Showing 84 open source projects for "cloud computing software"

View related business solutions
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    Digital Signer (a PDF Signing software)

    Digital Signer (a PDF Signing software)

    Digital Signature & eSigning software. Bulk PDF signing. Sign all Page

    ...Digital Signature Certificates (DSC): Apply digital signatures using DSCs, Smart Cards, providing a secure and legally binding way to authenticate your documents. Your Privacy, Our Priority Protect Your Data with Complete Confidence. Our software is designed to keep your information 100% secure. Unlike cloud-based solutions, there’s no need to share your private or confidential files with unknown servers. Everything works entirely 100% offline on your local machine, delivering 10x faster performance while maintaining the highest level of privacy.
    Downloads: 66 This Week
    Last Update:
    See Project
  • 2
    AxCrypt

    AxCrypt

    Simple encryption tool

    ...The software also integrates with popular cloud storage services like Google Drive and Dropbox, offering seamless protection for files across platforms. Additionally, AxCrypt provides password management, file compression, and secure file deletion features, making it a comprehensive solution for data security.
    Downloads: 28 This Week
    Last Update:
    See Project
  • 3
    RHash
    RHash (Recursive Hasher) is a console utility for computing and verifying hash sums of files. It supports CRC32, CRC32C, MD4, MD5, SHA1, SHA256, SHA512, SHA3, AICH, ED2K, DC++ TTH, BTIH, Tiger, GOST R 34.11-2012, RIPEMD-160, HAS-160, EDON-R, and Whirlpool.
    Leader badge
    Downloads: 1,006 This Week
    Last Update:
    See Project
  • 4
    UNICORE

    UNICORE

    UNiform Interface to COmputing and data REsources

    UNICORE is a software suite for building federated systems, providing secure and seamless access to heterogeneous resource such as compute clusters and file systems. UNICORE deals with authentication, user mapping and authorization, and provides a comprehensive set of RESTful APIs for HPC access and workflows. Contributors: visit https://github.com/UNICORE-EU
    Downloads: 31 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    PetoronHash-System

    PetoronHash-System

    PHASH | post-quantum XOF hashing algorithm | C++20

    PHASH is a self-contained, dependency-free, post-quantum XOF hashing algorithm implemented in modern C++20. This release delivers the first fully stable production implementation of the PetoronHash-System — a 1600-bit sponge-based hash function with domain separation, extendable output, and deterministic behavior. Key Features No external dependencies — pure C++20 implementation. Extendable Output (XOF) — supports arbitrary output length (256–8192+ bits). Post-quantum oriented design...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    PetoronHash2

    PetoronHash2

    PH2 Permutation-based cryptographic post-quantum hash library with duplex construction (C++20)

    PetoronHash2 (PH2) is a standalone ARX-based sponge construction that combines: A 4096-bit internal permutation core A sponge/duplex architecture with explicit capacity separation An extendable-output function (XOF) Memory-hard (HARD) and burn (BURN) modes A structured tagged absorb scheme A parameterized architecture suitable for hashing, KDF, and stress-oriented derivation PH2 is designed as a wide-state cryptographic primitive with explicit domain separation and configurable output...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    RELIANOID

    RELIANOID

    Network Load Balancer and Application Security

    RELIANOID is an open core (Debian GNU/Linux based) Application Delivery Controller (ADC) with advanced load balancing features such as Network Load Balancer, Application Load Balancer with SSL offloading, Advance Network Configuration including Virtual Interfaces, VLANs, Bonding with link aggregation, IPv4/IPv6, advanced routing, stateless cluster, web GUI, JSON API and much more! Enterprise Edition Load Balancer is available with extra features such as global service load balancing...
    Leader badge
    Downloads: 383 This Week
    Last Update:
    See Project
  • 8
    Full Stack Computer Scanner

    Full Stack Computer Scanner

    Scans the entire computer device stack (hardware, software, comms)

    The Full Stack Computer Scanner is a read-only Windows freeware security diagnostics app for computer platform awareness. No ads. No accounts. No data collection. Fully offline. Complements AVs by scanning for hardware, software, network integrity, and dangerous malware signatures. Only binaries from this official SourceForge project page are legitimate. Other hosting, web, cloud, virtualization, or “run online” instances are unauthorized. Trust your vendors but verify with the Full Stack Computer Scanner. Keith Johnson | KCJ Tech Solutions | 30 Years of IT Experience Not sure whether your computer is secure? ...
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project
  • 9
    Surpass

    Surpass

    Simple, secure and easy to use password manager.

