Showing 1104 open source projects for "using"

View related business solutions
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 1
    Migale eraser is a software permitting to erase safely any file or folder from your hard drive so that no recovery will be possible, even when using forensic tools.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Raiden block cipher: An extremely lightweight and fast block cipher, developed using genetic programming, with the intention to be an alternative to TEA. This cipher is as fast as TEA, and without many of its known weaknesses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Clam AntiVirus Client Library provides a simple API to the ClamAV daemon. ClamAVC does not require ClamAV to be installed. ClamAVC communicates with clamd using clamd's documented protocol using either TCP or a local Unix domain socket.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    PySumpas is a simple, graphical password generating utility written in Python/Tkinter. Using tools from the Python Cryptography Toolkit, it generates secure passwords from user input that can be regenerated if forgotten.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5
    The openLiberty Client library project is a Liberty Alliance Web Services Client (WSC) Java library supporting Web Service Invocations, using SAML. All discussion lists, public forums, wiki, etc. for this project are hosted at http://www.openliberty.org
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    SMScryptor encrypts and decrypts messages sent from any mobile phones using : - AES 256 encryption - J2ME MIDP2.0 CLDC1.1 - ECMAScript - Apache / PHP / mysql
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    A procmail based antivirus filter for incoming mail servers on Unix. It is efficient and tiny. Supports UUE, Zip and Rar attachments, Base64 and Quoted-Printable encodings. Identifies viruses, PUAs and phishings using the ClamAV clamscan virus scanner
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    This is SSL Scanner that can be used to check, what ciphers can be used in https connection. You can also download page using each cipher. Also reports from scanning can be available.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Symbian OS implemetation of NIST-Recommended Random Number Generator Based on ANSI X9.31 using AES written in Symbian C++ and tested on Symbian 9.x platform (especially Nokia N73, N80, N82 and E51).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place. Icon
    Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place.

    For healthcare Providers and Facilities

    Incredable streamlines and simplifies the complex process of medical credentialing for hospitals and medical facilities, helping you save valuable time, reduce costs, and minimize risks. With Incredable, you can effortlessly manage all your healthcare providers and their credentials within a single, unified platform. Our state-of-the-art technology ensures top-notch data security, giving you peace of mind.
    Learn More
  • 10
    Python wrapper around a small subset of the OpenSSL library. Includes: X509 Certificates, SSL Context objects, SSL Connection objects using Python sockets as transport layer. The Connection object wraps all the socket methods and can therefore be use
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    This a a small program to encrypt/decrypt files using AES (Advanced Encryption Standard)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    JChecksum allows you to obtain the hash of a given file using a simple GUI. Hash algorithms supported include MD2, MD5, SHA-1, SHA-256, SHA-384, and SHA-512.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The Epic Web Honeypot Project aims to lure attackers using various types of web vulnerability scanners by tricking them into believing that they have found a vulnerability on a host.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    GNIPS is a network intrusion prevention system for Linux using Snort and iptables. It alerts user of incoming attacks on their network and allows them to block any offending hosts. It's also possible to configure GNIPS to send out alert emails.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    This applet allows digitally sign documents with standard CMS is developed in Java using free software (libraries bouncycasttle).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Blowfish Encryption over HTTP. It encrypts with your username and password using the server-generated unique key which you must have, so as to use this service. The malicious third-party can't decrypt your login info if they don't have the key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Inferno is a simple and fast program that can securely delete files using the same methods as the U.S. Department of Defense. Inferno can also securely delete internet and windows history. Also it can even encrypt and decrypt your private files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Tool that encrypt a password using answers give by the user from pre-defined or user-defined questions and create a binary file that is used to retrieve the encrypted password (or lost password) by answering questions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Secure downloads by checksum verification using several hash algorithms like md5 or sha1 to verify your downloaded packages using an independet third site.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Encryption application using one time pad algoritm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    This is a software that converts a text file into non readable format using a mathematical expression. To convert the non readable format into the original version the same mathematical expression should be used.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Recently, security is becoming a social issue. Security patch of Microsoft was cracked in several days after releasing. This kind of binary cracking is composed by debugging and reverse engineering technique.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    The goal of the AppCrack project is to allow users to decompile/disassemble .exe programs (allowing users to see the source code) using a simple program instead of long, tedious, unreliable solutions like debuggers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    By emulating widespread vulnerabilities the honeypot Nepenthes is able to catch and store viruses worms using these vulnerabilities. The api interface to add new vulnerability modules is easy to use, so there is no problem in writing new ones.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    IceNotes ME for Mobile Devices is an extremly usefull ;-) JAVA ME (J2ME) application to store all your important (text)notes on your mobile phone using "Twofish" encryption. Your notes are organized by assigning your own custom tags to your notes.
    Downloads: 0 This Week
    Last Update:
    See Project