Level Up Your Cyber Defense with External Threat Management
See every risk before it hits. From exposed data to dark web chatter. All in one unified view.
Move beyond alerts. Gain full visibility, context, and control over your external attack surface to stay ahead of every threat.
Try for Free
Cloud-based help desk software with ServoDesk
Full access to Enterprise features. No credit card required.
What if You Could Automate 90% of Your Repetitive Tasks in Under 30 Days? At ServoDesk, we help businesses like yours automate operations with AI, allowing you to cut service times in half and increase productivity by 25% - without hiring more staff.
Welcome to Data Access Layer for Java (DAL4j) a set of command line tools and framework used to reverse engineer a MySQL or SQLServer database schema into a set of JPA Entity Beans.
DAL4j can be useful for scenarios where there is an existing database schema but a technology other that JPA is used to interact with the database. DAL4j can provide an easy way to migrate your code base from other technologies such as JDBC or Hibernate to JPA.
This project is created for providing basic stegnography concept.
...RUN Decryptor.CLASS (WITH APPROPRIATE JAVA ENV.)
2. PROVIDE APPROPRIATE PARAMETERS.
• file_name : (NAME OF FILE i.e. output_file_name in ENCRYPTION process)
• logical_file_name : (NAME OF LOGICAL FILE i.e. target_file_name in ENCRYPTION process, file extension matters not name)
e.g. java hidden.mp3 hideme.mp3
[output_file_name] [target_file_name]
MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
...Some Of It's Features Include:
Interactive Interface
Hashing Function: {HASH ONLY}
SHA1
SHA256
SHA384
SHA512
MD5
RIPEMD160
Key Generation:
MACTripleDES Key Generation
MD4 Hashes:
Base64: {Encrypt/Decrypt}
With/Without Password
Encoding:
Binary {Encrypt/Decrypt}
Checksum Hashes:
SHA1
SHA256
SHA384
SHA512
MD5
RIPEMD160
Checksum Auto-Save
Read An Encrypted Text File To Decrypt It
Read A Plain Text File To Encrypt It
Save The Encrypted/Decrypted Text
And Of Course Its All Free! ...
It's a new, free distribution encryption software that provides Dropbox users with additional security for their sensitive information. Encrypt and securely share your files with other KonEncriptación users via Dropbox. KonEncriptación is fully integrated with Dropbox and is easy to use, thus allowing you to exploit all its features from the start.
...some uses encryption keys and some dont. there are AES , 4DES , RC2 ,
RC4 , MD5 , SHA1 , SHA2 , SHA3 , SHA4 , XoR , Crypt , HeX , BINARY ,
Rijndael 256 , Obfuscation String , RSA , BASE64. The password
manager anything saved WILL NOT BE ENCRYPTED so it is smart to
protect the program from others not using it.
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
java-based pki encryption utility formed by simply pulling together bouncycastle examples into a working tool. i don't guarantee that there aren't loopholes, but this may be a starting point.
HTTPBrute is used to calculate HTTP Digest Access Authentication as per RFC 2617. The tool will be able to perform brute force attacks to retrieve a lost password for a given Authentication response. MD5 is the only hashing algorithm implemented.
HcryptoJ (Historical cryptology in Java) is a Java based programming library for implementing and analyzing historical ciphers. HcryptoJ is designed to support research and teaching in historical cryptography and computer science. Licensed under GPL.
XTEA (eXtended Tiny Encryption Algorithm) support for db4o open source object database. XTEA is a block cipher that operates on a 64-bit block size with a 128-bit key. An extremely tiny but very fast encryption algorithm (with cycles less than 32 rounds)
This is free Java desktop application to keep your note in safe from others using the Encrypting Decrypting symmetric key algorithm, it's easy to transfer your note form source to another in confidential manner.
ShredBitz is a free and simple file shredder tool that can wipe selected files from any hard disk drive. ShredBitz is written in the java programming language and uses a custom written algorithm for shredding.
ShredBitz is a very powerful tool.
A one stop solution for all your cryptology needs such as ENCRYPTION, DECRYPTION, STEGANOGRAPHY, PASSWORD GENERATOR, PASSWORD KEEPER, HASH CALCULATOR etc.
A simple Java based XML Encryption tool for education propose. Uses Apache Santuario Libraries. Ideal to understand the implementation of the XML Security Library of Java. Ravi Dontharaju, Utkarsh Sengar, Ramanuj Mishra, Sukhbir Walia, Jaspreet Singh
A very simple file encryption tool. Release 1 is a text editor that saves encrypted files. Release 1.1 will include the ability to convert any file, even binary, to a GEF (Gulosh Encrypted File). Release 2.0 brings the strong encryption into play.
This tool encrypts text using polyalphabetic codetables, like the encryption systems in the middle ages. It can be used for simple text encryption with a small password or as a One-Time-Pad with a random codetable for 100% secure text encryption.
talkLock is voice encryption software for your cell phone. talkLock includes a server component so that you own all points of encryption and decryption of your communications.
A very powerful and secure encryption supporting multilevel algorithm hierarchy encryption(bit level),supports infinite length keys and equation creation utility(secondary key) for the utmost security.Support for multiple algorithms.All OS support(ja
This package is a modest implementation of a non-alphanumeric encryption algorithm in java. But I'm kinda looking forward to creating a whole gui app implementing most well-known encryption tools, "the paranoid secret-coder special brainkiller"!