Showing 1338 open source projects for "linux is"

View related business solutions
  • Vibes don’t ship, Retool does Icon
    Vibes don’t ship, Retool does

    Start from a prompt and build production-ready apps on your data—with security, permissions, and compliance built in.

    Vibe coding tools create cool demos, but Retool helps you build software your company can actually use. Generate internal apps that connect directly to your data—deployed in your cloud with enterprise security from day one. Build dashboards, admin panels, and workflows with granular permissions already in place. Stop prototyping and ship on a platform that actually passes security review.
    Build apps that ship
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 1
    A fork of WASTE 1.5.0.408 beta 3 starting form 1.5.1.412 beta 3
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    tool collection to manage files and stuffs on a filesystem
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    dk-milter consists of two parts: A milter-based application (dk-filter) which plugs in to Sendmail to provide DomainKeys service, and a library (libdk) which can be used to build DomainKeys-compliant applications or MTAs. See the home page for details.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    With this script, you'll be full control over your captcha generate. You can add multiple options and effects to captcha image. And will generate non-passing captcha images.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 5
    UKey is an extension to the open-source encryption tool: TrueCrypt. With UKey you can use a USB key as replacement password for TrueCrypt. Currently the project is in a 'proof of concept' state, meaning it does work but it is not meant for daily use.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Strong 2 way encryption class for PHP (Uses the mcrypt PHP extension)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Was a stream cipher attempt, but has been orphaned.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Project Sypher is a Java program that is intended to take a document and cipher the text, output the result in a new document and delete the original file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    This package is a modest implementation of a non-alphanumeric encryption algorithm in java. But I'm kinda looking forward to creating a whole gui app implementing most well-known encryption tools, "the paranoid secret-coder special brainkiller"!
    Downloads: 0 This Week
    Last Update:
    See Project
  • eProcurement Software Icon
    eProcurement Software

    Enterprises and companies seeking a solution to manage all their procurement operations and processes

    eBuyerAssist by Eyvo is a cloud-based procurement solution designed for businesses of all sizes and industries. Fully modular and scalable, it streamlines the entire procurement lifecycle—from requisition to fulfillment. The platform includes powerful tools for strategic sourcing, supplier management, warehouse operations, and contract oversight. Additional modules cover purchase orders, approval workflows, inventory and asset management, customer orders, budget control, cost accounting, invoice matching, vendor credit checks, and risk analysis. eBuyerAssist centralizes all procurement functions into a single, easy-to-use system—improving visibility, control, and efficiency across your organization. Whether you're aiming to reduce costs, enhance compliance, or align procurement with broader business goals, eBuyerAssist helps you get there faster, smarter, and with measurable results.
    Learn More
  • 10
    j!com is a secure instant messaging system, featuring a classical AIM-like interface, and providing AES encryption for conversations and login.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Encryption application using one time pad algoritm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    SJEA version 1.0 - Simple Java Encryption Algorithm. SJEA is a simple command-line binary encryption algorithm (symmetric block cipher) written in JAVA. It uses a password and a byte-vector array to scramble the input file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    a php/js library used for serverside/client side password encryption, ment to mask the password sent by login forms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    VDE2 OpenMoko Tunnel is a Python/GTK visual interface created for OpenMoko Freerunner. It is intended to build virtual ethernet tunnels to remote VDE switches. This program is released under the GPL v2 as part of the Virtualsquare project.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    it creates MD5 checksum.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This software implements the time stamp service. (mainly implements the Hierarchical Time-stamp Protocol. This protocol is proposed in a published paper which can be found in this package.)The code can help you to construct your time-stamp server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    A steganography tool. You can hide 2Gb file in multiple images, supported almost all graphic formats. Average capacity ~ 40%. Useful for publishing censored materials in the Internet. Details on the project's website (stegoshare.sf.net).
    Downloads: 6 This Week
    Last Update:
    See Project
  • 18
    ClearPass (formerly BlowPass) is web based password storage system that uses the Blowfish algorithm and a Host-Proof design pattern.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Stegonography project developed for ITS 450 - Software Assurance under the instruction of Prof. Sydney Liles.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    This project includes: 1 A php linux extension to include encrypted php source files - c; 2 A command line linux application to encrypt/decrypt php source files - c; 3 A windows application to encrypt/decrypt php source files - builder c++
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Kahunapule's Password Vault and Kahunapule's Random Password Generator allow you to generate and keep track of random passwords and other sensitive data. Requires Mono or .NET; runs on Linux, OS X, & Windows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    IceNotes ME for Mobile Devices is an extremly usefull ;-) JAVA ME (J2ME) application to store all your important (text)notes on your mobile phone using "Twofish" encryption. Your notes are organized by assigning your own custom tags to your notes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    PyMe is a Python interface to GnuPG functions. It is based on GPGME library.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Store and retrieve passwords Online while keeping it secure. Web based (php+flatfile) for easy retrieval. All passwords stored are encrypted and the master (key) password is never saved. Even the user-id are all encrypted. CHECK PROJECT WEBSITE FOR DEMO!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    You can compute what you have in common with untrusted parties, without disclosing what you have. This is an implementation of a cryptographic protocol that is tailored for privacy-preserving set intersection.
    Downloads: 0 This Week
    Last Update:
    See Project