Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/wintersolid/cyberrisk
CypherRisk is a command-line application designed to manage user authentication and file encryption/decryption using Java and Kotlin.
https://github.com/wintersolid/cyberrisk
java junit5 kotlin maven mocknito spring-boot
Last synced: about 1 month ago
JSON representation
CypherRisk is a command-line application designed to manage user authentication and file encryption/decryption using Java and Kotlin.
- Host: GitHub
- URL: https://github.com/wintersolid/cyberrisk
- Owner: WinterSolid
- Created: 2024-06-25T00:31:06.000Z (6 months ago)
- Default Branch: main
- Last Pushed: 2024-06-25T23:00:12.000Z (6 months ago)
- Last Synced: 2024-06-26T17:49:02.360Z (6 months ago)
- Topics: java, junit5, kotlin, maven, mocknito, spring-boot
- Language: Kotlin
- Homepage:
- Size: 28.3 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# CypherRisk Application
CypherRisk is a command-line application designed to manage user authentication and file encryption/decryption using Java and Kotlin.
## Features
- User Authentication: Allows users to log in using a username and password.
- File Encryption/Decryption: Supports encrypting and decrypting text files using Base64 encoding.
- Command-Line Interface: Provides a simple command-line interface for interaction.
## Technologies Used- Java: Core language for backend logic and file handling.
- Kotlin: Used for implementing the ViewModel layer for business logic.
- Spring Boot: Framework used for application configuration and bootstrapping.
- JUnit: Testing framework for unit testing Java and Kotlin classes.
- Mockito: Mocking framework for creating mock objects during testing.## Getting Started
To run the CypherRisk application locally, follow these steps:
- Clone the Repository:
- `git clone: [(https://github.com/WinterSolid/CyberRisk.git)]'
## How it works
1. Enter your username and password to log in.
- username: "testUser"
- password: "testPassword"
3. Choose a text file to encrypt or decrypt.
4. Select whether to encrypt (E) or decrypt (D) the file.
-
-## Usage
### Once the application is running, follow the prompts on the command line to perform actions:
1. Login: Enter your username and password. The application will validate your credentials.
2. File Operations: Choose a text file to perform encryption or decryption. Follow the prompts to specify the operation.