Tags : Browse Projects

Select a tag to browse associated projects and drill deeper into the tag cloud.

I2P-Bote

Compare

  Analyzed 1 day ago

I2P-Bote allows users to send and receive emails while preserving privacy. It does not need a mail server because emails are stored in a distributed hash table. They are automatically encrypted and digitally signed, which ensures no one but the intended recipient can read the email, and third parties cannot forge them.

66.5K lines of code

5 current contributors

almost 5 years since last commit

2 users on Open Hub

Inactive
5.0
 
I Use This

ActivityWatch

Compare

  Analyzed 1 day ago

Logs your computer activities. Simple, extensible, no third parties. It can be used to keep track of your productivity, time spent on different projects, bad screen habits, or just to understand how you spend your time.

28.5K lines of code

4 current contributors

3 days since last commit

2 users on Open Hub

Moderate Activity
5.0
 
I Use This

OpenCoinage

Compare

  Analyzed 1 day ago

Open-source digital cash.

2.46K lines of code

0 current contributors

over 13 years since last commit

1 users on Open Hub

Inactive
0.0
 
I Use This
Licenses: Public_Do..., unlicense

HitProxy

Compare

  Analyzed about 21 hours ago

10K lines of code

0 current contributors

over 12 years since last commit

1 users on Open Hub

Inactive
3.0
   
I Use This

SHACrypt

Compare

  No analysis available

SHACrypt is a small application that allows you to encrypt your files securely using cryptographic hash functions as a cipher.

0 lines of code

0 current contributors

0 since last commit

1 users on Open Hub

Activity Not Available
5.0
 
I Use This
Mostly written in language not available
Licenses: gpl3_or_l...

yamjam

Compare

  No analysis available

*keeping private data out of source control and applying DRY principles for resource information since 2009* YamJam is a multi-project, shared, yaml based configuration system. It is also a mechanism to keep secret/private data from leaking out to source control systems (i.e. git, bitbucket, svn ... [More] , et al) by factoring out sensitive data from your commits. * Factor out sensitive data from your Django settings.py file * Makes install by source control easy by allowing different configs on your dev, staging and production machines * Don't Repeat Yourself (DRY) Resource configuration Tested on Python 2.7, 3.2, 3.3, 3.4 .. image:: https://drone.io/bitbucket.org/dundeemt/yamjam/status.png :target: https://drone.io/bitbucket.org/dundeemt/yamjam/latest :alt: Build Status [Less]

0 lines of code

0 current contributors

0 since last commit

1 users on Open Hub

Activity Not Available
4.0
   
I Use This
Mostly written in language not available
Licenses: BSD-2-Clause

file2key

Compare

  Analyzed about 19 hours ago

A simple command that generates a key from a file and a passphrase

304 lines of code

0 current contributors

over 2 years since last commit

1 users on Open Hub

Inactive
5.0
 
I Use This

AES Crypt

Compare

  Analyzed 1 day ago

AES Crypt is a file encryption software available on several operating systems that uses the industry standard Advanced Encryption Standard (AES) to easily and securely encrypt files.

9.66K lines of code

0 current contributors

over 1 year since last commit

1 users on Open Hub

Very Low Activity
3.0
   
I Use This
Licenses: No declared licenses

Tomb, the Crypto Undertaker

Compare

Claimed by Dyne.org Analyzed about 18 hours ago

Tomb is a system to make strong encryption easy for everyday use. A tomb is like a locked folder that can be safely transported and hidden in a filesystem. Its keys can be kept separate; for example, you can keep the tomb on your computer and its key on a USB stick or a remote SSH shell. Tomb is ... [More] written in code that is easy to review and links shared components: it consists of a ZShell script and desktop integration apps; it uses standard GNU tools and the cryptographic API of the Linux kernel (dm-crypt) via cryptsetup. [Less]

7.73K lines of code

6 current contributors

2 months since last commit

1 users on Open Hub

Low Activity
0.0
 
I Use This

Privacy-preserving attribute-based credentials engine

Compare

  Analyzed about 8 hours ago

privacy-preserving attribute-based credentials engine

214K lines of code

0 current contributors

about 9 years since last commit

1 users on Open Hub

Inactive
5.0
 
I Use This