    Surpass is a multi-platform graphical password manager with focus on simplicity. The source code is free (as in "liberty") and is designed to be concise and simple. - Securely store any secret e.g. passwords, pass phrases, pin codes, etc. - Store secrets in Google Drive - Small footprint, around 50MB. Can fit on any memory device. Does not need installation or any third party library, completely self-contained. - System tray support. - Clipboard support. If a secret is copied to...
    Downloads: 4 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 10
    wolfSSL
    The wolfSSL embedded SSL library (formerly CyaSSL) is a lightweight, portable, C-language-based SSL/TLS library targeted at IoT, embedded, and RTOS environments primarily because of its size, speed, and feature set. It works seamlessly in desktop, enterprise, and cloud environments as well. wolfSSL supports industry standards up to the current TLS 1.2 and DTLS 1.2, is up to 20 times smaller than OpenSSL, offers a simple API, an OpenSSL compatibility layer, OCSP and CRL support, is backed by...
    Downloads: 17 This Week
    Last Update:
    See Project
  • 11
    GoldBug - Encrypted Communications

    GoldBug - Encrypted Communications

    Chat Messenger. E-Mail-Client. Websearch. Filetransfer.

    GoldBug is a decentralized & secure communication suite that offers an integrated e-mail client, an instant messenger & a file transfer. Also included is an URL-RSS-DB & a p2p web search. Current vers. w/ McEliece Algorithm. GoldBug has been 2013 - 2023 ten years just another Graphical User Interface of the Spot-On Encryption Suite. Main GUI features: Minimal & colorful Interface with Tabs in the East. Microsoft & Qt MinGW deprecated Win32 & for Compiling: ●...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 12
    RogueKiller

    RogueKiller

    The next generation virus killer. Remove unknown malware

    ...Thanks to its powerful engine RogueKiller is able to find known and unknown malware, of all kind. Search and clean viruses, ransomware, trojans and other malware. Powered with innovative Artificial Intelligence and Cloud signatures engine, RogueKiller is the best virus removal tool. Try our free virus cleaner now for free ! RogueKiller antimalware software is shipped with state-of-the-art malware protection. The real time protection stops infected programs before they execute. Don't let malicious software setup, stop them before they do harmful actions! ...
    Downloads: 45 This Week
    Last Update:
    See Project
  • 13
    LEACrypt

    LEACrypt

    TTAK.KO-12.0223 Lightweight Encryption Algorithm Tool

    The Lightweight Encryption Algorithm (also known as LEA) is a 128-bit block cipher developed by South Korea in 2013 to provide confidentiality in high-speed environments such as big data and cloud computing, as well as lightweight environments such as IoT devices and mobile devices. LEA is one of the cryptographic algorithms approved by the Korean Cryptographic Module Validation Program (KCMVP) and is the national standard of Republic of Korea (KS X 3246). LEA is included in the ISO/IEC 29192-2:2019 standard (Information security - Lightweight cryptography - Part 2: Block ciphers). ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    FileEncrypt

    FileEncrypt

    FileEncrypt is a lightweight software that can encrypt, decrypt files

    FileEncrypt is the easiest way to password protect and encrypt files of any type. Just select a file, type in a password, and click encrypt. That's it! This is the perfect tool for sending confidential information through email or even storing sensitive data on your computer.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 15
    Tink

    Tink

    A library that provides cryptographic APIs that are easy and secure

    Tink is a multi-language, cross-platform, open source library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse. Tink is an open-source cryptography library written by cryptographers and security engineers at Google. Tink's secure and simple APIs reduce common pitfalls through user-centered design, careful implementation and code reviews, and extensive testing. Tink helps users without a cryptography background safely implement common...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Briar
    Briar is a messaging app designed for activists, journalists, and anyone else who needs a safe, easy and robust way to communicate. Unlike traditional messaging tools such as email, Twitter or Telegram, Briar doesn't rely on a central server - messages are synchronized directly between the users' devices. If the Internet's down, Briar can sync via Bluetooth or Wi-Fi, keeping the information flowing in a crisis. If the Internet's up, Briar can sync via the Tor network, protecting users and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Authing

