Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/circa10a/l33tcrypto
Cryptography for the most l33t haxx0rs
https://github.com/circa10a/l33tcrypto
cryptography encoder-decoder hacktoberfest
Last synced: 21 days ago
JSON representation
Cryptography for the most l33t haxx0rs
- Host: GitHub
- URL: https://github.com/circa10a/l33tcrypto
- Owner: circa10a
- License: mit
- Created: 2020-01-04T22:33:06.000Z (almost 5 years ago)
- Default Branch: main
- Last Pushed: 2024-10-17T00:32:12.000Z (about 1 month ago)
- Last Synced: 2024-10-19T01:06:57.559Z (30 days ago)
- Topics: cryptography, encoder-decoder, hacktoberfest
- Language: Java
- Homepage:
- Size: 30.3 KB
- Stars: 1
- Watchers: 4
- Forks: 7
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# l33tcrypto 🔒
For HT
## Usage
- [l33tcrypto 🔒](#l33tcrypto)
* [Usage](#usage)
+ [Go](#go)
+ [Python](#python)
+ [Bash](#bash)
+ [Java](#java)
+ [JavaScript](#javascript)
+ [Kotlin](#kotlin)
+ [Perl](#perl)
+ [Ruby](#ruby)
+ [Scala](#scala)
+ [TCL](#tcl)
+ [Terraform (because why not)](#terraform-because-why-not)
+ [Ansible](#ansible)
+ [PHP](#php)
+ [Puppet](#puppet)
+ [Clojure](#clojure)
+ [Powershell](#powershell)
+ [Erlang](#erlang)
+ [Gleam](#gleam)### Go
```shell
# String, rounds of "encryption"
go run encrypt.go secret 3
```### Python
```shell
# String, rounds of "encryption"
./encrypt.py secret 3
```### Bash
```shell
# String, rounds of "encryption"
./encrypt.sh secret 3
```### Java
```shell
# First, compile the class because this is fucking Java
$ javac Encrypt.java# String, rounds of "encryption"
$ java Encrypt secret 3
```### JavaScript
```shell
# String, rounds of "encryption"
node ./encrypt.js secret 3
```### Kotlin
```shell
# First, compile the jar because this is like fucking Java
$ kotlinc encrypt.kt -include-runtime -d encrypt.jar# String, rounds of "encryption"
$ java -jar encrypt.jar secret 3
```### Perl
```shell
# String, rounds of "encryption"
./encrypt.pl secret 3
```### Ruby
```shell
# String, rounds of "encryption"
./encrypt.rb secret 3
```### Scala
```shell
# First, compile the class because this is like fucking Java
$ scalac Encrypt.scala# String, rounds of "encryption"
$ scala Encrypt secret 3
```### TCL
```shell
# String, rounds of "encryption"
./encrypt.tcl secret 3
```### Terraform (because why not)
**Interactively**
```shell
$ terraform init && terraform apply -auto-approve
var.input
Enter a value: secretvar.times
Enter a value: 3null_resource.encrypt: Creating...
null_resource.encrypt: Provisioning with 'local-exec'...
null_resource.encrypt (local-exec): Executing: ["/bin/sh" "-c" "./encrypt.py secret 3"]
null_resource.encrypt (local-exec): "encrypted" WXpKV2FtTnRWakE9
null_resource.encrypt (local-exec): "decrypted" secret
null_resource.encrypt: Creation complete after 0s [id=2042342408304500010]Apply complete! Resources: 1 added, 0 changed, 0 destroyed.
```**Supply values on the CLI**
```shell
$ terraform apply -var input=secret -var times=3 -auto-approve
null_resource.encrypt: Creating...
null_resource.encrypt: Provisioning with 'local-exec'...
null_resource.encrypt (local-exec): Executing: ["/bin/sh" "-c" "./encrypt.py secret 3"]
null_resource.encrypt (local-exec): "encrypted" WXpKV2FtTnRWakE9
null_resource.encrypt (local-exec): "decrypted" secret
null_resource.encrypt: Creation complete after 0s [id=8726143734733607353]Apply complete! Resources: 1 added, 0 changed, 0 destroyed.
```**Use a `tfvars` file**
Sample `terraform.tfvars`
```hcl
input="secret"
times=1
``````shell
# Only run if it exists
$ test -f terraform.tfvars && terraform apply -auto-approve
null_resource.encrypt: Creating...
null_resource.encrypt: Provisioning with 'local-exec'...
null_resource.encrypt (local-exec): Executing: ["/bin/sh" "-c" "./encrypt.py secret 3"]
null_resource.encrypt (local-exec): "encrypted" WXpKV2FtTnRWakE9
null_resource.encrypt (local-exec): "decrypted" secret
null_resource.encrypt: Creation complete after 0s [id=3935885297718964381]Apply complete! Resources: 1 added, 0 changed, 0 destroyed.
```### Ansible
```shell
ansible-playbook ./encrypt.yaml
```### PHP
```shell
# String, rounds of "encryption"
./encrypt.php secret 3
```### Puppet
```shell
puppet apply ./encrypt.pp
```### Rust
```
cd rust
cargo run secret 3
```### Clojure
```shell
# String, rounds of "encryption"
~/dev/l33tcrypto/l33tcrypto>lein run secret 3
```### Powershell
```
# String, rounds of "encryption"
./encrypt.ps1 secret 3
```### Erlang
```
# First, compile the thing because what even is Erlang
$ erl -compile encrypt.erl# Arguments to -encrypt are String, rounds of "encryption"
$ erl -noshell -s encrypt encrypt -encrypt "secret" 3
```### Gleam
```
# gleam is erlang's newest sibling
cd gleam
gleam run secret 3
```