Showing 200 open source projects for "security"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Cloud tools for web scraping and data extraction Icon
    Cloud tools for web scraping and data extraction

    Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.

    Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
    Explore 10,000+ tools
  • 1
    GPGUI - PGP GUI

    GPGUI - PGP GUI

    GUI wrapping GnuPG functionality provided by Bouncy Castle

    The GPGUI program is GUI wrapping GnuPG functionality provided by Bouncy Castle. The program allows you to encrypt/sign/decrypt text messages and files using asymmeric PGP keys. The program can read and manage GnuPG keys if GnuPG is installed. But the program also maintains its own secret and public key files and having GnuPG installed is optional.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    SilverTunnel-NG

    Java library for easy accessing Tor network.

    SilverTunnel-NG is a Java library that implements and encapsulates all the complex network protocol stuff needed for anonymous communication over the Tor anonymity network. SilverTunnel-NG Netlib can be easily integrated in almost every existing and new Java application. The library requires Java 1.6/Java SE 6 or a newer version. This is a fork of silvertunnel (https://silvertunnel.org) Version (0.0.4) is deployed to maven. Since Version 0.0.4 SilverTunnel-NG also runs on...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    BlackBoxSocket

    My twist to a Java based secure layer for socket communication.

    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Hypersocket VPN

    Hypersocket VPN

    A simple yet powerful open source VPN solution

    ...The Administrator is able to configure the server through a web portal on the same HTTPS port. * Use as a typical VPN solution to replace IPSec type access for a more granular security policy * Use behind a fire-walled WLAN as a BYOD gateway * Use fine grained access to manage who has access to what resource * Keep your network and business safe by denying complete remote access to any user account * Support for Mac and Windows clients
    Downloads: 1 This Week
    Last Update:
    See Project
  • AI-First Supply Chain Management Icon
    AI-First Supply Chain Management

    Supply chain managers, executives, and businesses seeking AI-powered solutions to optimize planning, operations, and decision-making across the supply

    Logility is a market-leading provider of AI-first supply chain management solutions engineered to help organizations build sustainable digital supply chains that improve people’s lives and the world we live in. The company’s approach is designed to reimagine supply chain planning by shifting away from traditional “what happened” processes to an AI-driven strategy that combines the power of humans and machines to predict and be ready for what’s coming. Logility’s fully integrated, end-to-end platform helps clients know faster, turn uncertainty into opportunity, and transform the supply chain from a cost center to an engine for growth.
    Learn More
  • 5

    Go Gmailer

    Go Gmailer is a java based desktop app to send emails.

    ....: It is recommended to create an app password for this app and choose remember me option to login after entering the app password so that you don't have to remember the app password for your G-mail account separately.This is JAVA based app so no doubt of security! If you have any issues with app then feel free to email us at- help.gomailer@gmail.com Like us at Facebook - www.facebook.com/gmailers
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Easy HTTP: Easy Web Service Support

    Easy HTTP: Easy Web Service Support

    Classic Web Service Support

    With all of the hoopla over Web Services, you would think that servicing user requests over HTTP was something new. While we all may have lots of experience with REST, JSON, XML, SOAP, WSDLs, HTTPS, and even EDI ... but at the end of the day, it all comes down to legacies, security, and performance? So while big companies might have billions of dollars to spend re-writing their back end web legacies, those of us who want to seamlessly automate a simple set of CRUD operations to our existing web sited do not. Because legacies are important, EasyHTTP allows our "Web 2.0" Web Services to continue to inter-operate with our "Web 1.0" HTML Forms & Services. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    CrococryptQuerl

