Search Results for "java security for linux"

Showing 177 open source projects for "java security for linux"

View related business solutions
  • The #1 Embedded Analytics Solution for SaaS Teams. Icon
    The #1 Embedded Analytics Solution for SaaS Teams.

    Qrvey saves engineering teams time and money with a turnkey multi-tenant solution connecting your data warehouse to your SaaS application.

    Qrvey’s comprehensive embedded analytics software enables you to design more customizable analytics experiences for your end users.
    Try Developer Playground
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 1
    libjpeg-turbo

    libjpeg-turbo

    SIMD-accelerated libjpeg-compatible JPEG codec library

    ... that of proprietary high-speed JPEG codecs. libjpeg-turbo implements both the traditional libjpeg API as well as the less powerful but more straightforward TurboJPEG API. libjpeg-turbo also features colorspace extensions that allow it to compress from/decompress to 32-bit and big-endian pixel buffers (RGBX, XBGR, etc.), as well as a full-featured Java interface.
    Leader badge
    Downloads: 83,862 This Week
    Last Update:
    See Project
  • 2
    VeraCrypt

    VeraCrypt

    Open source disk encryption with strong security for the Paranoid

    VeraCrypt is a free disk encryption software brought to you by IDRIX (https://www.idrix.fr) and based on TrueCrypt 7.1a. It adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. It also solves many vulnerabilities and security issues found in TrueCrypt. This enhanced security adds some delay ONLY to the opening of encrypted partitions without any performance impact to the application use phase...
    Leader badge
    Downloads: 1,922 This Week
    Last Update:
    See Project
  • 3
    Mikmod Sound System
    Mikmod is a module player and library supporting many formats, including mod, s3m, it, and xm. Originally a player for MS-DOS, MikMod has been ported to other platforms, such as Unix, Macintosh, BeOS, and Java(!!)
    Leader badge
    Downloads: 548 This Week
    Last Update:
    See Project
  • 4
    Alan Framework

    Alan Framework

    A C2 post-exploitation framework

    Alan Framework is a post-exploitation framework useful during red-team activities. You can run your preferred tool directly in-memory. JavaScript script execution (in-memory without third party dependency) Fully compliant SOCKS5 proxy. Supported agent types: Powershell (x86/x64), DLL (x86/x64), Executable (x86/x64), Shellcode (x86/x64). Server.exe can be executed in Linux (via dotnet core) The network communication is fully encrypted with a session key not recoverable from the agent binary...
    Downloads: 0 This Week
    Last Update:
    See Project
  • User Testing Platform | Testeum Icon
    User Testing Platform | Testeum

    Get worldwide testers to review your software, app or website! Quickly find bugs and usability issues in less than 48 hours.

    Tired of bugs and poor UX going unnoticed despite thorough internal testing? Testeum is the SaaS crowdtesting platform that connects mobile and web app creators with carefully selected testers based on your criteria.
    Learn More
  • 5
    ASAP - Another Slight Atari Player
    ASAP (Another Slight Atari Player) plays and converts 8-bit Atari music (*.sap, *.cmc, *.mpt, *.rmt, *.tmc, ...) on modern computers and mobile devices.
    Leader badge
    Downloads: 30 This Week
    Last Update:
    See Project
  • 6
    Apple Disk Transfer ProDOS

    Apple Disk Transfer ProDOS

    Transfer disks and disk images between the Apple II and the real world

    Apple Disk Transfer ProDOS (ADTPro) transfers classic 8-bit Apple disk images over a serial, ethernet or audio link to a more modern computer. Based on the seminal ADT, ADTPro can transfer any ProDOS- or SOS-visible volume.
    Downloads: 20 This Week
    Last Update:
    See Project
  • 7
    McuOnEclipse

    McuOnEclipse

    Releases of McuOnEclipse projects

    Processor Expert components and Eclipse examples and plugins.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 8
    Vector Pascal is a language targeted at SIMD multi-core instruction-sets such as the AVX and SSE2 or x86-64-v3. It has a SIMD compiler which supports parallel vector operations, loop unrolling, common sub expression removal etc. It is implemented in Java.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 9

    Ed448-Goldilocks

    A 448-bit Edwards curve

    This is an implementation of elliptic curve cryptography using the Montgomery and Edwards curves Curve25519, Ed25519, Ed448-Goldilocks and Curve448, using the Decaf / Ristretto encoding.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Top-Rated Free CRM Software Icon
    Top-Rated Free CRM Software

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
    Get started free
  • 10
    BitVisor is a tiny hypervisor initially designed for mediating I/O access from a single guest OS. Its implementation is mature enough to run Windows and Linux, and can be used as a generic platform for various research and development projects.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    Cambridge Z88

    Cambridge Z88

    Software development for 4Mb portable, using Z80 CPU and AA batteries

    This project is for the portable computer "Cambridge Z88", produced by Sir Clive Sinclair (of ZX Spectrum fame). We continue to support software development (ROM, 3rd party apps on memory cards and desktop applications). We have moved to https://cambridgez88.jira.com/wiki (development, source code and documentation). However, we continue to publish files for download here.
    Leader badge
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12

    FastRC4

    Optimized implementation of RC4 (Rivest Cipher 4, ARCFOUR) in ASMx64.

