Search Results for "security linux" - Page 21

Showing 1444 open source projects for "security linux"

View related business solutions
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    AntolliCrippi Java

    AntolliCrippi Java

    Simple and easy to use Java application to encrypt your files

    AntolliCrippi Java is a simple, easy to use and multi-language tool to encrypt your files. AntolliCrippi Java is a Password Based encryptor tool written in Java. Thanks to a very simple user interface allows you to encrypt/decrypt your files in a few second. It also provide folder encryption, by converting them into a zip file before. It's available in three languages Italian, English and Spanish. But thanks to his architecture it's easy to add many other languages. All the language...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Web KeePass Password Safe
    Web AND Mobile (Apple iPhone) based, multi user, java port of the KeePass project. A free, easy to use password manager which helps you to manage your passwords in a secure way. Focused on deep encryption and ease of use.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 3

    Yasca

    Source Code Analyzer

    Yasca is an open source program which looks for security vulnerabilities, code-quality, performance, and conformance to best practices in program source code, integrating with other open-source tools as needed. Yasca has been migrated to Github, and is available at http://scovetta.github.com/yasca and http://github.com/scovetta/yasca.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    samizdat

    Kerberized Messaging Toolkit for Java

    Samizdat is a toolkit for Java for building Kerberos secured distributed, message-oriented applications. The toolkit contains base classes that simplifies the management of Kerberos login contexts as well as flexibly sign and seal messages between principals using the Java GSS API. The toolkit contains Transformation classes for Kerberizing JMS traffic as well as a super-lean HTTP based protocol stack that supports both Synchronous (RPC) and Asynchronous modalities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 5
    IdMUnit is an xUnit automated testing framework for Identity Management solutions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Ralasafe Access Control Middleware focus on data-level privilege management, including database row/column and content privilege management. It also manages 2) login control; 3) function-level privilege management; and 4) URL privilege authentication
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    Password Generator Java Library

    Password Generator Java Library

    Password Generator Java Library.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    OhCrypt Encryption Tool
    OhCrypt lets you easily encrypt and decrypt files using some of the most popular algorithms, like AES, Blowfish and Serpent. With OhCrypt, you can secure your data with a password-based encryption algorithm through a clean and simple interface. It demonstrates state of the art of cryptology techniques, such as password hashing and salt. Ohcrypt also features self-extractable and self-destructive encrypted files
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Itilect FTP Proxy

    Itilect FTP Proxy

    Provide users with a managed temporary access to arbitary FTP

    This tool allows you to set proxied access for your users, using predefined FTP accounts. System works like this: Users connects to FTP proxy just like they do with a regular FTP, but using specially formed string as a username (string, that includes their internal profile name and desired target FTP) and their internal password. If they are allowed to access this host, proxy will establish connection with a target FTP and authenticate using real credentials. After that, server will act...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10
    DefendLine
    Low-cost, easy to replicate GSM-based remote controlled security system capable of taking and sending pictures of a guarded site.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Packet Sniffer

    Sniffs Packet on lan

    This project uses JPcap library. By using it you can view Packet level information about ongoing traffic on your network. For windows7 you need to run the Jar file as Admin.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    textcrypter

    textcrypter

    textcrypter is an encryption tool using vigenere cipher algorithm

    Textcrypter is an encryption tool using vigenere cipher algorithm. Vigenere use the same key/password to encrypt and decrypt a file (symmetric key cryptosystem). Result of the encryption process is a ciphertext in hexa number.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Underground IM - Java Instant Messenger

    Underground IM - Java Instant Messenger

    Underground IM is a free Java Instant Messaging solution.

