Showing 1106 open source projects for "using"

View related business solutions
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 1
    A ultrafast lightweight (no GUI) encryption/decryption software using the CryptoAPI on Windows platform, to secure just about anything - regular files and directories, consoles, communication resources(COM ports), Disk devices, pipes and sockets anythin
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    The KnightGina project is intended to do a free source replacement for MS Gina, using Object Pascal language (initially in Delphi enviromnent)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Secure Distributed Objects provides a mechanism for using socket-based SSL communications in the MacOS X Distributed Objects system, by providing a NSPort subclass - SecureSocketPort - and other utilities.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    ReHash is an easy-to-use console-based hash calculation tool written in C++. It supports many algorithms and output formats and it can be fully configured using some of the many command-line arguments which can be passed to the tool.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    Status Module is a daemon which forwards vital system information (memory usage, active processes, etc.) into the kernel logs by using a kernel module. This is very useful for logging or security purposes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    zssh (Zmodem SSH) is a program for interactively transferring files to/from a remote machine while using the secure shell (ssh). It is intended to be a convenient alternative to scp, avoiding the need to re-authenticate each time a file is transferred.
    Leader badge
    Downloads: 15 This Week
    Last Update:
    See Project
  • 7
    Generic clustering/load-balancing platform (over a LAN or internet) using java based P2P Aorta workers that execute java "tasklets". Various tasklets can be implemented to solve fractals, process images, render webpages, crack RSA "brute force".
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Dynamic tool for effectivly removing troublesome hosts from a routed network using ettercap and snort. This tool has been proven to be effective in slowing the spread of the RPC DCOM virii that have been in circulation.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    This ain't your daddy's crypto! We provide a set of C libs and utilities to perform cypherpunk style crypto functions, using your existing OpenPGP keys. Ring signatures; credentials; mental poker; timelines; zero knowledge proofs. Cool stuff!
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 10
    Gobbler: A tool to audit DHCP networks Includes DHCP rogue server detection, DHCP DoS, distributed spoofed port scanner using DHCP to obtain many source IP addresses, mulitple arp scans, filtered port detection, spoofed OS detection (nmap + port 0)
    Downloads: 5 This Week
    Last Update:
    See Project
  • 11
    Distributed Syslog collector and viewer system with reliable Syslog msgs over tcp, and query with reg ex. using PERL. Supports IETF syslog and syslog relay, JAVA/JINI based, uses postgreSQL, JBOSS. Chain of custody raw to db data link. UTF8, D, F , UK
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The goal of Operation Project X is to crack the 2048-bit RSA private encryption key Microsoft uses to sign Xbox media, by using distributed computing. This key could be used by Xbox owners to run homebrew code on their machines.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    QT based Linux web security tool that it is designed to test targets for weak passwords using crack, leech and URL testing functions. Plugins allow potentially any protocol (eg http, ftp) or server to be attacked, while remaining anonymous using proxys.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Encrypt emails using gpg and php.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    DSBL-helper. Tries to send a special formatted test message to Distributed Server Boycott List through every suspect IP found in complain using several mechanisms (SMTP, HTTP, telnet, SOCKS etc) and reports in.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    A suite of tools (a sniffer, a TCP hijacker, an ARP poisoner and a TCP tunnel through ICMP/IGMP packets) created for testing TCP/IP weakness and using them in a non-conventional way. [Up to now I've done only the sniffer-related part]
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    microCODE is a PHP module that allows inclusion of encrypted PHP sourcecode instead of plain PHP scripts. Protect your intellectual property using standard encryption algorithms like DES or AES.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Stream Shield is a program to encrypt and anonymize your connection to the internet by connecting to remote proxies, using Blowfish/Rijndael Algorithms and removing many personally identifiable headers such as referer, user-agent and more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    pam_krb5 is designed to allow smooth integration of Kerberos 5 passwordchecking with applications built using PAM. It also supports session-specific ticket files (which are neater), Kerberos IV ticket file grabbing, and AFS token-grabbing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    TextCodec can encode texts using simple algorithm and then decode them by using statistical language data.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 21
    A tool to hide BitTorrent metainfo (.torrent files) into and restore the same back from images (and other types of files) using steganographical methods, providing friendly GUI for the process.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    ...It's simple to use and pretty secure. All your account information (name, optional url, username, password, comments) for websites or anything else is safely stored using an open-source Blowfish symmetric-key enc
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Java security module using JAAS with JDBC. A Pluggable Authentication Module (PAM) using database store user information. Contains implementation over Tocam Realm, JBoss JAAS. Sponsored by http://knowledgesurf.com.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    A Python/Gtk application to manage groups of users stored in an LDAP database, using data from X509 certificates imported from files or LDAP servers maintained by certificate authorities. These groups are used to create grid-map files used by the Globus
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    SystemSpecifyer is used to develop and maintain complex, well structured, systems specifications, in normal language. Using the System Matrix double matrix relation building mechanism specs can be tested for completeness, correctness and consistency.
    Downloads: 0 This Week
    Last Update:
    See Project