Showing 1106 open source projects for "using"

View related business solutions
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    LINReS is a tool which can be used by Incident Response and Computer Forensic Teams during initial response phase to collect volatile and other non-volatile data from a compromised Linux machine using statically compiled binaries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    This program try to crack any md5 hash , but not using one cpu, using the power of distributed computing to get better results in less time
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    A library for accessing a Time Stamp Authority Server using both HTTP and TCP protocols. It implements RFC3161.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    ClamMail is POP3 email proxy for Windows with integrated ClamAV antivirus engine. ClamMail is an Windows antivirus that protects your PC from viruses transferred via mail. Works with Outlook,Thunderbird,Eudora and many others using popular POP3 protocol
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 5
    TC-Wrapper is a Windows service which opens/closes TrueCrypt containers automatically using an USB-Stick with a key file. Containers are even mounted if you are not logged into your system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    using PHP (and some ShellScript) to protect your linux server against bruke force attacks(http://en.wikipedia.org/wiki/Brute_force_attack). also keep a log in MySQL and have email reporting
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    CD Keyper is a Database Application programmed on the .NET 2.0 Framework using Visual Basic .NET which is designed to hold CD Keys and related information. The database uses 168-bit DES Encryption to secure your CD Keys.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Java bridge (bindings, interface) to PAM. JAAS login module using PAM for authentication.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    ...The project is based on SAODV draft and AODV RFC.Its basic functionality lies in securing the AODV protocol by authenticating the non-mutable fields of the routing message using digital signatures.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 10
    dkfd is a DomainKeys filter daemon using libdomainkeys library. targeted usage is SMTP proxy of Postfix MTA. Currently developing under Linux/FreeBSD, and Solaris.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Olate is a software development company specialising in products designed for the web written using PHP. As a company, it produces three products, one of which is an open source download manager called Olate Download.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    RC4.NET is a library that adds support for encrypting/decrypting using the symmetric RC4 algorithm in the .NET environment. The library is written in C# language, and performs equally well on both the Microsoft CLR and Mono platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Flash/PHP adaptation of the XTEA encryption algorithm. Allows encryption/decryption of sensitive data using 128-bit key. May be used for network data (HTTP) or offline for implementations like secure CD-ROM projects.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    readlog is a pair of scripts for reviewing iptables firewall logs via a handy web interface using a MySQL backend.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    We recently add a new encryption project since the last press release ... The WTP Integrated Development Platform CD contains an integrated suite of programs for delivering Web applications using the Apache, MySQL and Postgres database, Perl and PHP languages. The software is installed by using a Web browser-based interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    PasswordChain is a secure Web-based password database designed to securely encrypt and store passwords. Data is encrypted using the Blowfish algorithm and stored in a MySQL database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Pqmf is an open source project which inted to create a strong alternative to PGP. Using Pqmf you will be able to to safeguard your private files under 160bits long Keys in the simplest way posible, just choose a file set a password and voila!.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    SecureRSS - Secure RSS-Syndication for Mobile Devices. Non-repudiability of RSS-Newsfeed channels/items on the assumption of a resource-constraint client using w3c-ietf xml signatures. (proof-of-concept)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    .Net 2.0 Remote Desktop Username and Password generator using System Security Cryptography RandomNumberGenerator
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Cryptographically secure your files with asymmetric and symmetric keys, as well as password based encryptions and file/text checksums. Use upto 6 different keys to encrypt/decrypt and get checksums using MD2, MD5, SHA1, CRC32, etc..
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    TextCode 1.4 is a small security program for encrypting/decrypting of text files (.txt, .rtf, .html etc.). You can encrypt any text files using a password. Latest Edition: TextCode 1.4 (compatible with files encrypted by TC 1.3, infos in the program!)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    BoCrypto encrypts/decrypts files using one-time-pad keys. Mersenne Twist PRNG is utilized for the key stream. Features enc/dec benchmarking as well as 'duress' key generation. OTP encryption is the only unbreakable encryption, if implemented correctly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    RFC (Remote Filesystem Checker) is a set of shell (bash) script that should help System Administrators to run a filesystem-checker (afick aide or integrit) from a master-node to a set of other slave-nodes just using ssh, scp, sudo and few other commands.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Automatically verifies md5 and sha1 checksums using either a user entered sum or by searching in a file that can be held locally or remotely via ftp or http.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    Cameloid is a new TCP/UDP based P2P voice and video encryption software, that will provide high level of privacy for all levels of communication using only quality secret-key ciphers to ensure long-term security.
    Downloads: 0 This Week
    Last Update:
    See Project