Showing 390 open source projects for "linux-gnome"

View related business solutions
  • Context for your AI agents Icon
    Context for your AI agents

    Crawl websites, sync to vector databases, and power RAG applications. Pre-built integrations for LLM pipelines and AI assistants.

    Build data pipelines that feed your AI models and agents without managing infrastructure. Crawl any website, transform content, and push directly to your preferred vector store. Use 10,000+ tools for RAG applications, AI assistants, and real-time knowledge bases. Monitor site changes, trigger workflows on new data, and keep your AIs fed with fresh, structured information. Cloud-native, API-first, and free to start until you need to scale.
    Try for free
  • Fully managed relational database service for MySQL, PostgreSQL, and SQL Server Icon
    Fully managed relational database service for MySQL, PostgreSQL, and SQL Server

    Focus on your application, and leave the database to us

    Cloud SQL manages your databases so you don't have to, so your business can run without disruption. It automates all your backups, replication, patches, encryption, and storage capacity increases to give your applications the reliability, scalability, and security they need.
    Try for free
  • 1
    EnCrypted fiLe Sharing In jaVa
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    SeCURePass password manager. A flexible, secure password manager for use in many situations, applicable for storing personal information. Integration with Firefox is available via an included extension.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    A software written in java to compute the digital signature on documents and verify them, using a smart card or a token file in p12 format
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    If you need to protect your confidential files in office or shared desktops, here is the robust command line and GUI utility to do password based encryption using AES. It can encrypt and decrypt a folder structure containing any number of files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Payments you can rely on to run smarter. Icon
    Payments you can rely on to run smarter.

    Never miss a sale. Square payment processing serves customers better with tools and integrations that make work more efficient.

    Accept payments at your counter or on the go. It’s easy to get started. Try the Square POS app on your phone or pick from a range of hardworking hardware.
    Learn More
  • 5
    TCPFile is a friend to friend file sharing / instant messaging Java (1.6) program offering zipped and fully encrypted (RSA, AES) communication.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    LPStego is a steganographic tool for hiding a generic file in a jpeg image. Both command-line and graphical UI is provided.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Cryptography Workshop is a small yet powerful tool for cryptography and cryptanalysis. It's focused more on classic cryptography. It is currently in alpha and under development.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Backup P2P is a peer to peer application doing automated and secured backups inside a community (Jabber, XMPP). Each user shares some available space on his disk with others, to be able in return to remotely backup some of his own data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    sanesigner is a high level digital signature api component. it support generating and verifying digital signatures as well as encryption and decryption using public keys, and lots of other features in between.
    Downloads: 0 This Week
    Last Update:
    See Project
  • eProcurement Software Icon
    eProcurement Software

    Enterprises and companies seeking a solution to manage all their procurement operations and processes

    eBuyerAssist by Eyvo is a cloud-based procurement solution designed for businesses of all sizes and industries. Fully modular and scalable, it streamlines the entire procurement lifecycle—from requisition to fulfillment. The platform includes powerful tools for strategic sourcing, supplier management, warehouse operations, and contract oversight. Additional modules cover purchase orders, approval workflows, inventory and asset management, customer orders, budget control, cost accounting, invoice matching, vendor credit checks, and risk analysis. eBuyerAssist centralizes all procurement functions into a single, easy-to-use system—improving visibility, control, and efficiency across your organization. Whether you're aiming to reduce costs, enhance compliance, or align procurement with broader business goals, eBuyerAssist helps you get there faster, smarter, and with measurable results.
    Learn More
  • 10
    A smart card-based public key cryptography system based on elliptic curves, using AES for session key generation and SHA for hashing. This project will include the smart card software, terminal software, and a public key server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Identityflow provides a framework for building protocol flows that perform distributed Identity operations. Examples of Identity Operations are Single Sign-On (SSO) and Attribute queries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    WEB-interface for Public key Infrastructure.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    BeeCrypt is an ongoing project to provide a strong and fast cryptography toolkit. Includes entropy sources, random generators, block ciphers, hash functions, message authentication codes, multiprecision integer routines, and public key primitives.
    Leader badge
    Downloads: 121 This Week
    Last Update:
    See Project
  • 14
    This tool encrypts text using polyalphabetic codetables, like the encryption systems in the middle ages. It can be used for simple text encryption with a small password or as a One-Time-Pad with a random codetable for 100% secure text encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    EasyCrypter is JAVA application for data encryption. Encrypt your files in several easy steps.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Java based Portable hashing application capable of multiple individual file signatures or proprietary group signatures (1 signature for a folder and all its contents). GUI and command line in the same executable. -sha1 -sha256 -sha51 -md5 -crc32
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    DKIM for JavaMail is a small JAR that can be easily implemented in existing Java projects using JavaMail for sending DKIM signed emails.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    This is a Hash Calculating tool that calculates MD2,MD5,SHA-1,SHA-256,SHA-384,SHA-512 hash of text or a file. This has GUI developed in java swings.All it needs is sun jre installed.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 19
    GDigiDoc is a GUI frontend built with GTKMM for DigiDoc (alias OpenXAdES - http://www.openxades.org) library allowing users to create digitally signed documents and verify signatures of other users. Signatures follow the XAdES (alias ETSI TS 101 903) and
    Downloads: 4 This Week
    Last Update:
    See Project
  • 20
    BMPE stands for Bitmap Editor and is an cross platform open source application written in java for editing and extracting messages from BMP files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    SMScryptor encrypts and decrypts messages sent from any mobile phones using : - AES 256 encryption - J2ME MIDP2.0 CLDC1.1 - ECMAScript - Apache / PHP / mysql
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    tinySSO is a simple Single Sign-On in Java based on a secure cookie protocol.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    JChecksum allows you to obtain the hash of a given file using a simple GUI. Hash algorithms supported include MD2, MD5, SHA-1, SHA-256, SHA-384, and SHA-512.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    This applet allows digitally sign documents with standard CMS is developed in Java using free software (libraries bouncycasttle).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    StrongKey is a building block in an Enterprise Key Management Infrastructure (EKMI), with the goal of centrally managing symmetric encryption keys.
    Downloads: 0 This Week
    Last Update:
    See Project