Cryptography app analytics for 17 de março

Cryptography

Cryptography

  • Nitramite
  • Google Play Store
  • Gratuitos
  • Ferramentas
Unlock the World of Cryptography! Cryptography is your all-in-one toolkit for exploring, learning, and experimenting with encryption, ciphers, hashing, and encoding methods. Whether you're a beginner or an expert, this app offers a wide range of tools and resources for everyone. ⭐ Your Feedback Matters! Love the app? Rate us 5 stars! Have suggestions? Share your feedback to help us improve. Source code: https://github.com/norkator/cryptography Ciphers • Scytale cipher. • Polybius Square. • Atbash cipher. • Caesar cipher. • Rot 1 - 25 cipher. • Affine cipher. • Rail Fence cipher. • Keyword cipher. • Beaufort cipher. • Templar Cipher with image send feature. • Porta cipher. • Vigenere cipher. • Gronsfeld cipher. • Autokey cipher. • Bacon Cipher. • Chaocipher. • Adfgvx cipher. • Playfair cipher. • Two-Square cipher (currently encrypt). • Tri-Square cipher (currently encrypt). • Four-Square cipher (currently encrypt). • One-time pad. • BIFID cipher. • Trifid cipher. • Hill Cipher with editable Matrix. • Visual Cryptography. • Enigma cipher with saveable settings. • RSA cipher with custom keys • Blowfish cipher • Twofish cipher (next gen Blowfish) • Threefish cipher • Rijndael (AES) cipher • SCrypt (Password-based key derivation function, in progress) • Elliptic Curve Diffie-helleman AES, similar to Curve25519 • ChaCha cipher (Salsa20) • Cast5 • Cast6 • Shacal2 • Shamir's Secret Sharing (SSS) algorithm. • RC2 • RC4 • RC5 • RC6 • Triple DES • Serpent • SkipJack • ElGamal • Anubis. • Khazad. • IDEA. • ARIA. • Navajo. • Mary, Queen of Scots. .. and more! Hashes • Whirlpool 0 / 1 / W (hashing) • HMAC - SHA1 / SHA256 / SHA512 (advanced hashing) • Adler32 (hashing) • CRC - 8 / 16 / 24 / 64 (hashing) • ELF-32 (hashing) • FCS-16 (hashing) • HAS-160 (hashing) • MD-2/4/5 (hashing) • RIPEMD - 128 / 160 / 256 / 320 (hashing) • SHA - 0 / 1 / 2-224 / 2-256 / 2-384 / 2-512 / 3-224 / 3-256 / 3-384 / 3-512 (hashing) • Shake 128 / Shake 256 • Tiger - T / T2 / 128 / 160 (hashing) • Sum - 8 / 16 (hashing) • Xor8 (hashing) • GOST (hashing) • BCrypt (hashing) • PBKDF2 (hashing) with java|php example. • SipHash hashing algorithm. • Skein hash. • Keccak hash. • Argon2 hash. (remote api) • Blake2b • SM3 hash. • Kupyna | DSTU7564. Encodings • Base16 (same as Hexadecimal) • Base32 • Base58 • Base64 • Base85 | Ascii85 • Base91 • Morse code encoder with sound playback. Sound may be annoying. • Braille • Semaphore • Tap Code • ASL (American Sign Language) • Pigpen • Elian Script • Betamaze • A1Z26 • T9 • RLE - Run-length encoding • Webdings and Wingdings. • Pig Latin. Post-Quantum • NTRU Tools • Unknown cipher tool. • WhatsApp message decipher tool. • Anagram solver tool. • Password generator tool. • Checksum tool for text and files. • Custom Hmac SHA 1/256 + SHA256 password authentication digest creator tool. (java|php examples) • File Encryption Tool. Read tutorial from links which are included in explanation view or in tool question mark. • Hash Cracker resources. • Password Strength checker tool. • Frequency Analysis. • ASCII table (8-bit/255) with search function. • Binary, Hexadecimal, Decimal and Octal table with search function. • Text <> Binary converter. • Decimal <> Binary converter. • Hexadecimal <> Binary converter. • Integer(number) <> Binary converter. • Hex <> Ascii converter. • Pseudo Random Number Generator (PRNG) with explanation. • AFSK (Audio Frequency-shift keying) generator. Receiver comes in future releases. • Steganography, encrypt decrypt tool in build. • ASCII Font Art tool. • Normal QR Code generator. • Normal QR code reader (camera or image) • Nato phonetic alphabet. Algorithms • Blum Blum Shub generator. • Haversine formula. Links Contact: http://www.nitramite.com/contact.html Eula: http://www.nitramite.com/eula.html Privacy: http://www.nitramite.com/privacy-policy.html
Cryptography

Cryptography classificação de uso

A classificação de uso é baseada no algoritmo da Similarweb que calcula as instalações atuais e os usuários ativos ao longo de um período de 28 dias.

Todas as categorias em
Estados Unidos--
Ferramentas em
Estados Unidos#4,568

Usuários ativos diariamente

Analise os padrões de uso dos usuários de Cryptography visualizando os downloads de Cryptography e os usuários ativos diários ao longo do tempo.

Usuários

Analise os padrões de uso dos usuários de Cryptography visualizando os downloads de Cryptography e os usuários ativos diários ao longo do tempo.

Desbloqueie usuários ativos diários
jan.fev.mar.

Cryptography Estatísticas de classificação ao longo do tempo

"Ranking de Uso do Similarweb e Ranking de Google Play Store para Cryptography

Ranking de Uso

Classificação

Cryptography Classificação por país

Países nos quais Cryptography tem a classificação mais alta em suas principais categorias


Interesses dos Usuários e Principais Categorias

Principais categorias e aplicativos usados pelos usuários do Cryptography

Principais Categorias
Afinidade
Principais Aplicativos Dentro da Categoria
40%
Dorks - Hack
Kali Linux Master
Canvas Student
11%
Consumers Energy
GitHub
Microsoft Outlook
Google Drive
10%
Microsoft Authenticator
Indeed Job Search
7%
Calculator
DuckDuckGo Browser, Search, AI
Clock
Phone by Google
Google

Principais concorrentes e aplicativos alternativos

Aplicativos com alta probabilidade de serem usados pelos mesmos usuários, da mesma loja.

CompTIA Security+ Exam Prep

CompTIA Security+ Exam Prep

Easy Prep

Teen & Adult Drivers Ed Online

Teen & Adult Drivers Ed Online

Aceable, Inc.

ASVAB Air Force Mastery

ASVAB Air Force Mastery

Higher Learning Technologies Inc

ASVAB Test Prep 2025

ASVAB Test Prep 2025

Spurry Inc.

Cryptography VS.

março 17, 2025