Search Results for "java security for linux" - Page 17

Showing 1651 open source projects for "java security for linux"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    Build gen AI apps with an all-in-one modern database: MongoDB Atlas

    MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
    Start Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    CTS Surveyor

    CTS Surveyor

    Foot traffic and facial analytics for your business and home

    Surveyor is a software solution that monitors its environment via camera and gathers demographic information about the public in the surrounding area, providing important statistics such as number of people passing by as well as providing facial analytics to classify the pedestrians based on their age and gender. The statistical data is stored in a local database and is made available via RESTful API’s, and easy integration with other applications can be accomplished via a WebSocket...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    GRAMD® Personal Signature

    GRAMD® Personal Signature

    Digital Signature for PDF documents in Spanish

    Eng: Digital Signature with x.509 certificates and smartcards for PDFand PAdES format documents in Spanish for Windows OS (8 and 10). Esp: Firma Digital de documents electrónicos PDF en formato PAdES con certificados digitales X.509 y tokens criptográficos en español.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Secret File

    Secret File

    File Encryption/Decryption using password

    Secret File is a free and easy to use encryption/decryption app that can encrypt nearly any kind of file format using passwords. Files can be stored as personal or sent over the internet as confidential as the data of files are securely encrypted at the binary level itself and can be decrypted at any time and anywhere. You can also use multi-level protection for more secureness.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4

    ParamIT

    a Toolset for Molecular Mechanical Force Field Parameterization

    ParamIT is a toolkit aiding the development of molecular mechanical force field parameterization of small, drag like, molecules within CHARMM general force field (CGenFF) protocol. The developed toolkit helps the researchers in following ways: 1) automating the creation of multiple input files for quantum and molecular mechanics programs, 2) automating the output analysis and 3) substitute the use of full MM programs with a faster specialized one. The developed tools include: 1) generator of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Level Up Your Cyber Defense with External Threat Management Icon
    Level Up Your Cyber Defense with External Threat Management

    See every risk before it hits. From exposed data to dark web chatter. All in one unified view.

    Move beyond alerts. Gain full visibility, context, and control over your external attack surface to stay ahead of every threat.
    Try for Free
  • 5
    BLESS

    BLESS

    An SSH Certificate Authority that runs as an AWS Lambda function

    BLESS is an SSH Certificate Authority that runs as an AWS Lambda function and is used to sign SSH public keys. SSH Certificates are an excellent way to authorize users to access a particular SSH host, as they can be restricted for a single-use case, and can be short-lived. Instead of managing the authorized_keys of a host, or controlling who has access to SSH Private Keys, hosts just need to be configured to trust an SSH CA. BLESS should be run as an AWS Lambda in an isolated AWS account....
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    EasyUpload

    EasyUpload

    EasyUpload Server Accepts Images from Android to be Uploaded to a PC

    EasyUpload is a client-server project for uploading images from Android to a PC. The project is very simple. Just select the images from the Android device, establish a connection to the server using its IPv4 address and port number, and then upload the images in a fast way. Download the server project from here: http://easyupload.sourceforge.net The simplicity of using EasyUpload helps to avoid using Bluetooth for image transfer. The project just works for images and later it can...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    PivotSuite

    PivotSuite

    Network Pivoting Toolkit

    PivotSuite is a portable, platform-independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use a compromised system to move around inside a network. It is a Standalone Utility, Which can use as a Server or as a Client. If the compromised host is directly accessible (Forward Connection) from Our pentest machine, Then we can run pivotsuite as a server on the compromised machine and access the different subnet hosts from our pentest machine, Which was...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Offensive Web Testing Framework

    Offensive Web Testing Framework

    Offensive Web Testing Framework (OWTF), is a framework

    OWASP OWTF is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST so that pentesters will have more time to see the big picture and think out of the box. More efficiently find, verify and combine vulnerabilities. Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Easy Web automation library

    Easy Web automation library

    This library has been designed to work with selenium for web automation. It has incorporated functions and handled exception from selenium. It uses selenium library for web interfaces.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 10
    Walle 2.0

    Walle 2.0

    Walle 2.0 web

    Support multi-project, multi-environment one-click deployment and online, one-click quick rollback. Online order application, review, deployment, and real-time operation logs. Permissions, notifications, file fingerprints. Independent space resources like gitlab. Custom environment, environment variables. Project administrator, a notification mechanism, custom hooks in each process. Get through server management, grayscale release. Advanced gitlab-like user management mode. Online order...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    django-rest-auth

    django-rest-auth

    This app makes it extremely easy to build Django powered SPA's

    This app makes it extremely easy to build Django powered SPA's (Single Page App) or Mobile apps exposing all registration and authentication-related functionality as CBV's (Class Base View) and REST (JSON). Tivix rebuilt a NATO software system to organize and coordinate rescue missions for submarines in distress across the globe. The United Nations Partner Portal (UNPP) is a web application built for a group of UN agencies to simplify their business processes and streamline collaboration...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Xplico

    Xplico

    Xplico is a Network Forensic Analysis Tool (NFAT)

    Xplico is a Network Forensic Analysis Tool (NFAT). The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP, MGCP, MEGACO, RTP), IRC, WhatsApp... Xplico is able to classify more than 140 (application) protocols. Xplico cam be used as sniffer-decoder if used in "live mode" or in conjunction with netsniff-ng. Xplico is used...
    Downloads: 49 This Week
    Last Update:
    See Project
  • 13
    Somedo

    Somedo

    Social Media Downloader

    Social Media Downloader for Open Source Intelligence purpos. Supportes so far: Facebook Instagram Twitter
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    CryptoFlouze

    This software display the last prices of the top 20 cryptocurencies

    This software download and display the last prices of the top 20 cryptocurrencies on the market. All the data are updated at every run. The data is downloaded from : https://coinmarketcap.com/api/ For windows : Download this zip file, unzip everything in the same directory. The data are updated at every run. For other operating systems : Run it from the source. https://github.com/hamdyaea/CryptoFlouze Developer - Author Hamdy Abou El Anein
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    pwnCheck

    Password pwn check.

    This program is a graphical user interface for checking pwned passwords, it's writen with python and pyQT4. Program calculates password hash and then searches for matches with first 5 symbols (prefix) in https://api.pwnedpasswords.com, then full hash match is found localy on users PC.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    WiFi-Pumpkin

    WiFi-Pumpkin

    WiFi-Pumpkin - Framework for Rogue Wi-Fi Access Point Attack

    The WiFi-Pumpkin is a rogue AP framework to easily create these fake networks, all while forwarding legitimate traffic to and from the unsuspecting target. It comes stuffed with features, including rogue Wi-Fi access points, deauth attacks on client APs, a probe request and credentials monitor, transparent proxy, Windows update attack, phishing manager, ARP Poisoning, DNS Spoofing, Pumpkin-Proxy, and image capture on the fly. moreover, the WiFi-Pumpkin is a very complete framework for...
    Downloads: 19 This Week
    Last Update:
    See Project
  • 17

    Volunteer workshift scheduler

    Volunteer workshift scheduler for a helpline service

    Code written in Python finds the best possible schedule for volunteers while incorporating constrains and special requirements using CP-SAT Solver (Constraint Programming - boolean SATisfiability problem Solver). Java version is in development. The problem Arranging volunteers for a helpline service for the period of one month. There are three types of work that could be done on the same day: Phone shift: Every day. Chat shift: Mondays and Wednesdays. Observer...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    JPykotaGUI

    JPykotaGUI

    Interface gráfica para PyKota / Graphical interface for PyKota

    Projeto destinado a ser uma interface gráfica web para o software de controle de impressão PyKota (www.pykota.com). Não possui vinculo algum com projeto oficial. Para novas instalações com Ubuntu 12.04 server use o script install.sh. -- Para FreeBSD veja https://www.vivaolinux.com.br/artigo/Configurando-o-FreeBSD-e-PyKota-para-receber-o-JPyKotaGUI/?pagina=5 https://sourceforge.net/projects/jpykotagui-freebsd/ -- Project to be a GUI for the print control software PyKota...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    RouterSploit

    RouterSploit

    Exploitation Framework for Embedded Devices

    RouterSploit is an open-source exploitation framework focused on embedded devices such as routers, cameras, and IoT gadgets. It offers modules for exploits, scanners, and credentials testing, making it a valuable tool for security professionals and researchers. Inspired by Metasploit, it provides a CLI for executing attacks, testing device vulnerabilities, and simulating real-world exploitation scenarios in a legal and ethical manner.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 20
    Python Taint

    Python Taint

    Static Analysis Tool for Detecting Security Vulnerabilities in Python

    Static analysis of Python web applications based on theoretical foundations (Control flow graphs, fixed point, dataflow analysis) Detect command injection, SSRF, SQL injection, XSS, directory traveral etc. A lot of customization is possible. For functions from builtins or libraries, e.g. url_for or os.path.join, use the -m option to specify whether or not they return tainted values given tainted inputs, by default this file is used.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Virtual Laboratory Environment

    Virtual Laboratory Environment

    A multi-modeling and simulation environment to study complex systems

    VLE is a multi-modeling and simulation environment to study complex dynamic systems. VLE is based on the discrete event specification DEVS. and it implements the DSDE formalism (A merge of Dynamic Structure DEVS, DSDEVS, with Parallel DEVS, PDEVS). VLE provides a complete set of C++ libraries, called VFL (VLE Foundation Libraries), to develop DEVS models, to gets results of simulations, to launch simulation on cluster. The models can be developed with the DEVS formalism or with the classical...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    DACO-algorithm

    DACO-algorithm

    A novel transcription factor complex prediction algorithm.

    Eukaryotic gene expression is controlled through molecular logic circuits that combine regulatory signals of many different factors. Complexation of transcription factors and other regulatory proteins is a prevailing and highly conserved mechanism of signal integration within critical regulatory pathways and enable to infer controlled genes as well as the exerted regulatory mechanism. We developed DACO (domain-aware cohesiveness optimization), a novel algorithm that combines...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Syllog

    Syllog is a system for teaching logic, with anonymous answer logging

    Syllog is a system for teaching various forms of logic, including syllogistic logic. It consists of a student-facing Java Applet that runs in the student's browser, and a teacher-facing, server-based logging facility for recording the answers given by students. The student-facing part simply poses questions, to which the student must provide an answer. The teacher-oriented logging facility then logs the answers anonymously for further investigation by the teacher.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Security Monkey

    Security Monkey

    Security Monkey monitors AWS, GCP, OpenStack, and GitHub orgs

    ...It provides a single UI to browse and search through all of your accounts, regions, and cloud services. The monkey remembers previous states and can show you exactly what changed, and when. Security Monkey can be extended with custom account types, custom watchers, custom auditors, and custom alerters. It works on CPython 2.7. It is known to work on Ubuntu Linux and OS X. Security Monkey accesses accounts to scan via credentials it is provided.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    ROS Code

    ROS Code

    This is the official SourceForge Mirror of the ROS Code GitHub repo

    This project acts as a mirror for the ROS Code GitHub repository.
    Downloads: 0 This Week
    Last Update:
    See Project