Showing 426 open source projects for "source"

View related business solutions
  • Auth0 B2B Essentials: SSO, MFA, and RBAC Built In Icon
    Auth0 B2B Essentials: SSO, MFA, and RBAC Built In

    Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.

    Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
    Sign Up Free
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 1
    An implementation of Shoup's "Practical Threshold Signature" in Java. This is an (n,k)-threshold signature system: at least k parties out of n must independently sign a piece of data to produce a valid group signature.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    A multithreaded GUI based encryption software that can encrypt any file on any platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    The Ganymed SSH-2 for Java library (implementing the SSH-2 protocol) allows you to connect to SSH servers from within your Java programs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    The Eclipse XML-Security Plug-In allows you to experiment with the W3C recommendations on digital signatures and encryption and to learn all about their background. Arbitrary XML documents can be canonicalized, signed, verified and en- or decrypted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    JEasyCrypt library is developing to do your live easy and trust with cryptographic and else security things inside your java software.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    INTIX-JSIGNER is a java web application for signing documents (XML and/or PDF) of unattended way and in the server side. It has as main modules the following: Authentication, XML and PDF Signing and Keys and Certificates Management.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    truegui is a Java based frontend for the famous truecrypt tool. It is designed for Linux desktops systems (like Gnome or KDE, etc).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    A 100% Java cross-platform GUI to securely manage encrypted password files created by Figaro's Password Manager (FPM) and KedPM.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    The Moonbounce API is a set of high level objects that encapsulate pieces of the Bouncycastle lightweight crypto API. Moonbounce significantly simplifies RSA key generation, signing, encryption/decryption and verification of both byte arrays and files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 10
    Imagine being able to send an encrypted message as a single file to someone working on any Operating System, without them having to install any software to decrypt it. Just send them an Inkjar. Or you can store your own passwords on a usb key anywhere.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Private-key, symmetrical (same password to encrypt and decode) file encryption with 8-bit to 2147483647-bit (2^3 to 2^31) encryption using my own algorithm and my own extension of MD5 (http://blog.robtoth.net/2009/06/tencryption-computer-programming.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Compute shared RSA keys for two parties using Gilboa's protocol. Other protocols may be added. Contains JAVA source for Benaloh, Naccache-Stern and Goldwasser-Michali crypto-algorithms. Oblivious transfers and BiPrimaliy tests also implemented.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Tristero is a framework for creating distributed peer-to-peer file sharing applications. It uses standard technologies for each component, reducing the work of implementing a particular network architecture to the novel aspects of that system and eliminat
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    USSI is the Universal SAFE Signing Interface. USSI provides web services for the application of SAFE digital signatures for PDF, text, xml, etc. Please see http://www.safe-biopharma.org for more information on SAFE.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Securing mails without involving user. Secures them as often as possible if it is possible. Shows security-state and process of mails and mail-partners.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Odyssi PKI aims to be a complete PKI suite written in Java, and designed from the ground up with security in mind. When completed, it will be fully standards compliant with PKIX, XKMS, OCSP, and other PKI standards.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    Sha4j is a one class implementation of SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512 algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    An electronic votingsystem – Verifiable E-Voting (VEV) – with underlying protocol to help secure the election process from malicious practices at the same time as allowing voters and candidates to verify the correctness of their votes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A standard API for accessing OpenPGP and S/MIME email in JavaMail.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Java SWING applet to store encrypted files in your box.net account
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Portable and simple program for text and files encryption (Symmetric, Asymmetric and Steganography)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    CivilAction lets you create a Choose Your Own Adventure type story that can be played on Java enabled cell phone. A desktop application lets you write story files. People run the story on their phone. Make a 'Tresure hunt' or 'Amaze Race' type game.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    JCEF (Java Cryptographic Extension Framework) is an API that facilitates enormously the use of the cryptographic architecture of Java
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    A crossplatform key manager for GnuPG.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    SwiftCrack is a wireless LAN (WLAN) tool which recovers encryption keys. SwiftCrack operates by proactively monitoring transmissions, injecting traffic with known key streams, computing the encryption key when enough packets have been gathered.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB