Showing 1343 open source projects for "java%20game%20script"

View related business solutions
  • Retool your internal operations Icon
    Retool your internal operations

    Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.

    Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
    Build an app in Retool
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • 1
    SWAT

    SWAT

    Security Workflow Analysis Tool

    The Security Workflow Analysis Tool (SWAT) is a platform for modelling and analyzing workflows. It comes with ananlysis approaches to search for data leaks in workflows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    JMixNet is a Java implementation of a so called Chauminian Mixnet (or mix-net, or even mix net, at your will ;). It is an anonymous communication network, designed to provide anonymity in data transfers among Internet users.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    CrococryptQuerl

    CrococryptQuerl

    CrococryptQuerl is a web-based file encryption & transfer tool

    CrococryptQuerl =============== CrococryptQuerl (CQuerl) is a web-based open-source file encryption and file exchange tool. If you trust the application service provider which is running CrococryptQuerl, it can be seen as an "anonymous & encrypted safe deposit box for computer files". ---INTRO--- The encryption is done on-the-fly using the user's password. Of course, this requires a trusted TLS/SSL connection to the server running CQuerl. The user provides a file and password and...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4

    AESA

    All-purpose Encryption and Security Adaptation

    Starting as a personal study project, I have decided to share this security project. For now, it is a JAVA program that can be used to encrypt and decrypt simple file content (ie files), possibly later evolving into a utility with user interface and/or a library
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5
    SecSy: Security-oriented Log Synthesis

    SecSy: Security-oriented Log Synthesis

    Tool for synthesizing business process logs.

    SecSy is a tool for security-oriented log synthesis. Besides basic synthesis properties (cases per day, office hours, randomized activity duration, ...), its detailed parameter setting for simulating business processes also allows to specify data usage (objects + access modality), actors for process activities and access control constraints for task/object permissions. It is also capable of enforcing/violating specific security properties on process traces, such as SoD/BoD, Unauthorized...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    PasswordManager

    PasswordManager

    Gestionnaire de mot de passe réseau avec système d'autorisation.

    Gestionnaire de mot de passe en réseau, écrit en Java, basé sur une système d'autorisaton. Les échanges sont chiffrés avec des clefs hybrides(RSA/AES). Le système d'autorisation se repose sur l'appartenance à un ou plusieurs groupes, liés à des groupes LDAP. La connexion des utilsateurs utilise l'authentification LDAP. Les mots de passe stockés sont chiffrés à l'aide d'une clef symétrique (AES).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    SEWOL: Security-oriented Workflow Lib

    SEWOL: Security-oriented Workflow Lib

    Java Library for workflow handling

    SEWOL provides support for the handling of workflow traces. It allows to specify the shape and content of process traces in terms of entries representing the execution of a specific workflow activity. Currently it supports plain text, Petrify, MXML and XES log file types. In order to specify security-related context information, SEWOL provides access control models such as access control lists (ACL) and role-based access control models (RBAC). SEWOL uses and encloses the following...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    SEPIA: Security-oriented PN Framework

    SEPIA: Security-oriented PN Framework

    Petri net framework for security related modeling and reasoning.

    SEPIA provides implementations for various types of Petri nets. Along Place/Transition-nets, it supports Petri nets with distinguishable token colors and defines coloured workflow nets, where coloured tokens are interpreted as data elements used during process execution. To support information flow analysis of processes, SEPIA defines so-called IF-Nets, tailored for security-oriented workflow modeling which enable users to assign security-levels (HIGH, LOW) to transitions, data elements and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Look at the official GitHub: https://github.com/JasperBarzilaij/Encryption-Program
    Downloads: 0 This Week
    Last Update:
    See Project
  • Easy-to-use Business Software for the Waste Management Software Industry Icon
    Easy-to-use Business Software for the Waste Management Software Industry

    Increase efficiency, expedite accounts receivables, optimize routes, acquire new customers, & more!

    DOP Software’s mission is to streamline waste and recycling business’ processes by providing them with dynamic, comprehensive software and services that increase productivity and quality of performance.
    Learn More
  • 10
    Cygnus Editor

    Cygnus Editor

    Java text editor with AES file encryption.

    Cygnus Editor is a basic text-editing program created entirly in Java. And it's most commonly used to view or edit text files (.txt). A text file is a file type typically identified by the .txt file name extension. In Cygnus Editor you can encrypt your text document, so nobody can see the content of your document. Also you can decrypt your document and edit it. Cygnus Editor uses AES-256 encryption.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11

    supercam

    An apk like oscam running in DTVOS

    An apk like oscam running in DTVOS
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    jellyphish

    Don't get phished!