    Authing

    IDaaS/IAM solution that can Auth to web and mobile applications

    Authing quickly implements authentication and user management for any Web, App, and enterprise software to provide the most complete login solution for your customers and employees. Authing serves as an identity infrastructure, or Identity As A Service (IDaaS) for cloud computing. Authing focuses on identity and building social infrastructure for identity sharing across all SaaS software and users to help companies build a secure modern IT infrastructure that not only protects their business but also redefines the user experience. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    Novel Insight Inner Circle

    Novel Insight Inner Circle

    Graphical message and file encryption tool

    Novel Insight Inner Circle is a message and file encryption tool for Windows. The software is developed in Java and requires 64bit Java JRE. The encryption uses AES-256 twice so it is harder to crack than the industry standard pure AES 256bit implementation (theoretical key size is 512 bit). The software writes encrypted data in ASCII text format which can be cut'n'pasted to messaging apps or to emails and back to Inner Circle when decrypting data. IMPORTANT: The software requires new...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    obfusc

    toolchain for obfuscated compilation

    This is a C compiler, assembler, linker and virtual machine for computing based on encrypted working and obfuscated compilation and execution. The idea is that the platform machine `works encrypted' for the user and unencrypted for the operator, running a machine code instruction set in user mode that is provably safe against computational attacks, for code that is generated by a compiler that has introduced random variations into the code at each recompilation so that the attacker has no...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Unified Sessions Manager

    Unified Sessions Manager

    Pioneering Private and Public Cloud Management since 2008

    The UnifiedSessionsManager supports the integrated management of user sessions within Private-Clouds, comprising heterogeneous IT landscapes of various physical and virtual machines, hypervisor management, and virtual user sessions with remote desktops. Extracted documents see https://sourceforge.net/projects/ctys-doc.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    The Grid Programming Environment (GPE) turns a collection of computer systems into a Grid and provides graphical user interfaces and interoperable GridBeans for application development. It supports Globus Toolkit and Unicore-based infrastructures.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Univention Corporate Server (UCS)

    Univention Corporate Server (UCS)

    An open source Identity & Access Management solution with AD-functions

    ...-Portal with Single Sign-On -Integrated IAM -Packaged integrations -App Center with enterprise applications -Active Directory integration -Platform for your entire IT -Operation on-premise, in the cloud, or hybrid The centerpiece of UCS is Nubus, our central IAM solution for managing identities, roles, and groups. The integrated portal with Single Sign-On and self-service functions provides access to all IT services and applications. Thanks to pre-built software and integration packages, apps can be easily put into operation. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    StrongKey CryptoEngine

    StrongKey CryptoEngine

    FIDO strong authentication, encryption, digital signature engine

    StrongKey CryptoEngine (SKCE) 2.0 is a "crypto Swiss Army knife" server to perform cryptographic functions through web services, while freeing application developers to focus on business functionality. Its modules include: - A FIDO Engine to support FIDO U2F key registrations/authentications - An encryption engine to encrypt/decrypt files using AES/TDES keys - Escrowing keys to on-premises key management system (StrongAuth KeyAppliance/SAKA) - Integration to cloud storage services...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    StrongKey CryptoCabinet

    StrongKey CryptoCabinet

    FIDO-enabled, cloud file encryption with centralized key management.

    StrongKey CryptoCabinet (SKCC) 2.0 is a FIDO-enabled (fidoalliance.org) web application built using Regulatory Compliant Cloud Computing (RC3) architecture (http://bit.ly/rc3infoq). It encrypts files/objects of any type or size, and stores the ciphertext either to public/private clouds—AWS, Azure, Eucalyptus—or local/network drives, while keeping cryptographic keys safe and secure OUTSIDE the cloud. CryptoCabinet leverages the StrongKey CryptoEngine (SKCE)—another FOSS on this site—to perform FIDO U2F strong authentication, encryption/decryption, digital signatures, and cloud integration. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Moscrack is a perl application designed to facilitate cracking WPA keys on a cluster of computers. This is accomplished with any one of Mosix clustering software, ssh, rsh or Pyrit connectivity to nodes. Cluster nodes can run any Un*x variant (includ
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB