Top 15 Most Popular Cryptography Softwares | Apr 2024

Here are the top 15 most popular cryptography softwares as derived from our TpSort Score which is a continually popular score, it denotes an estimated popularity of a software.

1. Img.bi

Img.bi Open source secure image hosting with client-side AES-256 encryption.......

2. Cryptob.in

Cryptob.in Securely share text and files which can be removed after a number of views.......

3. AreaGuardNeo

AreaGuardNeo AreaGuardNeo is file encryption and USB protection tool integrated with Microsoft Active Directory.......

4. eCryptfs

eCryptfs The enterprise cryptographic filesystem for Linux......

5. TruPax

TruPax TruPax generates TrueCrypt - compatible container files from arbitrary sets of files and folders. Such files match exactly the size of the contained material and can be mounted by TrueCrypt, but also directly extracted using TruPax itself. Latter also works for containers formatted with FAT32 by TrueCrypt itself,......

6. ImmediateCrypt

ImmediateCrypt ImmediateCrypt is an utility for encryption and decryption of plain text messages with the AES-256 cipher.It is released under the GPLv3 license (full Java source available) and works under any Java-enabled environment (Windows, Linux and Mac OSX).......

7. iSteg

iSteg iSteg is an encryption tool used to hide a file (for example a zip archive) inside a jpeg picture. This encryption technology is called steganography. iSteg is a frontend for the opensource tool outguess 2.0. iSteg can be used to both encode and decode a hidden file.......

8. fciv

fciv The File Checksum Integrity Verifier (FCIV) is a command-prompt utility that computes and verifies cryptographic hash values of files. FCIV can compute MD5 or SHA-1 cryptographic hash values. These values can be displayed on the screen or saved in an XML file database for later use and verification.......

9. hashdeep

hashdeep Computes the MD5, SHA-1, SHA-256, Tiger, or Whirlpool message digest for any number of files while optionally recursively digging through the directory structure. Can also match input files against lists of known hashes in a variety of formats.......

10. DocWallet

DocWallet Your personal document lock box. Securely stored and always at hand.You can finally access your confidential documents from anywhere in the world - securely encrypted, perfectly synchronized, and amazingly practical - with DocWallet, the free document manager from Deutsche Post AG, for iPhone, iPad, Mac and PC.......

11. USBCrypt

USBCrypt Password protection and strong encryption of the external and internal drives, flash drives, backup drives, etc.......

12. Cryptix

Cryptix Cryptix is a complete solution to study cryptography, encoding and ciphers. Hide your datas, encrypt your texts and documents.Cryptix contains password generators, Mnemonic, .htpasswd generator, RSA 512 bits key generator, Wordlist generator and numerous security tools.......

13. SilentEye

SilentEye SilentEye is a cross-platform application design for an easy use of steganography, in this case hiding messages into pictures. It provides a pretty nice interface and an easy integration of new steganography algorithm and cryptography process by using a plug-ins system.......

14. Cryptext

Cryptext Cryptext helps you secure your writings and notes easily. Cryptext use AES algorithm to protect the content of your texts.Features :- AES encryption of your texts.- Choice of two AES methods for encryption and decryption.- Passwords are stored securely inside your keychains.- Logs of encryption and decryption.- Export,import,print your secured......

15. RHash

RHash RHash (Recursive Hasher) is a console utility for computing and verifying hash sums of files. It supports CRC32, MD4, MD5, SHA1, SHA256, SHA512, Tiger, DC++ TTH, BitTorrent BTIH, ED2K, AICH, GOST R 34.11-94, RIPEMD-160, HAS-160, EDON-R 256/512, Whirlpool and Snefru-128/256 algorithms. Hash sums are used to ensure and verify integrity......