    ...Jellyphish is the first ever script that pings a websites and tells the users if a given website is a phishing site or not. What are the minimum system reqirements? 1) jre or jdk installation on your system.(http://www.oracle.com/technetwork/java/javase/downloads/jre7-downloads-1880261.html) 2) Internet connection.(your system should be connected to the internet when the script is running.) How to use it? 1) Run the jar file. 2) Now copy & paste the url in the url textfield.(use ctrl+v to paste) 3) Select the site which you think that the webpage belongs from the drop down list. 4) Now click on the check Button. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    MV2
    There are a lot of tools and plugins to fix security issues of the dignified mail system. The goal of this project is to redefine a system that takes the problems of our time into account. Be sure to visit this project on github: https://github.com/mv2project/mv2
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    jPBC is a Java porting of the PBC Library, a Pairing-Based Cryptography Library written in C. It supports symmetric and asymmetric pairing. With jPBC it is really easy to use such a strong cryptographic primitive.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 15
    A Microsoft(tm) RDP session recorder and/or child safe browsing enforcer. Has a screen saver,keyboard logger and screen scraping ability. RautorViewer replays sessions and can do textual searches on scraped content.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 16

    NinthTest JCA Provider

    A security provider for the Java™ Cryptography Architecture

    The NinthTest JCA Provider is a security provider for the Java™ Cryptography Architecture, focused on supporting candidate, reference, academic, and experimental cryptographic algorithms and security services. Because the services provided by the NinthTest JCA Provider are exploratory/provisional in nature, the NinthTest JCA Provider is not recommended for use in security-critical applications or environments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Text Encryption and Decryption

    Text Encryption and Decryption

    Anoncrypt-Text Encryption and Decryption Website in Java(Struts2)

    Anoncrypt by HTCoders is a web based Text Encryption and Decryption Project using Java Technology following Struts2 Framwork . It Consist of two modules > Password based Encryption (Symmetric Encryption) > Self-Destructible Message Service (Once the message is read , it is destroyed and cant be decrypted again .)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Asimba

    Access Management and Single Signon platform

    Asimba is an application for managing access, supporting multiple identity provider protocols, like SAML and A-Select, as well as authentication methods, like LDAP, Radius but also One Time Password/SMS and PKI. Built as J2EE application, it provides a modular framework that can be integrated in many IT systems as access component.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Secure Data Manager
    Password Manager - Manage your passwords and private information in one secure application for web sites, computers, programs. Search, add, edit, delete, print, etc. Java app, runs everywhere. Uses SunJCE crypto.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Encrypted Notepad
    UPDATE 2024: Get a new version here: https://github.com/ivoras/EncryptedNotepad2 "Encrypted Notepad" does only one thing, but aims to do it perfectly - a Notepad-like simple text editor where files are saved (and later loaded) encrypted with industrial strength algorithms. Available both for the desktop (as a Java application) and on Android. Unencrypted data is never stored on-disk. Source is released (on SourceForge) under the BSD license.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 21
    Shortcut Virus Remover

    Shortcut Virus Remover

    Sample and fast software to remove Shortcut Virus

    Shortcut Virus Remover is an easy to use application, capable of detecting the presence of the Shortcut threat. The software can easily fix the damage done by the virus, thus restoring all the icons in the selected drive. The application is lightweight and requires only that you select the drive you wish to clean.
    Downloads: 28 This Week
    Last Update:
    See Project
  • 22
    SERAM: Security Reasoning Framework

    SERAM: Security Reasoning Framework

    Framework for security-related definition and reasoning.

    The content of SERAM has been moved to the security-oriented workflow library SEWOL: https://sourceforge.net/projects/jawl/ SEARM provides support for the definition of access control policies, such as ACLs and RBAC models. Additionally, it allows to specify inference policies and comprises techniques for reasoning about inferences and information distribution along a set of inference rules.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Java Vulnerable Lab - Pentesting Lab

    Java Vulnerable Lab - Pentesting Lab

    a deliberately vulnerable Web application

    This is Vulnerable Web Application developed for course by Cyber Security and Privacy Foundation (www.cysecurity.org) for Java programmers The full course on Hacking and Securing Web Java Programs is available in https://www.udemy.com/hacking-securing-java-web-programming/ WAR file: ---------- https://sourceforge.net/projects/javavulnerablelab/files/latest/JavaVulnerableLab.war/download Virtualbox VM file: -------------------------- http://sourceforge.net/projects/javavulnerablelab/files/v0.1/JavaVulnerableLab.ova/download Credentials for the VM: ------------------------ Username: root Password: cspf Stand-alone file: (Run the Jar file directly) -------------- http://sourceforge.net/projects/javavulnerablelab/files/v0.2/JavaVulnerableLab.jar/download
    Leader badge
    Downloads: 2 This Week
    Last Update:
    See Project
  • 24
    BinaryCrypt

    BinaryCrypt

    Binary Conversion Calculator

    With BinaryCrypt, you can convert between regular text, binary, hexadecimal, octal decimal and decimal. You can convert only decimal (as of right now) to any base up to base 64. You can also save your converted text to a file or open a converted text file to decrypt the message, and perform basic arithmetic in binary. The git repo for the C# code is located at: https://github.com/m1r4g3/BinaryCrypt-.Net
    Downloads: 4 This Week
    Last Update:
    See Project
  • 25
    JDownloader Password Decryptor Portable

    JDownloader Password Decryptor Portable

    Decrypts JDownloader ejs files (works with Beta install too)

    JDownloader Password Decryptor Portable is the SecurityXploded's JDownloader Password Decryptor packaged with a PortableApps.com launcher as a portable app, so you can extract passwords from your JDownloader from this program on your iPod, USB flash drive, portable hard drive, etc. It has all the same features as JDownloader Password Decryptor, plus, it leaves no personal information behind on the machine you run it on, so you can take it with you wherever you go.
    Downloads: 9 This Week
    Last Update:
    See Project