An open source app locker, vault, call blocker application.
Now make your applications more secure with Hasher. Simple and easy to use Hashing library that enables you to Hash in MD5 (Message Digest), SHA-1, SHA-256, SHA-392, and SHA-512.
Encryptor4j consists of a set of wrapper and utility classes that make leveraging cryptography in your application alot easier.
It enables developers to encrypt and decrypt with little room for error, using few lines of code and supports all popular encryption algorithms such as AES, DES, RSA etc.
A simple library for supporting self-signed certificates in Android.
Conceal provides a set of easy to use APIs for performing fast encryption and authentication of data. Apps can use Conceal to encrypt data and large files stored in public locations, for example SD cards.
This is an lightweight library for save and get data secure into the Keystore which encrypted and decrypted.
Encryption is a simple way to create encrypted strings to Android project.
Secure and efficient cryptography library for Android. (Auto fix SecureRandom bugs in API 18 and below.)
A simple Android Library for performing encryption with AES.
A simple way to encrypt your secure data like passwords into a native .so library.
A demo of how to implement AES encryption in Android & iOS.
This is a lightweight library to generate a 64-bit random key and using AES Algorithm to encrypt/decrypt that random number to get a Secret Key and save it to Key Store.
This library especially supports for Realm Encryption. That means when using you don't have to care about how to get a random key, where to save that key for safe, ... this library will take it.
AuthManager is a library which eliminates the boilerplate of Google SignIn and SmartLock integration.
Password Utility Free Forever
An implementation of the SQRL protocol. This library helps to parse, validate and create SQRL messages.
This project helps to use elliptic curve cryptography (ECC) with Curve25519.
Simple API to perform AES encryption on Android with no dependencies.
Email and password signup is a technology that has not been innovated on in decades. Signup forms are cumbersome and repetitive. When users forget their credentials and fail to sign in, you can lose customers. So, that's why here twitter digits comes in picture.
Reactive Auth APIs Wrapper Library for Google's Smart Lock for Passwords API.
It`s a simple java library for encryption. This library contains next encryption methods:
It`s realy easy to use.
A library that lets you use the AES 256 password based encryption/decryption in the easiest manner.
Passay is password policy enforcement for Java including password generators and validators helpers.
A library which helps developers to integrate Google Sign-in
and Facebook Sign-in
.
One tool to manage key generation, key storing and encryption on different APIs of Android.
As you may know android provided API to use keystore
that is stored in system only from API 18. They introduced AndroidKeyStore provider that is responsible to manage this.
But as always there are underwater stones. Up to API 23 you are only able to create asymmetric keys using AndroidKeyStore
provider. Also algorithms that you can use are limited. And what about devices below API 18 ?
This project provides API that wraps default JCA api and AndroidKeyStore
API and makes it easy to create, manage and use your keys on any andorid API.
AndroidTampering is a library that provides an extra layer of security to your Android application. This library protects your application against simple tampering attacks. Please note that this protection methods can also be hacked. So, besides the tampering protection, don't forget to add all the other security recommendations.
This is an encryption example of RSA and AES (CBC, ECB, CTR) 256 bit key on android with unit tests.
This application will scan through all available secret codes on your device. Then you will be able to execute these secret codes and discover hidden functionalities.
A sample application that can be used as a template for implementing Mobile Two Factor Auth
The major drawback of authentication performed including something that the user possesses is that the physical token (the USB stick, the bank card, the key or similar) must be carried around by the user, practically at all times. Loss and theft are a risk. There are also costs involved in procuring and subsequently replacing tokens of this kind. In addition, there are inherent conflicts and unavoidable trade-offs between usability and security.