Start from a prompt and build production-ready apps on your data—with security, permissions, and compliance built in.
Vibe coding tools create cool demos, but Retool helps you build software your company can actually use. Generate internal apps that connect directly to your data—deployed in your cloud with enterprise security from day one. Build dashboards, admin panels, and workflows with granular permissions already in place. Stop prototyping and ship on a platform that actually passes security review.
Build apps that ship
Outgrown Windows Task Scheduler?
Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.
Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
sanesigner is a high level digital signature api component. it support generating and verifying digital signatures as well as encryption and decryption using public keys, and lots of other features in between.
Identityflow provides a framework for building protocol flows that perform distributed Identity operations. Examples of Identity Operations are Single Sign-On (SSO) and Attribute queries.
This tool encrypts text using polyalphabetic codetables, like the encryption systems in the middle ages. It can be used for simple text encryption with a small password or as a One-Time-Pad with a random codetable for 100% secure text encryption.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Java based Portable hashing application capable of multiple individual file signatures or proprietary group signatures (1 signature for a folder and all its contents). GUI and command line in the same executable. -sha1 -sha256 -sha51 -md5 -crc32
BeeCrypt is an ongoing project to provide a strong and fast cryptography toolkit. Includes entropy sources, random generators, block ciphers, hash functions, message authentication codes, multiprecision integer routines, and public key primitives.
This is a Hash Calculating tool that calculates MD2,MD5,SHA-1,SHA-256,SHA-384,SHA-512 hash of text or a file. This has GUI developed in java swings.All it needs is sun jre installed.
Yeastar: Business Phone System and Unified Communications
Go beyond just a PBX with all communications integrated as one.
User-friendly, optimized, and scalable, the Yeastar P-Series Phone System redefines business connectivity by bringing together calling, meetings, omnichannel messaging, and integrations in one simple platform—removing the limitations of distance, platforms, and systems.
SMScryptor encrypts and decrypts messages sent from any mobile phones using :
- AES 256 encryption
- J2ME MIDP2.0 CLDC1.1
- ECMAScript
- Apache / PHP / mysql
GDigiDoc is a GUI frontend built with GTKMM for DigiDoc (alias OpenXAdES - http://www.openxades.org) library allowing users to create digitally signed documents
and verify signatures of other users. Signatures follow the XAdES (alias ETSI TS 101 903) and
JChecksum allows you to obtain the hash of a given file using a simple GUI. Hash algorithms supported include MD2, MD5, SHA-1, SHA-256, SHA-384, and SHA-512.
talkLock is voice encryption software for your cell phone. talkLock includes a server component so that you own all points of encryption and decryption of your communications.
The Crypthing project aims to develop cryptographic software for business, government and personal use within the context of Brazilian Public-Key Infrastructure.The first delivery is an application to sign documents for non-repudiation purposes.
Roots III Encryption is an encryption suite in Java and C++ backed by the strong normality of irrational roots. It can easily offer more than 2048 bit security, and can be seen as a practical one-time key implementation.
Shasummer is a SHA hashsum utility in Java. It can calculate SHA1, SHA256 and SHA512 hashes of a file or of a directory (and its subdirectories) and verify the hashes later. Shasummer has a graphical and a command-line interface.
A very powerful and secure encryption supporting multilevel algorithm hierarchy encryption(bit level),supports infinite length keys and equation creation utility(secondary key) for the utmost security.Support for multiple algorithms.All OS support(ja
This package is a modest implementation of a non-alphanumeric encryption algorithm in java. But I'm kinda looking forward to creating a whole gui app implementing most well-known encryption tools, "the paranoid secret-coder special brainkiller"!
Project Sypher is a Java program that is intended to take a document and cipher the text, output the result in a new document and delete the original file.