Showing 5818 open source projects for "java open source"

View related business solutions
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Say goodbye to broken revenue funnels and poor customer experiences Icon
    Say goodbye to broken revenue funnels and poor customer experiences

    Connect and coordinate your data, signals, tools, and people at every step of the customer journey.

    LeanData is a Demand Management solution that supports all go-to-market strategies such as account-based sales development, geo-based territories, and more. LeanData features a visual, intuitive workflow native to Salesforce that enables users to view their entire lead flow in one interface. LeanData allows users to access the drag-and-drop feature to route their leads. LeanData also features an algorithms match that uses multiple fields in Salesforce.
    Learn More
  • 1
    GenoGUARD is a DNA sequence screening software that implements the best match method recommended by the federal government to detect the presence of biosecurity threats in synthetic DNA orders.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    RC4-32.ASM

    Code to brute force the 32-bit key used to RC4 encrypt .pwl files.

    PROJECT HAS MOVED TO GITHUB: https://github.com/alex-georgiou/rc4-32.asm Code to brute force the 32-bit key used to RC4 encrypt .pwl files. Assembles to a 992 byte .COM file using the Intel Architecture Assembler v1.0 Copyright (c) 1998 augusto at dcc.ufmg.br. http://web.archive.org/web/19981205090800/http://www.dcc.ufmg.br/~augusto/project/iasm.zip
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    This project provides a modification of the Linux boot sequence that allows a continuation of the boot process only if an encrypted filesystem can be used after entering a password. Without a successfully mounted filesystem the boot process will stop
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Aimed for web app security with hope of quick reference. WAS papers are scattered among hundreds of resources, some of which are likely to be broken links in some time. All sec pros wish their papers reach the whole world widely for perfect security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Collect! is a highly configurable debt collection software Icon
    Collect! is a highly configurable debt collection software

    Everything that matters to debt collection, all in one solution.

    The flexible & scalable debt collection software built to automate your workflow. From startup to enterprise, we have the solution for you.
    Learn More
  • 5
    For security reason you should remove all users and groups not used on a linux-system. This script will help you to find out which ones.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    This is a simple but robust application to manage your User Ids and password for various client. This application is best suited for those who is running a Web hosting or Domain registration. This application is built on .Net 2.5 framework.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    stlth (or "stealth") is a very simple script that uses cryptsetup to provide deniable encryption, or "steganography".
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    TBFAA/encoder
    A program that encrypts multiple files. It uses new encryption algorithms, such as a Three-Block Feistel chiper, ArchFurry's algorithm and a new hash function. Licensed under the ISC.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Simple Read-Only protection tool for removable devices. Make Empty File on selected disk with required size. Most common usage - place executable file on USB-flash drive and run it for space filling. When free space will need, delete empty file.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Yeastar: Business Phone System and Unified Communications Icon
    Yeastar: Business Phone System and Unified Communications

    Go beyond just a PBX with all communications integrated as one.

    User-friendly, optimized, and scalable, the Yeastar P-Series Phone System redefines business connectivity by bringing together calling, meetings, omnichannel messaging, and integrations in one simple platform—removing the limitations of distance, platforms, and systems.
    Learn More
  • 10
    Java implementation of MIKEY (Multimedia Internet KEYing, RFC 3830).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Asgard is a tool to test and monitoring a lot of elements and integration sequences
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    MUTE is a secure, anonymous, distributed communications framework. Node-to-node connections are encrypted, and messages are routed using an ant-inspired algorithm. The first MUTE-based app supports anonymous file sharing.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 13
    Automaton: An Automated Forensic Auditing, Security & Control Framework
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Secure Enterprise File Transfer Server
    SEFT is an appliance based (physical or virtual) secure enterprise file transfer system. It is able to send and receive files in an ad-hoc fashion or based on a schedule. SEFT supports many communication protocols such as HTTPS, SFTP, FTPS, SOAP, etc
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Brute-force the input parameters of your numeric models when only the output is known.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    pyshot, windows session recorder/auditor
    pySHOT is a session recorder for windows. (soon linux session recorder also) It's a client/server python app using gearman. To use pyshot you must install pyshot-client from https://sourceforge.net/projects/pyshot-client/ on monitored server
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Alkindus is an automated solver for short monoalphabetic substitution ciphers without word divisions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    ScardFace is a python3k library for interfacing with smart cards, which supports Plug-and-Play readers inclusion and threading. It also offers classes for manipulating APDU cmds and resps, and use them in a transport-protocol-independent fashion.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 19
    TuxFrw is a set of scripts created to ease the way Linux IPTables rules are configured. Using TuxFrw an user can configure his own Linux / Netfilter based network firewall, simply passing some IP address numbers and other services utilization policie
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    A command-line to help encipher and decipher your password based on a simple algorithm. Java version provides GUI.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    Steghide UI is a nifty GUI written by Drunken.Canadian for the console application steghide as the name suggests. It allows the user to everything steghide can but with a nice user friendly GUI. Now, steghide UI has a new options panel.
    Leader badge
    Downloads: 41 This Week
    Last Update:
    See Project
  • 22
    cst allows to split (or share) "secret" files, like private keys, into number of equal parts. After that, secret can only be recovered by collecting all parts together. If any of this parts is lost, the secret is lost too.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    jacknsee
    Jacknsee is an educational network security tool. Its purpose is to teach students in computer science how basic hijacking techniques are used to corrupt a network. Two scenarios have been implemented: Man in the Middle and Denial of Service.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Encrypted notepad The software can take your text to maintain confidentiality.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Scripts for manage X509 certificates: - create CAs - sign requests and revoke certificates - ocsp responser
    Downloads: 0 This Week
    Last Update:
    See Project