This tool will encrypt-decrypt your files and directories. It has built-in password generator and featured with Colourful UI. It is based on AES (Advanced Encryption Standard) CBC mode Algorithm Symmetric Cryptography and made in Python language (Python3)
☆34Jan 5, 2024Updated 2 years ago
Alternatives and similar repositories for crypto
Users that are interested in crypto are comparing it to the libraries listed below
Sorting:
- ☆11Sep 22, 2021Updated 4 years ago
- Decentralized federated machine learning using peer-to-peer networks☆12Apr 11, 2023Updated 2 years ago
- CyberTalents Blue Team Scholarship 2023 By Trend Micro☆12Sep 28, 2023Updated 2 years ago
- ☆12Apr 20, 2025Updated 10 months ago
- Secure outsourcing of image editing to untrusted cloud environments by implementing Paillier's Homomorphic Cryptosystem and extending it …☆41Jun 25, 2020Updated 5 years ago
- Creative Adversarial Network-pytorch☆11Jun 30, 2018Updated 7 years ago
- A way to control devices via Bluetooth w/ an ESP32☆14Jul 6, 2024Updated last year
- TreeNET is a subnet-based topology discovery tool which is built upon ExploreNET, a subnet inference tool.☆11Oct 14, 2019Updated 6 years ago
- Dump configuration from STOP Djvu ransomware sample☆12Feb 19, 2020Updated 6 years ago
- All Base libraries decryption tool☆14Jan 2, 2022Updated 4 years ago
- Implementation of a differentially private generative adversarial network.☆11Nov 20, 2018Updated 7 years ago
- ☆17Jan 6, 2022Updated 4 years ago
- A tool for generating and deriving extended public and extended private keys.☆12Jan 1, 2023Updated 3 years ago
- ☆12Dec 1, 2024Updated last year
- FeGAN: Scaling Distributed GANs☆13Dec 31, 2020Updated 5 years ago
- This project showcases how to exploit vulnerabilities in NFC cards using Arduino and RFID technology. By leveraging the MFRC522 RFID modu…☆16Jul 4, 2023Updated 2 years ago
- Cross-browser cryptographic library implementing the Web Cryptography API.☆14Aug 15, 2024Updated last year
- Script For Youtube Subscribe Checker☆14Aug 2, 2019Updated 6 years ago
- Reset your Linux password from external pen drive☆18Oct 3, 2020Updated 5 years ago
- ☆11Jan 28, 2021Updated 5 years ago
- ☆11Apr 2, 2019Updated 6 years ago
- This repository contains code and data for the paper of conditional generative adversarial imitation learning (cGAIL) accepted by ICDM201…☆12Jun 29, 2020Updated 5 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆15Apr 22, 2020Updated 5 years ago
- A powerful framework for decentralized federated learning with user-defined communication topology☆12Dec 14, 2021Updated 4 years ago
- Multi-Label Classification with Weighted Classifier Selection and Stacked Ensemble☆14Mar 30, 2020Updated 5 years ago
- Script feito em python que lista cameras ips expostas na internet☆10Nov 11, 2020Updated 5 years ago
- PyTorch implementation of "Sample-efficient Imitation Learning via Generative Adversarial Nets"☆10Nov 22, 2019Updated 6 years ago
- Simple traceroute implementation in go☆13Jul 27, 2020Updated 5 years ago
- NMAP with LLM summaries☆16Jan 15, 2024Updated 2 years ago
- Differentially Private Federated Learning: A Client Level Perspective☆12Jul 3, 2019Updated 6 years ago
- Bash Shell Script Cryptography☆13Jan 2, 2022Updated 4 years ago
- Automatic SQL injector web-forum based CMS☆14Jan 2, 2022Updated 4 years ago
- Federated Reinforcement Learning☆12Jun 20, 2019Updated 6 years ago
- this module will automatically create evil twin and store password that user input☆15Jan 26, 2023Updated 3 years ago
- ☆12Feb 14, 2020Updated 6 years ago
- ☆17Aug 17, 2024Updated last year
- This repository presents a blockchain-based framework, TrustFed, for Cross-Device Federated Learning systems to detect the model poisonin…☆13Mar 31, 2022Updated 3 years ago
- A Python implementation of RocketFuel topology mapping engine.☆14Nov 12, 2018Updated 7 years ago
- A python decorator to generate a visual tree for recursive functions.☆14Jan 17, 2021Updated 5 years ago