Showing 1219 open source projects for "open source project"

View related business solutions
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 1
    Tristero is a framework for creating distributed peer-to-peer file sharing applications. It uses standard technologies for each component, reducing the work of implementing a particular network architecture to the novel aspects of that system and eliminat
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Portable and simple program for text and files encryption (Symmetric, Asymmetric and Steganography)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    gSTM is a front-end for managing SSH-tunneled port redirects. It stores tunnel configurations in a simple XML format. The tunnels (local, remote and dynamic) can be managed and individually started/stopped through one simple interface.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    USSI is the Universal SAFE Signing Interface. USSI provides web services for the application of SAFE digital signatures for PDF, text, xml, etc. Please see http://www.safe-biopharma.org for more information on SAFE.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    Waste.NET is a complete rewrite of the now defunct W.A.S.T.E. project. It aims to become a highly secure file sharing application, as well as a secure chat/VOIP platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Securing mails without involving user. Secures them as often as possible if it is possible. Shows security-state and process of mails and mail-partners.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    This is rarbrute, a shell script to brute force encrypted rar files under unix and linux. A long wordlist and a paper about security in internet cafes is included.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Odyssi PKI aims to be a complete PKI suite written in Java, and designed from the ground up with security in mind. When completed, it will be fully standards compliant with PKIX, XKMS, OCSP, and other PKI standards.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    The gruft library is a fast implementation of several cryptographic functions in JavaScript: MD5, SHA-1, SHA-256, Tiger/192, AES-Rijndael.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    Sha4j is a one class implementation of SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512 algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    This project is a collection of Open Source crypto cores and implementations relating to high speed cryptanalysis/cracking and complex implementations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    A linux liveCD for the non-invasive, non-destructive detection and analysis of WiFi (802.11) networks. It also provides mechanisms to set up a PC as an 802.11 Access Point.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    An electronic votingsystem – Verifiable E-Voting (VEV) – with underlying protocol to help secure the election process from malicious practices at the same time as allowing voters and candidates to verify the correctness of their votes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    This program try to crack any md5 hash , but not using one cpu, using the power of distributed computing to get better results in less time
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    KIside is a message digest computing and displaying tool. It computes and shows the hash code of any file as a string of hexadecimal numbers. KIside implements standard algorithms such as MD4, MD5, SHA1, SHA256, SHA384, SHA512, TIGER, RIPEMD160.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    A standard API for accessing OpenPGP and S/MIME email in JavaMail.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    openSNMP is a multi-threaded SNMPv3 engine. This project supports the Simple Network Management Protocol version 3. In particular, it is designed to match the architecture of the Internet Engineering Task Force SNMPv3 standard (RFCs 3410-15).
    Downloads: 3 This Week
    Last Update:
    See Project
  • 18
    The SSTCP protocol permits to establish a simple TCP/IP connexion across multiple AES secured channel. Simple but (/so?) secured and strong cryptographic methods are used. OpenSSTCP is the LGPL implementation of the SSTCP protocol.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A new encryptation system to reduce force-brute attacks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Java SWING applet to store encrypted files in your box.net account
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Real-Time Proactive Secret Sharing Library for RTAI is an implementation of the Shamir's secret sharing scheme and Herzberg's proactive secret sharing algorithm. The library uses a port of GNU GMP in order to make multiple precision arithmetic operatio
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    otpenc is a console application that facilitates the use of OTP (One-Time Pad) encryption with a unix pipe or as a stand alone utility.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    CivilAction lets you create a Choose Your Own Adventure type story that can be played on Java enabled cell phone. A desktop application lets you write story files. People run the story on their phone. Make a 'Tresure hunt' or 'Amaze Race' type game.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Gloster is a secure and decentralized p2p program for small communities working under Linux and Windows
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    JCEF (Java Cryptographic Extension Framework) is an API that facilitates enormously the use of the cryptographic architecture of Java
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB