Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/wintersolid/cyberrisk

CypherRisk is a command-line application designed to manage user authentication and file encryption/decryption using Java and Kotlin.
https://github.com/wintersolid/cyberrisk

java junit5 kotlin maven mocknito spring-boot

Last synced: about 1 month ago
JSON representation

CypherRisk is a command-line application designed to manage user authentication and file encryption/decryption using Java and Kotlin.

Awesome Lists containing this project

README

        

# CypherRisk Application

CypherRisk is a command-line application designed to manage user authentication and file encryption/decryption using Java and Kotlin.

## Features

- User Authentication: Allows users to log in using a username and password.
- File Encryption/Decryption: Supports encrypting and decrypting text files using Base64 encoding.
- Command-Line Interface: Provides a simple command-line interface for interaction.

## Technologies Used

- Java: Core language for backend logic and file handling.
- Kotlin: Used for implementing the ViewModel layer for business logic.
- Spring Boot: Framework used for application configuration and bootstrapping.
- JUnit: Testing framework for unit testing Java and Kotlin classes.
- Mockito: Mocking framework for creating mock objects during testing.

## Getting Started

To run the CypherRisk application locally, follow these steps:

- Clone the Repository:

- `git clone: [(https://github.com/WinterSolid/CyberRisk.git)]'

## How it works

1. Enter your username and password to log in.
- username: "testUser"
- password: "testPassword"
3. Choose a text file to encrypt or decrypt.
4. Select whether to encrypt (E) or decrypt (D) the file.
- CypherRisk
- cypherRisk2

## Usage

### Once the application is running, follow the prompts on the command line to perform actions:

1. Login: Enter your username and password. The application will validate your credentials.
2. File Operations: Choose a text file to perform encryption or decryption. Follow the prompts to specify the operation.