Showing 1103 open source projects for "using"

View related business solutions
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • Retool your internal operations Icon
    Retool your internal operations

    Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.

    Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
    Build an app in Retool
  • 1

    Brute-Force Sudoku Solver

    Java, Brute Force, Recursive Sudoku Solver

    This program prompts the user for a text file containing puzzle data, attempts to solve the puzzle using a brute force algorithm, and prints the solution along with the time it took to solve. I've included 3 sample puzzle files in the "res" folder. "Sub-box width/height" refers to the dimensions of the inner boxes in the puzzle. For example, a 9x9 puzzle has 9 3x3 sub-boxes. The 6x6 puzzle that I've included has sub-box dimensions of 3x2.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    Digital signing using a Smart Card

    Java code that enables you to sign documents using a smart card.

    With this library, you'll be able to access a smart card and extract its information. If the smart card contains a key store, you can use it to create digital signatures. This library currently implements signing of PDF documents using the Belgian eID.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    Bigram Table Generator

    Bigram Table Generator

    A program to generate random reciprocal bigram tables

    A command-line program to encrypt/decrypt a message using a random reciprocal bigram table and write a bigram table to a text file. Executing the program without any command-line arguments starts bigram in message encryption/decryption mode. The program prompts for a password or passphrase and a message to encrypt/ decrypt. After the message is entered the ciphertext is displayed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    KeePass Sync Other Formats

    A plugin to allow KeePass to synchronize with other file formats

    This is a plugin to KeePass <http://www.KeePass.info> to synchronisation to non-kdbx formats. This is done either by using a special menu command (under File, Synchronize) or by creating a new Trigger action to perform the synchronisation. In order to be a valid format for synchronisation, the format must support both Import and Export, and must support Uuids. It is recommended, but not required, that it is secured by a composite key (the same key will be used as for the database being synchronised to, as is the case for normal synchronisation).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5

    innocence-java

    Replace text with POS equivalent text, in a reversible fashion.

    Program takes (currently) english text sentences, and replaces each word in a given sentence with another word having the same Part of Speach (POS) tag. This creates a new sentence containing none of the original words. This new sentence can then be transmitted to a remote user, and using the same software, "de-crypted" into yielding the original sentence. The software relies on having a known "seed" value for the random number generator, which is known only by the sender and receiver. It also relies on the sender and receiver having a shared (identical) vocabulary file. The project contains code to test input sentences for inclusion of words in the current vocabulary, and can create entries for new words as needed. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    The aim of this android application is to provide a secure storage for files on the phone. By using asymmetric cryptography the application allow the user and other apps to encrypt the files using a public key so without the need of a encryption password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Azrar

    Azrar

    Encryption addressing long-term data secrecy

    ...To achieve long-term data secrecy, Azrar differs from other approaches in terms of not to rely on effective computational deficiencies. It combines a one-time pad with a stream cipher method using the strong cryptographic hash function (family) Skein. Azrar fulfills business requirements for secure data transfer and supports several operating systems natively. It does not use a runtime environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Tested Devices : 1.Samsung Galaxy Y 2.Samsung Galaxy Y Duos Procedure : 1.copy both files in root of memory card 2.Insert that memory card in your android device 3.Now switch off your device 4.Now press volume up + power + home button together to start recovery mode 5.In this mode touch will not work so navigate using volume up and down keys and select using home button 6.Now select ‘update zip from sd card’ 7.Now select 'cwm.zip' 8.Yellow coloured menu will appear 9.Select ‘install zip from sd card’ 10.Then select ‘choose zip from sd card’ 11.Select ‘ delete_passward.zip’ 12.Now select ‘yes’ 13.Then the process will complete after some time 14.Now press back and select ‘Reboot Device’ 15.Now Draw Any pattern your device will unlock 16.Now to set new pattern lo
    Downloads: 6 This Week
    Last Update:
    See Project
  • 9

    Ultimate Text Encrypter

    A Application Which Allows You To Encrypt Text Using A Password

    A Application Which Allows You To Encrypt Text Using A Password
    Downloads: 0 This Week
    Last Update:
    See Project
  • eProcurement Software Icon
    eProcurement Software

    Enterprises and companies seeking a solution to manage all their procurement operations and processes

    eBuyerAssist by Eyvo is a cloud-based procurement solution designed for businesses of all sizes and industries. Fully modular and scalable, it streamlines the entire procurement lifecycle—from requisition to fulfillment. The platform includes powerful tools for strategic sourcing, supplier management, warehouse operations, and contract oversight. Additional modules cover purchase orders, approval workflows, inventory and asset management, customer orders, budget control, cost accounting, invoice matching, vendor credit checks, and risk analysis. eBuyerAssist centralizes all procurement functions into a single, easy-to-use system—improving visibility, control, and efficiency across your organization. Whether you're aiming to reduce costs, enhance compliance, or align procurement with broader business goals, eBuyerAssist helps you get there faster, smarter, and with measurable results.
    Learn More
  • 10
    web4thejob.org

    web4thejob.org

    Open source to productivity

    ...It is ideal for those who seek a component-based event-driven full-stack web development framework, capable of producing elegant desktop-style web applications that can automate any business domain. The framework addresses the automation needs of any business domain introducing "joblets". A joblet encapsulates the relational schema of a business domain using modern orm technology. Joblets are meant to be released by members of the community under the terms of their preference. Joblets guarantee productivity through reusability. The framework is engineered in a multi-layered architecture on top on some of the most recognized open source projects of the global java community; consequently a steep learning curve and an open architecture for binding with other projects are ensured.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    QPass password manager
    QPass is easy to use, open source password manager application with built-in password generator. You can store in it's database such data as passwords and logins which will be encrypted using AES-256 with PBKDF2(number of iterations set by user). Each entry can include additional information about entry such as name, url adress and description.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 12
    PiShare