    CrococryptQuerl

    CrococryptQuerl is a web-based file encryption & transfer tool

    CrococryptQuerl =============== CrococryptQuerl (CQuerl) is a web-based open-source file encryption and file exchange tool. If you trust the application service provider which is running CrococryptQuerl, it can be seen as an "anonymous & encrypted safe deposit box for computer files". ---INTRO--- The encryption is done on-the-fly using the user's password. Of course, this requires a trusted TLS/SSL connection to the server running CQuerl. The user provides a file and password and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    MV2
    There are a lot of tools and plugins to fix security issues of the dignified mail system. The goal of this project is to redefine a system that takes the problems of our time into account. Be sure to visit this project on github: https://github.com/mv2project/mv2
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    gsg.networks

    gsg.networks

    A simple native java network library

    A simple native java network library containing ftp, smtp and port knocking clients. Designed to be easily extended or customized this library will adapt smoothly in any java project
    Downloads: 0 This Week
    Last Update:
    See Project
  • Smart Business Texting that Generates Pipeline Icon
    Smart Business Texting that Generates Pipeline

    Create and convert pipeline at scale through industry leading SMS campaigns, automation, and conversation management.

    TextUs is the leading text messaging service provider for businesses that want to engage in real-time conversations with customers, leads, employees and candidates. Text messaging is one of the most engaging ways to communicate with customers, candidates, employees and leads. 1:1, two-way messaging encourages response and engagement. Text messages help teams get 10x the response rate over phone and email. Business text messaging has become a more viable form of communication than traditional mediums. The TextUs user experience is intentionally designed to resemble the familiar SMS inbox, allowing users to easily manage contacts, conversations, and campaigns. Work right from your desktop with the TextUs web app or use the Chrome extension alongside your ATS or CRM. Leverage the mobile app for on-the-go sending and responding.
    Learn More
  • 10
    AleHu

    AleHu

    Encrypting, anonymous, unlimited size message transfer system

    AleHu is an open source encrypted message transfer system that encompasses both server (PHP) and client software (Java). Give it a shot: You can try out AleHu by simply running the client using the preconfigured AleHu test server! For further details and instructions on how to quickly install and run AleHu, have a look at the documentation in the Wiki section.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    InfoSim

    A Java Framework for Simulating Information Theory Concepts

    This is a Java Framework which allows to design and simulate Channels, Cryptography algorithms, Coding algorithms, Noise analysis, Information sources and destinations, etc. It supports both Classical and Quantum Information Theory fields. It also allows to design a new Information Scheme from scratch. It has a big Math library which supports Abstract and Linear Algebra objects e.g Hilbert spaces.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    Unity Network

    Unity Network is a distributed Virtual Networking Platform

    ...Moreover its a platform that is designted to be as less dependant from os and network as possible making it more logical and object oriented. The platform is defined by 3 basic principles which are freedom, security, individuality (see more inside) Its is fully functional but not recomended for usung as is because its an academic implementation meaning that needs to be taken care of for security and stability issues.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    Scramble!
    “Scramble your social network data!” - With Scramble you can selective enforce you access control preferences for your content on social networks like Facebook or Twitter ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    SecuXabber

    SecuXabber

    A secure Jabber-client for Android using strong encryption

    SecuXabber is a secure Jabber-client for Android that bases on Xabber and uses a strong, asymmetric enryption that works on top of the XMPP protocol. A key pair is generated on application start-up. Users can send their public key to other SecuXabber users via Bluetooth. This ensures the origin of the public key because people do a face-to-face check during key exchange. After the keys are imported by both users, all communication between them is done fully encrpyted using a strong 4096 bit...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    U-Tranz

    U-Tranz

    UDP based secure file transfer application written in JAVA.

    ...Most of the applications based on UDP restrict file sharing upto 64kb which makes transmission less efficient on large files. Along with the tremendous increase in file size, certain features like implementation of Government Standard Security Algorithms (AES-256*/RSA-2048 and SHA-512) have been added to this application for secure sharing of huge files across different workstations.This tool programmed in JAVA and requires Java Runtime Environment to use this tool. *Unlimited Strength Java Cryptography Extension Policy Files for the Java SE Runtime Environment 7 required to use this feature.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    X-Core

    X-Core

    The original Xivio.com World Server Core

    Xivio.com was a commercial children's virtual world website created in 2006 by Gavin Conrad. This is the legacy World Server Java Core made available to the world to do with as it wishes.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 17

    innocence-java

    Replace text with POS equivalent text, in a reversible fashion.

    Program takes (currently) english text sentences, and replaces each word in a given sentence with another word having the same Part of Speach (POS) tag. This creates a new sentence containing none of the original words. This new sentence can then be transmitted to a remote user, and using the same software, "de-crypted" into yielding the original sentence. The software relies on having a known "seed" value for the random number generator, which is known only by the sender and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    FileHasher

    FileHasher help to get the hash code from any file

    FileHasher is a easy java application to get the hash code from any file. Files uploaded are stable code Git code are unstable
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Codegroup

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    Codegroup is a Java application that will allow one to convert binary (or text) computer files in to 5 letter codegroups for transmission over email, landline telephones, radioteletype or Morse Code. Codegroup has internal error correction & limited cryptography capabilities. Codegroup : ZZZZZ YBPIL AIAIG FMOPP CPAAA DGNGP GPGPA ADNJN ELJKO ELIMO GEOHF KIFGP IFBCB PKCPI YJMHE PHBHP PPOBH NCOHD AKLLL AGHFP DEGEF LKELC EAIJI ABAGP AHPPO IHHPH OHPDF YNFPB ALEPO KMPKP Once this...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Eolos VoipAudit

    Eolos VoipAudit

    Universal Framework to audit Voip protocols's security

    Visual Framework Tool to scan/sniff address space, enumerate users, crack credentials, pattern based dial spoofing and security reporting for Voip protocols. This software is intended to give a general framework to build and plug Voip protocol analizers in order to fix security issues and enhance VoiP platforms confidence. It IS NOT intended to be a cracking tool for malicious system breakers, but a really software MUST for security people to assure Voip platform security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    F-Talk P2P Encrypted Secure Voip

    F-Talk P2P Encrypted Secure Voip

    F-Talk cross-platform p2p encrypted secure voip software

    This project connect to two peers directly ( using without any central server, stun server ) together with 128bit encrypted secure voip communication. http://ftalk.armanasci.com/guide Spefications * Peer to peer direct connection without using any central dedicated server. ( First basic part of the security ) * 128bit AES Symmetric end-to-end encryption PCM datas. ( Second basic part of the security ) * 64bit Base64 Encoding transferred server side info. * Ipv4 and Ipv6 Supoort. * Full-Dublex Communication. * Full Supports Windows,Linux,Mac and Android platforms. * Complately open source project. http://ftalk.armanasci.com/ http://blog.armanasci.com/ http://blog.armanasci.com/contact-me/
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    The system is designed to upload phishing emails to a database where they are automatically analyzed and customized reports can be generated. UnMask was developed by ECIT Labs, Dept of Computer Science, FSU. The director of the Lab is Dr. Sudhir Aggarwal. UnMask has substantial on-line help features and should mainly be self-explanatory.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Java Email Spammer

    This application allows email spamming from gmail account.

    This application allows you to spam emails from your gmail account to any other destination. In the near future it will be possible to spam from different smtp server providers such as Google, Yahoo and more. Please support this application by visiting the official website at http://www.freejavaemailspammer.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    SPIZD stands for Stress Probing Invasive Zap Destructor; it's a command-line stress test tool used to determine how many simultaneous (concurrent) connections servers can handle. Protocols: http, pop3, pop3s, imap, imaps, smtp, smtps, ssh, radius.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    DENRIT

    DENRIT

    Perform anonymous and non-anonymous pentesting.

    DENRIT allows remote administration of anonymous networks (TOR, I2P and FreeNet). Also, contains a pentesting module to execute commands using a selected anonymous network, pentesting with TOR or TCP Follows a client/server model with well-defined communication interfaces. SSH is used to allow remote clients to access the machine and manage any anonymous network that is installed there, plus allows penetration testing anonymously (or non-anonymously) using tools such as Metasploit...
    Downloads: 0 This Week
    Last Update:
    See Project