Search Results for "java security for linux" - Page 12

Showing 1651 open source projects for "java security for linux"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 1

    Empact Foundation Class Library

    Cross-platform C++ library for use as a default application framework.

    ...Features include: * Threading & synchronization * Socket programming: SSL, NanoMsg & ZMQ * File I/O utilities: zlib, ini, yaml * Native Database access: MySQL, SQLite, BerkleyDB, Postgre, REDIS and ODBC * Built-in mini XML parser; optional EXPAT, LIBXML and MSXML support * Network protocol stack: HTTP, FTP, SMTP, POP3, SOAP, XMLRPC * Scripting languages: Perl, Python, JavaScript, VBScript, Java, Lua, TCL, Squirrel * Cloud Computing: AWS * Encryption: OpenSSL * Platforms: Linux/Posix, Windows, Arduino * Over 500+ highly reusable classes. 4000+ fully documented functions. Follow the 'Wiki' link above to explore everything about the framework.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Email to Calendar Event ETE

    Email to Calendar Event ETE

    The python App/Skrypt automaticly add important events into calendar.

    It is use AI running localy and model you can choose. Supproted two API first is as default is Llama, second if full LM Studio api. Skrypt have a tool for automatic add to scheduler or cron-not tested enought. Scrypt now not working with Microsoft outlook and Google gmail, for certifications and api polici reasons . Fuly tested on Seznam.cz* services provider, if you have difrent provier with same type of security or autentification it will be working. *Email is using standart...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    lixa

    lixa

    LIXA, LIbre XA, is a free and open source XA transaction manager

    LIXA (LIbre XA) is an open source and free Transaction Manager implementing the distributed transaction processing "XA specification" and "TX (transaction demarcation) specification" according to the X/Open CAE Specification. LIXA implements even XTA: XA Transaction API, an innovative API that implements XA transactional context passing among different applications. LIXA is a Transaction Manager but it's not a Transaction Monitor: this is the distinguishing feature of the project. LIXA...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    xTuring

    xTuring

    Easily build, customize and control your own LLMs

    xTuring is an open-source AI personalization software. xTuring makes it easy to build and control LLMs by providing a simple interface to personalize LLMs to your own data and application. xTuring provides fast, efficient and simple fine-tuning of LLMs, such as LLaMA, GPT-J, Galactica, and more. By providing an easy-to-use interface for fine-tuning LLMs to your own data and application, xTuring makes it simple to build, customize and control LLMs. The entire process can be done inside your...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    eCxx

    eCxx

    A C++ library for AVR and NodeMCU

    ...The Makefile build system and some of the tools would only run on Linux. However, the library source code should be portable enough to be built using other build systems for AVR and NodeMC
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Muse: Middleware Universal Scripting idE

    Muse: Middleware Universal Scripting idE

    Automate: WebSphere; WebLogic; JBoss; Glassfish; Tomcat; Linux, WinRM

    .... *** OPEN SOURCE - GPL3/EPL. Use Python / Jython to automate WebSphere, WebLogic, JBoss, Glassfish and Tomcat Middleware Estates over JMX, both SSL and non-SSL + Linux SSH (agent-less) + WinRM Target all 5 servers, Linux and WinRM from the same workspace. Familiar Eclipse based Jython and Python Development IDE, pre-configured and ready to go. 4-Click Installer. Win x64, Linux WINE x64. Built-In JVM. Java 8/9/10, Amazon Corretto, JETPack13/14/16, IBM SDK Compatible. *** Now with powerful JBoss / GlassFish / Tomcat / Linux Active Auditing Framework. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Crawlab

    Crawlab

    Distributed web crawler admin platform for spiders management

    Golang-based distributed web crawler management platform, supporting various languages including Python, NodeJS, Go, Java, PHP and various web crawler frameworks including Scrapy, Puppeteer, Selenium. Please use docker-compose to one-click to start up. By doing so, you don't even have to configure MongoDB database. The frontend app interacts with the master node, which communicates with other components such as MongoDB, SeaweedFS and worker nodes. Master node and worker nodes communicate...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    KubiScan

    KubiScan

    A tool to scan Kubernetes cluster for risky permissions

    A tool for scanning Kubernetes cluster for risky permissions in Kubernetes's Role-based access control (RBAC) authorization model. KubiScan helps cluster administrators identify permissions that attackers could potentially exploit to compromise the clusters. This can be especially helpful on large environments where there are lots of permissions that can be challenging to track. KubiScan gathers information about risky roles\clusterroles, rolebindings\clusterrolebindings, users and pods,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    imgp

    imgp

    Multi-core image resizer and rotator. Go crunch 'em!

    imgp is a command line image resizer and rotator for JPEG and PNG images. If you have tons of images you want to resize adaptively to a screen resolution or rotate by an angle using a single command, imgp is the utility for you. It can save a lot on storage too. Powered by multiprocessing, an intelligent adaptive algorithm, recursive operations, shell completion scripts, EXIF preservation (and more), imgp is a very flexible utility with well-documented easy to use options. imgp intends...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    Prime QA

    Prime QA

    State-of-the-art Multilingual Question Answering research

    PrimeQA is a public open source repository that enables researchers and developers to train state-of-the-art models for question answering (QA). By using PrimeQA, a researcher can replicate the experiments outlined in a paper published in the latest NLP conference while also enjoying the capability to download pre-trained models (from an online repository) and run them on their own custom data. PrimeQA is built on top of the Transformers toolkit and uses datasets and models that are directly...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    The Related Values Processing Framework helps the integration of Process Control Data Historian Systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    SMC - The State Machine Compiler

    SMC - The State Machine Compiler

    Translates state machine into a target programming language.

