-friendly API for common encryption and signing operations in Go, abstracting the complexity of the underlying OpenPGP standards and golang crypto primitives. This library lets developers perform key generation, message encryption and decryption, digital signing, and signature verification with straightforward functions that hide much of the boilerplate and nuance typically required when working directly with OpenPGP implementations. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8 Monitoring Tools in One APM. Install in 5 Minutes. Icon
    8 Monitoring Tools in One APM. Install in 5 Minutes.

    Errors, performance, logs, uptime, hosts, anomalies, dashboards, and check-ins. One interface.

    AppSignal works out of the box for Ruby, Elixir, Node.js, Python, and more. 30-day free trial, no credit card required.
    Start Free
  • 10
    gost

    gost

    GO Simple Tunnel, a simple tunnel written in golang

    ...Listening on multiple ports, multi-level forward proxies - proxy chain, standard HTTP/HTTPS/HTTP2/SOCKS4(A)/SOCKS5 proxy protocols support. Probing resistance support for web proxy, TLS encryption via negotiation support for SOCKS5 proxy. Support multiple tunnel types, tunnel UDP over TCP. Local/remote TCP/UDP port forwarding, TCP/UDP Transparent proxy, Shadowsocks Protocol (TCP/UDP), and SNI Proxy. Permission control, load balancing, route control, DNS resolver and proxy, and TUN/TAP Device. In GOST, GOST and other proxy services are considered as proxy nodes, GOST can handle the requests itself, or forward the requests to any one or more proxy nodes. ...
    Downloads: 93 This Week
    Last Update:
    See Project
  • 11
    chezmoi

    chezmoi

    Manage your dotfiles across multiple diverse machines, securely

    Manage your dotfiles across multiple diverse machines, securely. chezmoi helps you manage your personal configuration files (dotfiles, like ~/.gitconfig) across multiple machines. chezmoi provides many features beyond symlinking or using a bare git repo including templates (to handle small differences between machines), password manager support (to store your secrets securely), importing files from archives (great for shell and editor plugins), full file encryption (using gpg or age), and running scripts (to handle everything else). chezmoi is helpful if you have spent time customizing the tools you use (e.g. shells, editors, and version control systems) and want to keep machines running different accounts (e.g. home and work) and/or different operating systems (e.g. Linux, macOS, and Windows) in sync, while still being able to easily cope with differences from machine to machine.
    Downloads: 126 This Week
    Last Update:
    See Project
  • 12
    nebula

    nebula

    Overlay networking tool with a focus on performance and simplicity

    ...It can be used to connect a small number of computers, but is also able to connect tens of thousands of computers. Nebula incorporates a number of existing concepts like encryption, security groups, certificates, and tunneling, and each of those individual pieces existed before Nebula in various forms. What makes Nebula different to existing offerings is that it brings all of these ideas together, resulting in a sum that is greater than its individual parts. Nebula is a mutually authenticated peer-to-peer software defined network based on the Noise Protocol Framework. ...
    Downloads: 40 This Week
    Last Update:
    See Project
  • 13
    croc

    croc

    Easily and securely send things from one computer to another

    Yet another way to transfer files that strikes a good balance between speed, security or simplicity by using relay-assisted peer-to-peer transactions and end-to-end encryption via password-authenticated key exchange. There are a lot of ways to transfer files. Above the basic necessity of preserving the data during the transfer, sharing data should be fast, secure, and most of all, easy. Most file transfer utilities I’ve used encompass two thirds of these qualities. I’ve wanted to make a utility that encompasses all three, without compromising any one of them. ...
    Downloads: 39 This Week
    Last Update:
    See Project
  • 14
    Berglas

    Berglas

    A tool for managing secrets on Google Cloud

    ...It is built to store and retrieve secrets securely by encrypting them with Cloud KMS and storing them in Cloud Storage, while also providing an interoperable layer for Secret Manager. The project serves two related purposes: as a CLI, it automates secret encryption, decryption, and storage workflows, and as a library, it helps inject secrets into supported Google Cloud runtimes. This makes it useful for teams that want a more programmable and cloud-native approach to secret distribution without hardcoding sensitive values into applications or deployment pipelines. Because it is written in Go and distributed in multiple ways, including binaries, Docker, Homebrew, and source installation, it fits a variety of developer environments and operational setups.
    Downloads: 24 This Week
    Last Update:
    See Project
  • 15
    Weron

    Weron

    Overlay networks based on WebRTC.

