Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Learn More
Zendesk: The Complete Customer Service Solution
Discover AI-powered, award-winning customer service software trusted by 200k customers
Equip your agents with powerful AI tools and workflows that boost efficiency and elevate customer experiences across every channel.
Open Legacy Storage Document: Generic Document Archiving on Disk and Network(using MINA) Framework in Java for huge number of docs(up to 2^192 documents), efficient(Java NIO), crypto, net transfert, web retrieve, J2EE and eMail archiving compatible.
Free Version - Krytponite Free provides 2048 bit encryption on any type of file as text, pdf, mp3, etc. This implementation is platform independent and uses an apache-tomcat server, and runs all computers (Linux, PC, and Mac).
Axe Credit Portal - ACP- is axefinance’s future-proof AI-driven solution to digitalize the loan process from KYC to servicing, available as a locally hosted or cloud-based software.
Banks, lending institutions
Founded in 2004, axefinance is a global market-leading software provider focused on credit risk automation for lenders looking to provide an efficient, competitive, and seamless omnichannel financing journey for all client segments (FI, Retail, Commercial, and Corporate.)
Mixmaster is an anonymous remailer. Remailers provide protection against traffic analysis and allow sending electronic mail anonymously or pseudonymously.
Mixmaster consists of both client and server installations.
A Cryptography php module very easy to use, could be used to protect databases, files, ad hash codes in every server that support php. Nowdays the most used hash algoritms are weak and there are many huge database with the hash code and the relative pass
A kind of encryption named "simple stream encrypt". The length of plaintext segment or the length of key is not limited, but must greater than zero. The lengths of every plaintext segment in a process don't require equivalency.
This is a library for easy accessing chip cards /smart cards via a chipcard reader. It currently works under Linux, FreeBSD and Windows. It is tested with Towitoko and Kobil readers.
Enterprises and companies seeking a solution to manage all their procurement operations and processes
eBuyerAssist by Eyvo is a cloud-based procurement solution designed for businesses of all sizes and industries. Fully modular and scalable, it streamlines the entire procurement lifecycle—from requisition to fulfillment. The platform includes powerful tools for strategic sourcing, supplier management, warehouse operations, and contract oversight. Additional modules cover purchase orders, approval workflows, inventory and asset management, customer orders, budget control, cost accounting, invoice matching, vendor credit checks, and risk analysis. eBuyerAssist centralizes all procurement functions into a single, easy-to-use system—improving visibility, control, and efficiency across your organization. Whether you're aiming to reduce costs, enhance compliance, or align procurement with broader business goals, eBuyerAssist helps you get there faster, smarter, and with measurable results.
Programm zur einfachen Chiffrierung von eingegebenen Text sowie Textchiffrierung.
Das Programm verwendet einfache Algorithmen zur Verschlüsselung. Es werden weitere sicherere Algorithmen und integrierung in diverse andere Programme folgen.
Generate RSA key pairs of arbitrary length; convert text between formats or use keys to transform/crypt text. Supports decimal, hexadecimal, base64 and text input and output. Entirely ANSI C++; no external dependencies.
A package of Rijndael, Twofish and Serpent encryption algorithms implemented in x86 assembly. Meant to learn basics of assembly, learn about the algorithms or to be used in a C program.
Webswell Connect is a business integration tool based on WS web services, ebXML and AS2 standards. Installer includes ebXML Registry/Repository, universal Message Service Handler and Dispatcher and supporting software. Tech support at www.webswell.com
This project can be used to manage plugins in JAVA applications the framework provides checking of electronic signatures as well as hooks for user interaction (for example when certs are found that are not issued from a trusted authority
This project provides a simple Java-based steganography tool that can hide a message inside a 24-bit colour image so that knowing how it was embedded, or performing statistical analysis, does not make it any easier to find the concealed information.
This software is a set of tools that hides C source code in txt files. Also the software is able to restore the txt files to C source code again. This work is based on the tool c2txt2c by Leevi Martilla. Csteg needs a book file in txt format to hide C so
How do you find anything in the mountain of data on your PC? How do you organise, maintain, archive and protect your files? How do you avoid surrendering to the Powers of Darkness? Checkpoint Commander, the vital tool for Information Management!
stegotools is a suite of UNIX command-line applications to read/write hidden information from/in files using steganography. It currently fully supports 24bpp bitmap images.
Bork is a very small, cross-platform file encryption utility. It is written in Java and designed to be included along with the files it encrypts for long-term storage (eg on CD-R). Its minimal external dependencies make it fairly futureproof.
S/Key Generator. An RFC2289 compliant One-Time Password generator written in Java language and O.S. Thinlet package for GUI.
It uses MD4 and MD5 hash algorithms.