    SMC takes a state machine stored in a .sm file and generates a State pattern in 14 programming languages. Includes: default transitions, transition args, transition guards, push/pop transitions and Entry/Exit actions. See User Manual for more info.
    Leader badge
    Downloads: 73 This Week
    Last Update:
    See Project
  • 13
    Security Log Generator

    Security Log Generator

    Generates logs of typical formats that would often be found in a SOC

    Generates logs of typical formats that would often be found in a SOC. As of 31st January 2023, it supports IDS, Web Access and Endpoint log formats. Can generate a specific number of events in a linear fashion or use a waveform to add 'bumpiness' to your data. The code is modular and extensible, adding additional formats can be done with relative ease.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    AWS Jupyter Proxy

    AWS Jupyter Proxy

    Jupyter server extension to proxy requests with AWS SigV4 authentican

    A Jupyter server extension to proxy requests with AWS SigV4 authentication. This server extension enables the usage of the AWS JavaScript/TypeScript SDK to write Jupyter frontend extensions without having to export AWS credentials to the browser. A single /awsproxy endpoint is added on the Jupyter server which receives incoming requests from the browser, uses the credentials on the server to add SigV4 authentication to the request, and then proxies the request to the actual AWS service...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    PUTinCoin

    PUTinCoin

    This is the REAL PutinCoin cryptocurrency project!

    wave Hello! This is the REAL PutinCoin cryptocurrency project! We are developing a dedicated fan cryptocurrency for Russia, the PUTinCoin (PUT). Our coin shows the, that the blockchain connects people and does not seperate them and that cooperation is always better then separation. If you like to support, pls. write to admin@putincoin.org or contribute to the open repositories. eyes We are interested in Cryptocurrencies, Blockchain-Technology and Russia! revolving_hearts We're looking...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Packj

    Packj

    Stops Solarwinds-, ESLint-, and PyTorch-like attacks

    Packj is a security tool that analyzes open-source packages for potential security risks, supply chain attacks, and malicious behaviors. It helps developers vet dependencies before using them in projects, reducing vulnerabilities in software development.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Bio7
    The application Bio7 is an integrated development environment for ecological modelling and contains powerful tools for model creation, scientific image analysis and statistical analysis. The application itself is based on an RCP-Eclipse-Environment (Rich-Client-Platform) which offers a huge flexibility in configuration and extensibility because of its plug-in structure and the possibility of customization.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 18
    The Art of Programming

    The Art of Programming

    A collection of practical tips can be found at the bottom of this page

    The Art of Programming (Second Edition) is a curated collection of programming problems and solutions originally derived from the Microsoft 100 Interview Questions blog series, later refined into a long-running tutorial and ultimately a published book. Created by July, the series began in 2010 and has since evolved into an in-depth exploration of algorithmic thinking, data structures, and coding interview preparation. The repository brings together 42 classic programming problems from the...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    PhoenixC2

    PhoenixC2

    Command & Control-Framework created for collaboration in python3

    PhoenixC2 is a command & control framework. The purpose of this software is, to aid red teamers and penetration testers in their operations, by providing a way to manage hacked devices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    password-generator

    password-generator

    passwort, passwort-generator, password, password generator

    Passwort-Generator in Python. passwort-generator.exe md5 hash: fccfcf626e84382fd63d079f94f195f1
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    CrackMapExec

    CrackMapExec

    A swiss army knife for pentesting networks

    CrackMapExec (CME) is a versatile post-exploitation and enumeration tool designed for pentesters and red teams to assess Active Directory environments. It supports credential spraying, command execution, file transfers, and module-based extensions across SMB, RDP, LDAP, and other protocols. CME provides automation and insight into Windows networks and is commonly used during lateral movement and domain enumeration phases.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 22
    TANGO Control System
    TANGO is a device oriented control system for Linux and Windows. It provides a framework in C++, Java and Python for implementing distributed control objects. TANGO has a full set of tools and hundreds of device servers.
    Leader badge
    Downloads: 9 This Week
    Last Update:
    See Project
  • 23
    Pentest-Tools

    Pentest-Tools

    A collection of custom security tools for quick needs.

    Pentest-Tools is a collection of penetration testing scripts and utilities designed to help security professionals and ethical hackers perform vulnerability assessments. It includes a wide range of tools for tasks like web scraping, reconnaissance, data extraction, and network analysis. The suite is modular, allowing users to choose the tools that best fit their specific pentesting needs, from web application analysis to network penetration testing.
    Downloads: 15 This Week
    Last Update:
    See Project
  • 24
    Classic HWUT - rename of previous HWUT

    Classic HWUT - rename of previous HWUT

    Software Unit Tests (Language Independent Approach)

    Automation of Unit and System Tests. Tests can be implemented in any language and on many platforms. The flexible approach enables the inclusion of many types of tests, such as memory leak checks (using valgrind), coding rule checks, complexity checks, etc. Tests are run by a simple call to hwut in a base directory of a project. In particular for C, HWUT supports make file generation using 'sos' and 'sols' modes. Remote control-able function stubs may be generated using the 'stub' mode....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    The_Deck_Linux

    Portable Penetration Testing Operating System

    It is an Portable Penetration Testing Operating System designed for Beagle Bone AI. It is an debian based operating system fully packed with all latest Hacking Tools. The Root file system used in this Deck Linux is Ubuntu 20.04 LTS. It can be installed in Beagle Board AI and can use as a replacement for Laptop, Desktop. It can be placed on a drone too. It has a pre-installed MeshDeck (written by Philip Polstra) so it can be runned in a ZigBee network. We can attacks from up to a mile away...
    Downloads: 0 This Week
    Last Update:
    See Project