Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
Try Retool free
Outgrown Windows Task Scheduler?
Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.
Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
TNV visualizes pcap data to graphically depict network packets, links, and ports for network traffic analysis to facilitate learning what constitutes 'normal' behavior, investigating security events, or network troubleshooting.
Sleutel is the Dutch word for key. Sleutel is a multi-platform password manager that is written using the Eclipse Rich Client Platform (RCP). Its goal is to manage password/id pairs for accessing web sites and providing an example RCP application.
Patronus is a distributed system written in Java dedicated to protect local networks. It ensures that chosen security policy is not ignored on each host which is under Patronus's control.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
the JSecurityModule project is aimed to produce a module that can be added to any Java software compilation and provide whitelist security on input validation , and also signature matching to ensure security of the application.
The goal of the project is to create an example of Java ME based application for SMS message encryption. This aplication is only of academic interest and is not suitable for real safe SMS encryption.
Backup P2P is a peer to peer application doing automated and secured backups inside a community (Jabber, XMPP). Each user shares some available space on his disk with others, to be able in return to remotely backup some of his own data.
Cryptography Workshop is a small yet powerful tool for cryptography and cryptanalysis. It's focused more on classic cryptography. It is currently in alpha and under development.
ContraCaptcha is a Java-based libary for solving (image-based) captchas. It provides classes for image processing and character recognition. It also includes solvers for some of the popular captcha-systems in use DISCLAIMER: only for learning purpose (;
EIDNative Library is a freeware SDK for Belgian Electronic ID Card. EIDNative Library includes native API for: * Microsoft .NET * Native Win32 * Visual Basic 6.0 and VBA * Java (only Windows platform)
Brute Force Grid is a Process sharing framework on Peer to Peer overlay network. To demonstrate the application we have used the brute force attack to the hashes by hashing algorithms. License : GNU General Public License version 3 (GPLv3)
Laika analyzes and reports on the interoperability capabilities of EHR systems. This includes the testing for certification of EHR software products and networks.
If you use tripwire, you have to review and accept changes on a daily basis. Logging into multiple servers to accept the changes is troublesome. Enter CentralWire: a web-based centralized console to review and accept changes detected by tripwire.
A suite of source and binary programs to test the capabilities of code analysis tools. A reference implementation of x86 binary analysis in C# is also included.
BlueOxygen Debus is the security implementation of tree for BlueOxygen Cimande. Originally this is a Cimande Security, but we found that there is several security that we can implement and we must test it, so we decouple it.
Common role (ComoRo) lets you manage all roles for your applications in a centralized way, being the natural extension to single-sign-on (sso).
Comoro recommends the use of a SSO system, like CAS.
Computer Security Model Implementations for Computer Science Graduate Students and Researchers. Implementations include the Take-Grant Protection System and a Self-Organized Critical (SOC) Lattice Model for malware behavior.
This is a simple WEP, WPA key and password generator that allows you to select the level of complexity. Since it is written in java, it will run on any system with a JRE installed.
...Mit einigen iTAN bzw TAN features. jKeePass ist NICHT Binär kompatibel zu KeePass und speichert ein eigenes Format. Es hat einige Features daraus übernommen und ist ein Komplet neu in Java geschriebenes Tool.
EXOS is a J2ME library for mobile devices to securely exchange data over the Internet with multiple groups of people, who are permitted to read different parts of the data only. EXOS takes care of authentication and key exchange (involves a server).