SecureDefaults
Encryption manager
A wrapper around UserDefaults/NSUserDefaults with an extra AES-256 encryption layer
Elevate the security of your UserDefaults with this lightweight wrapper that adds a layer of AES-256 encryption
227 stars
7 watching
17 forks
Language: Swift
last commit: over 1 year ago
Linked from 2 awesome lists
aesaes-256aes-encryptioniosmacosswiftswift5userdefaults
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | An encryption API library for secure data storage and transmission | 37 |
| | A one-time encrypted password/secret sharing application focused on simplicity and security | 411 |
| | Protects and encrypts data stored in local storage. | 648 |
| | Provides AES encryption and decryption capabilities in React Native applications. | 29 |
| | A utility class providing encryption and hashing functionality using AES and various hash algorithms, along with encoding and decoding methods. | 1,136 |
| | A lightweight wrapper around UserDefaults that provides strongly typed access to user defaults data. | 1,435 |
| | A Swift wrapper for Apple's CommonCrypto library used for cryptographic operations | 478 |
| | A comprehensive cryptographic framework for Swift, providing tools and functions for RSA public/private key generation, AES encryption/decryption, signature verification, elliptic curve cryptography, Diffie-Hellman protocol, and symmetric and authenticating ciphers. | 723 |
| | A JavaScript library providing end-to-end encryption and secure item sharing for data protection | 9 |
| | An implementation of Ilya's byte-oriented AES-256 encryption algorithm in C++ for the Arduino platform. | 62 |
| | A desktop password manager that securely stores and encrypts login credentials, credit cards, and notes on the local file system. | 904 |
| | Protects Android Shared Preferences with encryption techniques | 71 |
| | A thin Elixir layer for encrypting and decrypting data | 0 |
| | Lists default and hardcoded passwords for SCADA systems | 482 |
| | A collection of minimal and audited implementations of various cryptographic algorithms | 222 |