    Optimized implementation of RC4 (Rivest Cipher 4, ARCFOUR) in ASM (x64) for Linux and Windows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    A new 64-bit RISC platform, complemented by a set of development tools, standards specifications and synthesizable VHDL implementations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Interlocking system for modular model railroading. The goal is the development of hard- and software for an model interlocking interfacing on the one hand to the model railroad and on the other to the model of the userinterface of an real interlocking.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    Arkham Development Open Source Projects

    Arkham Development Open Source Projects

    Arkham Development open source projects: - Native plugins for Antiryad Gx: Png, Jpeg, Smjpeg, Tiff, Zlib, Lzma, Lz4, ZStd, Ogg Vorbis, Theora, Tokamak, Assimp, Freetype, WebP.... - Some libraries are merged to few files to simplify projects makefiles. - Arkham demogroup Dos and Amiga demos written in Basic, x86 and 68k assembler (from 1991 to 1998). - Arkham demogroup 3d engines written in x86 assembler. - Arkham demogroup DOS tools (paint program, sound tracker for Adlib, modeler,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    OsEID

    AVR based smartcard/token with ECC and RSA cryptography

    AVR128DA /Atmega128 microcontroller based open source EID smartcard with RSA (512-2048) and ECC (prime192v1, prime256v1, secp384r1, secp521r1 and secp256k1) support. Compatible with MyEID card from Aventra. Supported in windows and linux by opensc package. Allow about 64KiB space for keys/certificates. PKCS#15 structure supported. USB token with CCID interface based on xmega128a4u with same features as card. High speed AVR multiple precision arithmetic: squaring, multiplication, exponentiation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    ANDRAX Hacker's Platform

    ANDRAX Hacker's Platform

    Advanced Ethical Hacking and Penetration Testing Platform

    The most complete and Advanced Penetration Testing and Ethical Hacking Platform dedicated to Advanced Professionals. Developed to bring the power of Offensive Security in the anyone's pocket 100% OPEN SOURCE - ANDRAX is a independent solution for Security professionals who loves Linux
    Leader badge
    Downloads: 99 This Week
    Last Update:
    See Project
  • 18
    Libecc is an Elliptic Curve Cryptography C++ library for fixed size keys in order to achieve a maximum speed. The goal of this project is to become the first free Open Source library providing the means to generate safe elliptic curves.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 19
    Pharos

    Pharos

    RTOS for Secure, Safe and Real-Time Systems

    Pharos is a free open-source RTOS for secure, safe and real-time systems with the following characteristics: - Memory and enhanced time partitioning (TSP) - Native support for sporadic, periodic and aperiodic threads - Fixed-priority preemptive scheduler - Execution time protection (threads are prevented from executing for more time than they are configured to) - Small size (full image has ~100 to 300KiB text, ~30KiB data) - Hard real-time determinism - Fast critical sections -...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Cloudium OS

    Cloudium OS

    Written in pure ASM and Exode with cloud computing in mind.

    Cloudium OS is being written in pure ASM. It's designed for speed and ease, having cloud computing in mind. It also is secure (without requiring constant user input like Windows). But, how are we going to do this? Well every os wants/says these kind of things, so to accomplish our goals we follow these simple rules: keep it simple (that's way better then these complex interfaces etc. almost nobody wants), generalize (this makes things easier and more useful without extra complexity) and be...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    JBit
    JBit is small java application for mobile phones (MIDlet) that gives you a programmable 8-bit microcomputer. With JBit, you can edit, save, run and debug assembly (6502) programs directly on your phone.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 22
    xinco - Document Management System, DMS
    xinco [eXtensibe INformation COre] is a powerful Web-Service based Information and Document Management System (DMS) for files, text, URLs and contacts, featuring ACLs, versioning, full text search, an FTP-like client (easy install, J2EE+MySQL/PostgreSQL)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    JNode is a Java New Operating system Design Effort. JNode is a simple to use and install Java operating system for personal use on modern devices. Any java application runs on it, fast and safe. See our homepage for additional information.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 24

    Cryptography Tools

    Classic & Modern Cryptography tools

    Cryptography Tools is a project to develop demonstration tools on classic (currently Caesar and Playfair) & modern crypto-systems, including private & public key encryptions, digital signatures, cryptographic hashes and authenticated encryption.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    SNET (Several Network Explore Tool) allows you to safely browse, discover and exploit vulnerabilities in your network, replicating the kinds of access an intruder can achieve, and proving actual paths of attacks that must be eliminated.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next