    Weron is a peer-to-peer overlay network built using WebRTC and WebSockets, enabling remote access and tunneling between machines behind NATs without the need for centralized servers. It uses Golang on the backend and supports secure connections using WireGuard-compatible encryption. Weron allows developers to create scalable mesh or point-to-point networks for applications like remote desktop, Kubernetes access, or collaborative tools—all without requiring public IPs or complicated port forwarding.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 16
    Project X

    Project X

    Originates from XTLS protocol, providing a set of network tools

    ...It is written primarily in Go and is optimized for high performance, making it suitable for both personal and large-scale deployments. Project X also integrates advanced features like REALITY and XTLS, which enhance encryption and disguise traffic to improve privacy and resistance to detection. The platform is highly modular, allowing developers to customize routing rules, transport layers, and proxy behaviors through configuration files or integrations.
    Downloads: 45 This Week
    Last Update:
    See Project
  • 17
    S5CMD

    S5CMD

    Parallel S3 and local filesystem execution tool

    ...There are already other utilities to work with S3 and similar object storage services, thus it is natural to wonder what s5cmd has to offer that others don't. s5cmd supports wide range of object management tasks both for cloud storage services and local filesystems. List buckets and objects. Upload, download or delete objects. Move, copy or rename objects. Set Server Side Encryption using AWS Key Management Service (KMS). Set Access Control List (ACL) for objects/files on the upload, copy, move. Print object contents to stdout. Select JSON records from objects using SQL expressions. Create or remove buckets. Summarize objects sizes, grouping by storage class. Wildcard support for all operations.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 18
    Cloud SQL Auth Proxy

    Cloud SQL Auth Proxy

    A utility for connecting securely to your Cloud SQL instances

    ...The proxy runs locally or alongside applications, exposing a local TCP port or Unix socket that applications can use as if they were connecting to a standard database. This abstraction simplifies development and deployment by allowing developers to use familiar database clients while the proxy handles authentication and encryption behind the scenes. It supports both public and private IP connections and can be deployed in environments such as local machines, virtual machines, Kubernetes clusters, or as a sidecar container.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 19
    Alist

    Alist

    A file list/WebDAV program that supports multiple storages

    Alist is a file‑listing and WebDAV server built with Gin (Go) and SolidJS. It supports multiple storage backends—local disk, OneDrive, Google Drive, Aliyun Drive—and offers a modern UI for browsing, sharing, and streaming files.
    Downloads: 26 This Week
    Last Update:
    See Project
  • 20
    sessions

    sessions

    Package gorilla/sessions provides cookie and filesystem sessions

    ...Flash messages: session values that last until read. A convenient way to switch session persistency (aka "remember me") and set other attributes. Mechanism to rotate authentication and encryption keys. Multiple sessions per request, even using different backends. Interfaces and infrastructure for custom session backends: sessions from different stores can be retrieved and batch-saved using a common API. First we initialize a session store calling NewCookieStore() and passing a secret key used to authenticate the session.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 21
    Sliver

    Sliver

    Adversary Emulation Framework

    Sliver is an open source cross-platform adversary emulation/red team framework, it can be used by organizations of all sizes to perform security testing. Sliver's implants support C2 over Mutual TLS (mTLS), WireGuard, HTTP(S), and DNS and are dynamically compiled with per-binary asymmetric encryption keys. The server and client support MacOS, Windows, and Linux. Implants are supported on MacOS, Windows, and Linux (and possibly every Golang compiler target but we've not tested them all).
    Downloads: 69 This Week
    Last Update:
    See Project
  • 22
    DTail

    DTail

    DTail is a distributed DevOps tool for tailing, grepping, catting logs

    DTail (a distributed tail program) is a DevOps tool for engineers programmed in Google Go for following (tailing), catting and grepping (including gzip and zstd decompression support) log files on many machines concurrently. An advanced feature of DTail is to execute distributed MapReduce aggregations across many devices. For secure authorization and transport encryption, the SSH protocol is used. Furthermore, DTail respects the UNIX file system permission model (traditional on all Linux/UNIX variants and also ACLs on Linux based operating systems). The DTail binary operates in either client or server mode. The DTail server must be installed on all server boxes involved. The DTail client (possibly running on a regular Laptop) is used interactively to connect to the servers concurrently. ...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 23
    Kopia

    Kopia

    Cross-platform backup tool for Windows, macOS and Linux

    ...Kopia has both a command-line interface for automation and scripting as well as a graphical UI for interactive use, making it suitable for advanced users and those who prefer visual tools. Its architecture supports end-to-end encryption, optional compression, and deduplication, so multiple backups can share data efficiently, and repositories can be stored securely even in untrusted locations.
    Downloads: 97 This Week
    Last Update:
    See Project
  • 24
    Wesh Network Toolkit

    Wesh Network Toolkit

    Async Mesh Network Protocol for Extreme Communication

    ...Wesh provides a secured, distributed and asynchronous communication protocol, both with or without internet access using IPFS and direct transports such as BLE and proximity drivers. Wesh Protocol provides end-to-end encryption and perfect forward secrecy for all the exchanged messages. Distributed p2p transmissions and hosting over IPFS powered by CRDT algorithm. Efficient end-to-end encryption and perfect forward secrecy to prevent eavesdropping and provide reliable identity access management. Distributed authentication and authorization. Multiple devices per identity. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 25
    Telegram Drive

    Telegram Drive

    Telegram Drive

    Telegram Drive is a powerful utility that enables you to organize your telegram files and much more. Teldrive stands out among similar tools, thanks to its implementation in Go, a language known for its efficiency. Its performance surpasses alternatives written in Python and other languages, with the exception of Rust. Teldrive not only excels in speed but also offers an intuitive user interface for efficient file interaction which other tool lacks. Its compatibility with Rclone further...
    Downloads: 51 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next
MongoDB Logo MongoDB