Showing 53 open source projects for "academic"

View related business solutions
  • Red Hat Ansible Automation Platform on Microsoft Azure Icon
    Red Hat Ansible Automation Platform on Microsoft Azure

    Red Hat Ansible Automation Platform on Azure allows you to quickly deploy, automate, and manage resources securely and at scale.

    Deploy Red Hat Ansible Automation Platform on Microsoft Azure for a strategic automation solution that allows you to orchestrate, govern and operationalize your Azure environment.
  • Free and Open Source HR Software Icon
    Free and Open Source HR Software

    OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.

    Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
  • 1
    Zinas : Zinas Is Not A Scanner a simple tool written in python to be used by penetration-testers it can brute force FTP,TELNET and POP3 , and verify SMTP users, and fuzzes POP3 password field
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    The goal of the project is to create an example of Java ME based application for SMS message encryption. This aplication is only of academic interest and is not suitable for real safe SMS encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    An open-source configurable virtual testbed (based on the Eucalyptus cloud platform) for Intrusion Detection System Evaluation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    This project aims to provide an open source Matlab-based development framework to conduct side-channel attacks. Part of this framework are Matlab classes, functions, scripts, and demos.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Tigerpaw One | Business Automation Software for SMBs Icon
    Tigerpaw One | Business Automation Software for SMBs

    Fed up with not having the time, money and resources to grow your business?

    The only software you need to increase cash flow, optimize resource utilization, and take control of your assets and inventory.
  • 5
    an implementation of the attack on the RC4 cipher as described in: "Efficient Reconstruction of RC4 Keys from Internal States" by Eli Biham and Yaniv Carmeli. plus optimizations of the attack
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Stegonography project developed for ITS 450 - Software Assurance under the instruction of Prof. Sydney Liles.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    NetSentry Gofer is a personal software firewall which secures your personal computer from unauthorized access through a remote host, such as the Internet.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    A novel graphical password tool (YAGP) inspired by Draw-A-Secret (DAS) is implemented in this project. The tool has the advantages of free drawing positions, strong shoulder surfing resistance and large password space.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    USA CRYPT is a smart, powerful and easy-to-use file-encryption tool that works with Advanced Encryption Standard (AES) algorithm - 256bit key. Operation mode: OFB
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cybersecurity Management Software for MSPs Icon
    Cybersecurity Management Software for MSPs

    Secure your clients from cyber threats.

    Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
  • 10
    Crypt-EG is an easy visual cryptosystem program that implements ElGamal method using elliptic curves.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    This application authenticates data from network by creating a short password from all transferred bytes which can be manually compared. Based on a paper by Moni Naor, Gil Segev and Adam Smith. See www.wisdom.weizmann.ac.il/~gils/papers/TightBounds.pdf
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Open Privilege Management Infrastructure
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    home-firewall.sourceforge.net -- Sets up a basic firewall using Linux iptables. Provides a way to add allowed sites dynamically. Home-firewall makes extensive use of shell scripts and Linux's cron utility. Maintain order in your school. ChamTech.net
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    It is a fine tool to encrypt your data.It uses a dinamic algorithm and a nice interface.It`s easy to use and helpful.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Securing mails without involving user. Secures them as often as possible if it is possible. Shows security-state and process of mails and mail-partners.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    LINReS is a tool which can be used by Incident Response and Computer Forensic Teams during initial response phase to collect volatile and other non-volatile data from a compromised Linux machine using statically compiled binaries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    the pupose of this program is seal the data in a bmp file;the bmp file will still ok;you can unseal the data from the bmp file in the future
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    The J-WASTE project aims at the implementation of a platform independent client/server Java implementation of the WASTE protocol. This project started as a mandatory project course in networking at the Luleĺ University of Technology in Sweden.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Peer Agent is a system that enable a group of users to carry out automated complex interaction via email services without relying on a trusted third party.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Fingerprint Laboratory - a portable and layered package of libraries and tools for academic research and productive use that allows people to easily integrate Automatic Fingerprint Recognition technology into their software or system with little know-how.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Visual IP is a network protocol analyzer that works in any operating system with a java VM. At the moment it only allows you to examine data from the disk, and created by tcpdump. You can interactively browse the capture data, viewing summary and det
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    lijing

    lijing

    My codes

    My codes
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    A Compiler from Protocol Scenarios to Interpreted Systems
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    The intention of this project is to develop a prototype for the secure handling of medical records. We will use certificates (OpenSSL) and Java SDK
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Time-stamp of a created file can be modified by attacker. This project is meant to track File timestamp values , using NTFS data structures rather than trusting the original time stamp modified by attacker.
    Downloads: 0 This Week
    Last Update:
    See Project