    Underground IM is a free Java Instant Messaging solution. Both a client and a server are available. Underground IM is open source software distributed free of charge under the terms of the GNU General Public License. *Public Server: 64.94.101.216:5632
    Downloads: 8 This Week
    Last Update:
    See Project
  • 14
    egrsa

    egrsa

    rsa-elgamal comparison

    compare time of process between rsa and elgamal algorithm used to encryption and digital signature.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    gundercrypt [MOVED]

    A CLI text encrypting/ciphering program and library for java

    ** MOVED: to github.com/gundermanc/gundercrypt A CLI text ciphering program and library written in java that makes use of pseudo random numbers and a password (provided by the user) to generate encrypted text by selectively shifting each subsequent letter by a pseudo-random index, encoding it as a letter stored in a hidden position within the String, and then re shifting the encrypted String again by numeric values deduced from a password to provide a dual layer of security. Easily can be...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    InteliSpider
    Extendable and flexible e-Discovery tool designed to identify information on a file system, databases and within files (such as Zip, Jar, Outlook Personal Folders, Open Document and Office Open XML).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    ISWYAD

    ISWYAD

    ISeeWhatYouAreDoing - a tool for remote acces with very! low bandwith.

    ISeeWhatYouAreDoing is a useful tool for getting screenshots and executing commands over Tcp/Ip or Ftp. Because it has NO security the Tcp/Ip part shouldn't be used in public networks (Use a firewall! :)). It was designed for easily keeping an eye on what people in your home network are doing and (if necessary) turn f.e. your brother's computer off when he forgot. As said it is able to work on very bad connections. Bin/Bin.zip is the basic package with client and a gui server,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    GWT Agent Support Chat

    A secure implementation of GWT Client / Support Agent chat

    An implementation of an enterprise grade support agent chat system where users can login and chat with a support agent. This project aims to provide a clean and secure generic implementation to attempt to satisfy all use cases.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Tsukuba-GAMA provides user and credential management, using the Grid Security Infrastructure (GSI) based on Public Key Infrastructure (PKI), X.509 certificate, proxy certificate, and the concept of Virtual Organization (VO).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    DAL4j

    Data Access Layer 4 Java

    Welcome to Data Access Layer for Java (DAL4j) a set of command line tools and framework used to reverse engineer a MySQL or SQLServer database schema into a set of JPA Entity Beans. DAL4j can be useful for scenarios where there is an existing database schema but a technology other that JPA is used to interact with the database. DAL4j can provide an easy way to migrate your code base from other technologies such as JDBC or Hibernate to JPA. The beans generated can be 1 or two types:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    AntiDef

    Anti defacement command line tool

    AntiDef is written in order to handle with defacement attacks. This tool written in Java in a fast-and-dirty manner; However is works. This tool is working straight forward. Server administrator should run the application with the following specific parameters: path to the copy of the web site (source), path to the application directory, path to log directory and few more optional parameters. This tool compares the source and the destination files, then copies the "defaced" files if...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    Design policy enforcement

    Design policy enforcement

    This is a software design policy enforcement framework. It works at compile time which means that it can enforce policies at statically determinable points such as method calls and object creation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    broodROM Business Edition

    The most powerful i9001 rom for business environments.

    This rom is for Samsung Galaxy S Plus (i9001) only, it's the little brother of broodROM, but runs on stock kernel / theme, This rom allows all possible business related actions (such as using the car charging cradle). but don't make this stock look fool you, it has great performance, additional mods, tweaks and apps, also the gps works very good (adjust the gps.conf file to your country using my GPS Configuration tool). So are you interested in a stable bug-free rom which is capable for...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    JCrypTool - Eclipse based Crypto Toolkit
    JCrypTool moved to GitHub! See https://groups.google.com/d/topic/jcryptool-developers/nauEXL6vsbk/discussion for more information and visit our new project home at https://github.com/jcryptool
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    JPassword Recovery Tool

    JPassword Recovery Tool

    Password recovery tool for compressed archives and md5, sha-1/2 hashes

    This is a simple but sophisticated open source password recovery tool for M$ Windows, it can effectively 'crack' any password protected archive that can be decompressed by 7zip given enough time and resources. It can also bruteforce MD2, MD5, SHA-1 and SHA-2 hashes (SHA-256, SHA-384, SHA-512), CRC16, CRC32, CRC64 and Adler32 hashed passwords for both Windows, and Linux. It requires java 7u4 and above, and 7-zip v9.20 and up for archive recovery. Keeping these above applications up to date...
    Leader badge
    Downloads: 56 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB