Search Results for "java security for linux" - Page 27

Showing 1602 open source projects for "java security for linux"

View related business solutions
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    GEPETTO - Gene Prioritization in Java

    GEPETTO - Gene Prioritization in Java

    GEPETTO (GEne Prioritization ExTended TOol)

    ... interactions, gene expression, disease-causing probabilities, genomic context). GEPETTO is written in Java/Python and supported by an advanced modular architecture, which means that it can easily be modified and extended by the user, in order to include alternative scoring methods and new data sources. We intend to extend the system from gene-level to variant-level prioritization, by exploiting the variant data in the MSV3D database. Contact: bmhoan@gmail.com or walter.vincent.fr@gmail.com
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Cyberbit

    Cyberbit

    Visual Cryptography and Bit-Plane Complexity Segmentation in Python

    Hide secret messages in your pictures! Cyberbit lets you transmit a secret message to an intended person in a new manner. The secret message is an 1-bit deep black & white image. The message can contain written text, a drawing, a secret code etc. Using Visual Cryptography the application splits the secret message into two "shadow images" called <<shares>>. Any of the two shares will be embedded into a "normal" image file called by tradition <<vessel>>. You can use a method of hand to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Open-source weather database system for storage of weather/water observations, forecasts, analysis fields, and hindcasts. includes loading program for GRIB files. Visit project website (http://wdb.met.no) for further information. Please note: this project has now moved to http://wdb.met.no
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    PACS VM

    PACS VM

    ISO - Customized version of dcm4chee 2.17.3 for MySQL.

    1. Add JBoss Application Server 4.2.3.GA for JDK 6. 2. Cleanup for Windows and deprecated files. 3. Off CONSOLE records - http://forums.dcm4che.org/jiveforums/thread.jspa?messageID=4787
    Downloads: 1 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    steganoroute

    steganoroute

    Send steganographed text messages to mtr with fake hops in the network

    Steganoroute is a tool to send steganographed text messages to another computer over the network. The receiver must make a traceroute to the sender using the mtr program (and pressing 'd' once to switch the display mode to the continuous graph). This tool, the sender, creates several fake hops and makes them answer the ICMP packets (or not) to write the letters one by one on the mtr client screen.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    SMPTE 2022-1 library for VLC & co

    Optimized and cross platform SMPTE 2022 FEC library in C, Python, Java

    Project moved to GitHub. https://github.com/davidfischer-ch/smpte2022lib
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    RAWR - Rapid Assessment of Web Resources

    A web interface enumeration tool for simplifying red team reporting.

    Introducing RAWR (Rapid Assessment of Web Resources). There's a lot packed in this tool that will help you get a better grasp of the threat landscape that is your client's web resources. It has been tested from extremely large network environments, down to 5 node networks. It has been fine-tuned to promote fast, accurate, and applicable results in usable formats. RAWR will make the mapping phase of your next web assessment efficient and get you producing positive results faster!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    BUP Extractor

    Unpack quarantined files from McAfee AV

    McAfee VirusScan 8.7/8.8 packs and XORs malware to prevent the system from being re-infected and being re-detected by future AV scans. This tool is built using Python and extracts the malware into a folder with the information about the detection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    nsrlquery

    Provides tools to interface with NIST's NSRL RDS.

    The National Institutes of Science and Technology maintains the National Software Reference Library. As part of this, they keep track of SHA-1 hashes of millions of known pieces of software (the "Reference Data Set"). Unfortunately, there are very few tools to help users query the NSRL RDS. That's where nsrlquery comes in.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Turn Your Content into Interactive Magic - For Free Icon
    Turn Your Content into Interactive Magic - For Free

    From Canva to Slides, Desmos to YouTube, Lumio works with the tech tools you are already using.

    Transform anything you share into an engaging digital experience - for free. Instantly convert your PDFs, slides, and files into dynamic, interactive sessions with built-in collaboration tools, activities, and real-time assessment. From teaching to training to team building, make every presentation unforgettable. Used by millions for education, business, and professional development.
    Start Free Forever
  • 10

    STP

    MOVED TO GITHUB. Code here is STALE.