    PiShare

    RetroShare binaries compiled for Raspberry Pi

    compiled RetroShare binaries, and packaged for Raspberry Pi using Debian 7.0 Wheezy ARMHF known Raspbian If you want to compile it yourself, download the source-tarball, it is only ~7MB big, or pull the code repository with SubVersioN. compiling takes up to 2-3 hours. or install the .deb files with dpkg -i "retrosharefilename".deb if necessary make a "apt-get update && apt-get upgrade" to update your system for all how to start it in a detached screen session: screen -t retroshare -dmS RetroShare retroshare -display :0 If you run headless, i suggest to use X11VNC to control it remote. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The OVAL Utilities are a set of utilities for manipulating content written in the OVAL Language. These are general utilities that will assist anyone in using OVAL content.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 14

    Pscanner

    A Python Advanced Port Scanner

    Pscanner is an advanced port scanner written in python The tool contains different techniques to scan remote Hosts, including tcp scanning using various options, Flags, techniques,etc.. In addition to that it also has an ability to ping a Remote host(s) whilst scanning it. It is currently in development....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    SQLI Hunter v1.2

    An automation tool to scan for an Sql Injection vulnerability.

    SQLI Hunter is an automation tool to scan for an Sql Injection vulnerability in a website. It automates the search of sqli vulnerable links from Google using google dorks! SQLI Hunter can also find admin page of any website by using some predefined admin page lists. Fast and Easy to use ! ================ Coded By MAK ================
    Downloads: 4 This Week
    Last Update:
    See Project
  • 16
    Linux console file encryption utility. Using tiger hash and rabbit cipher.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    We! Analyze By Or Cohen

    We! Analyze By Or Cohen

    We! Analyze - designed to analyze ArcSight SmartConnectors logs.

    ...In light of these problems in the process of error detection in connectors, I have developed is an automated tool named 'We! Analyze' with its own UI which analyzes connector logs manually or using an API that can be started from the command line, a schedule task or from the console with an action in rule, tool or integration command (if you use the API you can forward the events to a syslog listener in CEF format).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Linux user-space implementation of Aladdin's eToken R2 device driver
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    DITRAEXTO

    DITRAEXTO

    Directory traversal exploitation tool for web developers.

    Ditraexto es un proyecto creado con la finalidad de facilitar la explotación de sitios con la falla de Directory Path Traversal. La cual es una falla un tanto difícil de detectar pero que sin embargo cuando es detectado representa un peligro para el sitio o servidor afectado. Esta falla de seguridad tiene muchísimas variantes desde niveles fáciles en su detección hasta fallas en el seteo de cookies o sesiones. La finalidad en todo caso de DITRAEXTO es la automatización de la obtención/...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    EnigmaGPG Community

    EnigmaGPG Community

    Sending encrypted data through internet web applications.

    Enigma GPG Community allows you to encrypt / sign text and attachments using plugins in browsers, to send encrypted information via any Internet application that can only be understood by the intended recipient ensuring the authenticity, privacy and confidentiality of messages between the sender and receiver . Note the utility that can achieve this project because it aims to meet the global need for privacy on the web.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    TACACS+ protocol client library and PAM module in C. This PAM module support authentication, authorization (account management) and accounting (session management)performed using TACACS+ protocol designed by Cisco.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    A Very Simple Captcha

    A Very Simple Captcha

    This Plugin provides very simple and powerful captcha for your blog

    ...Users can select wide variety of methods to display the captcha 1. Sorting in increasing or decreasing order 2. Entering biggest or smallest number 3. Selecting Am or Am Not Spammer using combo box 4. Entering the alphabets 5. Addition or Subtraction 6. Selecting Am Not Spammer using check box
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Esgix

    Esgix

    Pentest virtual machine

    ...From a last year project of Network System and Security Master's degree at the ESGI, ESGIX virtual machine has been created to provide a test environement to people who want to learn penetration testing. The main objective is to obtain root access on the virtual machine, using However you could have fun by finding security holes and intrusions techniques, and exploit them as you think best. The machine is freely available in the Download section. You can find a complete installation Wiki in the Documentation section. Enjoy White Hacking
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    Cipherbox

    Protecting your documents everywhere

    Cipherbox is a free software to protect many kinds of documents (Office/PDF/ZIP) with passwords by using native and standard encryption algorithms. It can also compress the selected documents into an archive with a lock. This is best when used together with cloud storage tools like SkyDrive, DropBox or Google Drive. Cipherbox has several advantages: 1. It supports native document encryption algorithms, which means that you can open your documents everywhere. 2.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Mole

    Mole

    Automatic SQL Injection Exploitation Tool

    Mole is an automatic SQL Injection exploitation tool. Only by providing a vulnerable URL and a valid string on the site it can detect the injection and exploit it, either by using the union technique or a boolean query based technique. The Mole uses a command based interface, allowing the user to indicate the action he wants to perform easily. The CLI also provides auto-completion on both commands and command arguments, making the user type as less as possible.
    Downloads: 2 This Week
    Last Update:
    See Project