Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.
Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
Download Free Tool
AI-generated apps that pass security review
Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
winKnocks is an encrypted(DES) port knocking tool. Knock sequences are defined through XML files; users specify: number of packets of each knock sequence, payload and header of each packet. Logging capability. Generation of smoke packets.No replay-attack
The Cyber Hordes is a single or multi-player RTS game where each player builds robots and gives them various components (weapons etc..) and then general orders (e.g. Attack), which the AI of the robot will attempt to complete on its own.
ADAM is the Active Defense Algorithm and Model. It is a formally defined process of determining appropriate active response actions in the event of an attack. This implementation shows that active defense can be a legitimate and responsible security tool
GPP is a General Purpose Proxy Java graphical application intended mainly for packet inspection and modification. It's main idea is to be a little user-friendly portable man-in-the-middle tool for security analysis. Later, some protocols should be added
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
JHoney is a honeypot tool for Linux written in Java. It simulates vulnerable net services to trick an attacker or trojan to attack them. The attacker IP is blocked once a service is attacked, and then the intruder cannot attack for example webservers.
TLogin is a java login applet for tomcat that uses a database to track login attempts and the source of those attempts. Tlogin provides features for preventing web based password guessing attack by placing temporary locks on the account after every fail
A Tetris Attack Clone. *Not* classic tetris. Online multiplayer and limited IRC-style chat and game control. Available as both a Java applet and Java application. Registered on www.jars.com.
Lightspeed Golf is all-in-one golf course management software to help courses simplify operations, drive revenue and deliver amazing golf experiences.
From tee sheet management, point of sale and payment processing to marketing, automation, reporting and more—Lightspeed is built for the pro shop, restaurant, back office, beverage cart and beyond.
Java-tradewars Attack Terminal - A helper for the popular text game TradeWars 2002 written in Java. This program can be used as an applet on a board website or as a stand alone program.
The goals of the tool are: 1. improve usability for the less technical educated 2. 'anonymous' ( ip spoofing, others? ) 3. Better support for a distributed tracker-like target list ( multi target, multi server ). LOIC-like tool, also in C#
Avatar - The Last Airbender You are an element bender
Avatar - The Last Airbender
You are an element bender, you are one of the 4 factions in the world, Earth Air Fire Water,
protect your homeland, learn all you can, and maybe you can become an Avatar and rule all 4 elements.