    THE STP CODE HAS MOVED TO GITHUB. THE CODE HERE IS STALE. PLEASE CHECKOUT THE FOLLOWING WEBSITE: http://stp.github.io/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    AWK~plus is the next generation script practice environment. The AWK Language specifications and a main extension of GNU GAWK. Combination of Dynamic and Static typing. Parallel computing that a lock is free, and is thread safe at a language level.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    WTMParse

    WTMParse

    Python script to parse Unix-like WTMP files

    Python script that was originally intended for use in forensic examinations that parses WTMP files from Unix-like operating systems and generates a CSS-styled HTML report containing login terminal, username, log start date and login time/date in a table. Good for postmortem forensic examinations or as a way of getting "last" like information where you don't have the ability to boot the machine in question but can grab the wtmp.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    LastBit Suite

    LastBit Suite

    A steganographic program to hide files into images

    This is a steganogric program that uses images last bits to hide information ( files ). It can crypt data with a rotation and a xor key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    This project is moved to: https://github.com/libyal/libewf This site still contains contibs.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 15
    Torshammer

    Torshammer

    Tor's Hammer - Slow POST Denial Of Service Testing Tool

    Tor's Hammer is a slow post dos testing tool written in Python. It can also be run through the Tor network to be anonymized. If you are going to run it with Tor it assumes you are running Tor on 127.0.0.1:9050. Kills most unprotected web servers running Apache and IIS via a single instance. Kills Apache 1.X and older IIS with ~128 threads, newer IIS and Apache 2.X with ~256 threads.
    Leader badge
    Downloads: 63 This Week
    Last Update:
    See Project
  • 16

    TxtStyle

    Command-line tool for colorizing log files based on regex.

    TxtStyle is a command line tool colorizing output of console programs. It makes it easier to visually scan log files or can simply be used to prettify output of console applications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Atomschlag

    Atomschlag

    A lightweight Webkit browser written entirely in Python

    Atomschlag is a project of writing a Webkit-based browser using PyGTK and PyWebkitGTK, completely in Python, to create a useable, secure and lightweight replacement of existing browsers in custom appliances. The primary project goals are: - small size; - minimal abilities to track you down based on the client info; - maximal compatibility with proxy-based anonymity layers such as I2P; - URL filtering for blocking ads and user tracking services; - simple and non-overloaded user interface.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    dnmap

    dnmap

    distributed nmap framwork

    dnmap is a distributed nmap framwork using a client/server architecture. The server reads the commands from a file and send them to each client. The client execute the nmap command and send the results back. Also see: www.mateslab.com.ar
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    UFOWardriving

    UFOWardriving

    UFO Wardriving è un software studiato per trovare le password wifi

    UFO Wardriving homepage: www.thc-scripting.it La versione per Windows è possibile trovarla nella homepage o su softonic UFO Wardriving è un software che contiene gli algoritmi di generazione della password dei router: *Alice *DLink *Fastweb...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 20

    furax

    Furax Fuzzer !

    Furax’s main goal is to simulate and to test non-standard usage of network-based applications and thus underline forgotten checks, bad / erroneous checking (off-by-one, invalid data, ...) by testing, among others, extreme cases for each expected data, by sending it in unexpected order, by not listening to the application's indications and warnings and by simulating unexpected situations (network lag, etc...)....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Library of Congress - Transfer Tools
    Tools developed by the Library of Congress and their partners in the National Digital Information Infrastructure and Preservation Program (NDIIPP) for the purpose of validation and transfer of data that conforms to the BagIt specification. This project has been moved to https://github.com/LibraryOfCongress
    Downloads: 3 This Week
    Last Update:
    See Project
  • 22
    Your friendly neighborhood hackers for hire. We are a group of individuals providing our clients the best support and troubleshooting advice and some of what we believe to be the best open source software and OS. Enjoy!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    vigenere.py

    vigenere.py

    this simple program implements the Vigenere cipher in python

    For details of this cipher see; http://en.wikipedia.org/wiki/Vigenere_cipher This cipher can be broken by frequency analysis, this is a toy project, and should not be used in situations where security is important.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    OxygenOffice Professional(OOOP, O2OP)is an enhanced version of free OpenOffice.org what is a multi-platform office productivity suite.OxygenOffice Professional contains more extras like templates, cliparts, samples, fonts and VBA support. Get 3.2.1
    Downloads: 83 This Week
    Last Update:
    See Project
  • 25
    ubnhd2

    ubnhd2

    A native, dual-bootable ubuntu for the HTC™ HD2 Phone (qsd8250 SoC)

    ubnhd2 is a security and pentest focused ubuntu/debian system that runs natively on the HTC HD2 phone. To boot this you need the Magldr on your phone and the first FAT partition should be named "SD". The wifi drivers are not included check the Ubuntu HTC HD2 Section from forum.xda-developers.com/showthread.php?t=1975081 for more details.
    Leader badge
    Downloads: 1 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.