Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.
Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
Download Free Tool
AI-generated apps that pass security review
Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
JFish is a simple Java implementation of the popular Twofish cryptography algorithm. It allows any application to easily implement powerful encryption, using a single small library and minimal code changes.
AES.g is a port of the Advanced Encryption Standard (or Rijndael) to the GPU using a mix of C++ and Cg programming languages. It is portable and built as a class-based program, using OpenGL or DirectX libraries.
Soicmp is a remote shell system, similar to telnet or netcat that allows a user to connect to a remote shell daemon, by using ICMP protocol instead of classical TCP. http://soicmp.sourceforge.net/ http://billiejoex.altervista.org/Prj_Py_soicmp.shtml
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
KX.509: X.509 certificates using Kerberos -- Convenient, Secure, Web Authentication. KX.509 is an open source project that provides a Kerberos realm's users with a secure means of acquiring short-term X.509 certificates via Kerberos authentication.
home-firewall.sourceforge.net -- Sets up a basic firewall using Linux iptables. Provides a way to add allowed sites dynamically. Home-firewall makes extensive use of shell scripts and Linux's cron utility. Maintain order in your school. ChamTech.net
wlfXchanger is a point-to-point communication software which enable developers to cooperate in a secure way, using an asymmetric encryption system (Public Key Cryptography).
OpenVPN Key Distribution System allows a web server and a OpenVPN server to exist at the edge of a network and gives a reliable system for passing out openVPN keys to the user base using ssl and php5.
B-Trust eDoc is a program built on top of LibDigiDoc a free implementation of the OpenXAdES standard for signing/encrypting files using smartcard tokens. It also contains Openssl and PKCS11 wrapper classes in C++ which might be useful to developers.
It's a modern take on desktop management that can be scaled as per organizational needs.
Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
OAproject implements a plataform to allow applications to interact. Apps using the platform send/receive messages through a message oriented middleware. Main features are a Single Sign On (SSO), Identity Management System (IMS) and a provisioning system
The ELF-Encrypter program suite is a collection of programs to encrypt your ELF binaries using various algorithms. GnuPG is required in order to use some encryption techniques.
The suite also contains programs to inject code into ELF binaries.
X10 Server for controlling X10 devices and an X10 Client for connecting to the X10 Server allowing user create/edit devices remotely in their home and control these devices remotely all over a secure channel using DES and Public key cryptography methods.
Secwatch is an intrusion detection system using log analysis to detect service scan and other brute-force attempts on a server or other computer using system logs and will create temporary firewall rules to block offending IPs
Zeppoo allows you to detect rootkits on i386 and x86_64 architecture under Linux, by using /dev/kmem and /dev/mem. Moreover it can also detect hidden tasks, connections, corrupted symbols, system calls... and so many other things.
QUIPSTER is a little program to solve substitution ciphers (Cryptoquotes) automatically. It's based on the statistics of letter combinations (for example, NT is more likely than BT, and JV never seems to show up) and using stochastic local search.
NeekProtect is a simple and user friendly file and folder encryption program to be used on win 32 platform. It is developed using C# on using Visual Studio 2005. It can be configured to use different encryption algos as per the settings in a config file.
kuplicity is an kde-frontend for duplicity, which allows a secure (coded) incremental backup on an insecure ftp-server. The purpose is to allow unexperienced user to backup (parts of) their system without using shell-commands.
apGuard is very easy to use program which allows to automatize the process of setting permanent rights for files and directories (using the configuration file). Works on linux, and probably on other UNIX systems.
Tiger Security Application is an attempt at creating an application, using free or open sourced software, that will give a user the ability to control multiple desktop security applications from one central location.
Private-key, symmetrical (same password to encrypt and decode) file encryption with 8-bit to 2147483647-bit (2^3 to 2^31) encryption using my own algorithm and my own extension of MD5 (http://blog.robtoth.net/2009/06/tencryption-computer-programming.html
Compute shared RSA keys for two parties using Gilboa's protocol. Other protocols may be added. Contains JAVA source for Benaloh, Naccache-Stern and Goldwasser-Michali crypto-algorithms. Oblivious transfers and BiPrimaliy tests also implemented.
FZBFD is Brute Force Detection for Filezilla ftp server. fzbfd.pl looks at the logs from filezilla and will auto ban or block ips from accessing your FTP server. FZBFD can be setup to run hourly using task manager and uses dshield.org's top offenders...
Distributed John is a distributed password cracking using John The Ripper. It consists of a server that handles work to the clients (each on a different machine), which use John the Ripper.
LINReS is a tool which can be used by Incident Response and Computer Forensic Teams during initial response phase to collect volatile and other non-volatile data from a compromised Linux machine using statically compiled binaries.