Discover Nintex Workflow Cloud - the fastest, easiest way to improve the way you do business. This state-of-the-art technology - built in the cloud, for the cloud - gives you the ability to create powerful, integrated workflows independent of any single platform. With our intuitive, drag-and-drop workflow design canvas, you can configure and deploy automated business processes with speed and simplicity. Try it today!Sponsored Listing
OSI-Approved Open Source (851)
- GNU General Public License version 2.0 (534)
- BSD License (84)
- GNU Library or Lesser General Public License version 2.0 (72)
- GNU General Public License version 3.0 (71)
- Apache License V2.0 (42)
- MIT License (29)
- Academic Free License (18)
- Open Software License 3.0 (11)
- Artistic License (10)
- Apache Software License (8)
- Common Public License 1.0 (6)
- GNU Library or Lesser General Public License version 3.0 (6)
- Common Development and Distribution License (5)
- Adaptive Public License (4)
- IBM Public License (4)
- Public Domain (37)
- Other License (18)
- Creative Commons Attribution License (16)
- Linux (764)
- Windows (704)
Grouping and Descriptive Categories (589)
- All POSIX (224)
- OS Independent (194)
- All 32-bit MS Windows (136)
- 32-bit MS Windows (102)
- OS Portable (69)
- All BSD Platforms (44)
- 32-bit MS Windows (26)
- 64-bit MS Windows (26)
- Project is OS Distribution-Specific (9)
- Project is an Operating System Distribution (7)
- Project is an Operating System Kernel (4)
- Classic 8-bit Operating Systems (1)
- Mac (486)
- Modern (340)
- Android (244)
- BSD (230)
- Other Operating Systems (51)
- Status: 1 - Planning ×
Simple and easy to use password generator.
A decentralized node-based filesharing network utilizing RSA encryption. Features include search, bandwidth routing, chat, and while "Trusted Nodes" are operating, administrative control. Semi-anonymity provided when routing files through nodes.
Chat application with asymmetric encryption
A set of tools for querying and modifying the ACL's (access control lists) and ACE's (access control entries) of files, services, registry keys, printers, processes, threads, timers, mutexes, tokens, events, and semaphores in Windows 2000 and later
Um sistema de controle de acesso em Java que utiliza um processo de autenticação forte bifator.
AIP Enforcer ("Automated Internet Policy Enforcer") is designed to automatically manage access to the Internet. This is planned to be especially useful in an environment with Public Access Terminals.
A.I. security app. Development ceased.
This is a very powerfull criptography project that basicaly can be used to transmit or store secure data and study some cipher, hash and compression algorithms to understands how it works.
Secure communication provider.
AccesStream is a Java-based, embeddable identity and access management (IAM), security and access reporting platform. AccesStream includes Single Sign-On using SAML 2.0 and provides profile storage with LDAP v3 access for integration with Linux PAM3 weekly downloads
This project is about the creation of an access control (authenticaion and authorisation) service for BitTorrent. Providing such service will be a first step to allow using BitTorrent for sharing high value data.
A plugin for gedit to manage user accounts (username, passwords). The accounts a stored locally, encrypted of course.
AceJudge is a system for managing programming contests. AceJudge's basic features include automatic judging of submitted programs, answering to clarification questions about problem descriptions, reevaluation of programs, real time ranking etc.
A Spring.NET security framework port of the Java based Spring security framework, Acegi Security.
The Ada Cryptographic Framework (ACF) is a set of Ada packages that implement the most popular cryptographic algorithms. The main goal of the proyect is to implement a complete set of cryptographic primitives entirely in Ada 95
Adminix is a software for Linux based Systems that runs on deamon basis and allows admins to manage system via Telnet and HTTP. It has IDS, admin tools, LOG viewers, Statistics etc In one word it aims to be help to admins
AdvIDS - Host Based Intrusion Detection System designed for Windows NT Platform. AdvIDS will detect any attempt to compromise system security.
a powerfull extensible and modular multiplataform tool to research security bugs in http pages automatically.
Simple tool to detect and delete the most common adwares/spywares.
IRC client which enables secure encryption using the Blowfish standard. Just an idea and a few lines of code at the moment. UNUSABLE.
This is a program which encrypts all kind of data. I implemented GOST 28147-89 (64, 256)and extended Blowfish (64, 512) in CFB mode. The key is retreived from SHA256/512 hashed user password. In future there will be Mono port.2 weekly downloads
Easy to use wizard-like GUI tool to recover WEP/WPA keys using the aircrack-ng suite. Written in C# using Mono, GTK#, and the Funkit library.
Most of the various hashing algorithms being used for password storage currently are not very secure. People have begun to use combinations of these algorithms as a workaround. This project aims to identify weak combinations.