Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.
Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
Download Free Tool
AI-generated apps that pass security review
Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
Open Source Encryption and digital signature libraries for JMS. These librararies are writen in java and are to support secure integration through middelware/ISB/ESB
A tool for network defenders to monitor known or suspected malicious infrastructure associated with hackers, spammers, etc. The tool allows many types of infrastructure to be monitored anonymously in multiple ways and alerts sent to many output types.
reCAPTCHA JCA is a J2EE/Java EE Connector Architecture RA (Resource Adapter). It runs on any Java EE certified application server. reCAPTCHA JCA provides excellent connection pooling and allocation strategies by means of the JCA.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
This program makes it possible to transfert files from a computer to another via SSL/TCP/IP. It is composed of a part to listening of possible requests, the server, and of one or more customers. Pure Java program.
Java Chaotic Random Number Generator - Inspired by chaos theory, the intent of this generator is to produce unseeded, unpredictable numbers. The numbers will not follow a predictable sequence and will not rely on a pseudorandom algorithm.
Malabar is a simple, context-agnostic authentication library for Java applications. It strives to be equally usable in J2EE/Web, GUI, and other applications requiring user authentication.
One of the project groups in Intake 6 is planning on doing a IM client which is secure. This includes messenging, file sending, picture drawing, video transmissions by far.
Secure and customizable compute service that lets you create and run virtual machines.
Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
This is a simple tool that generates a set of self-signed certificates for a group of distributed Java-based servers. It also creates the trusted key store to house the public keys and allow for the servers to communicate via SSL
ASOPEC is a framework for dealing with security in a diverse range of environments. It abstracts security from your application with a AOP approach. It is written in Java and works in Spring and EJB3 containers.
The Watermarks is a java library for images and text watermarking fingerprinting and tamper-proofing. The supported carrier formats for a watermark are JPEG and PDF. The project also aim to build a test environment to evaluate robustness of implemented a
This project will be used for the identification of the thumb impression. We will be having a image of thumb in our database and will use another image for matching purpose. We can also match the images which are not in the data base.
Aigebi Rbac a token driven role-based access control engine. It's pure java product. The core rbac engine is deployed as jar. It provides both java API and custom jsp tags. Admin portal is provided to manage rbac data and showcase how to use rbac engine
JSleuth is a system base lining collection tool. The primary purpose of Sleuth is to gather and/or develop topographical information and attributes about specified directories and files in a manner conducive to allow the baseline to be compared against.
Web-based IT-Security evaluation tool targeted at small- and medium-sized companies, based on the Austrian IT-Sicherheitshandbuch, ISO 27001, and other IT-security standards.
SecureProxy is an proxy application which sits in front of a web server and enforces general security policies which prevent clients from accessing restricted portions of the website or providing dangerous or unauthorized input.
Applet loader for the Cyberflex Access Developer 32k and e-gate 32k cards. Will allow you to load the MuscleCard applet onto the smartcard and use it as cryptographic token.
It will be a project to provide a secure communication between a web server and a client running in mobile environments. Some different Cryptography algorithms will be implemented, and watermarks techniques.
mBuddy is a project with the initial goal of allowing users of mobile devices (Java, J2ME) the option to find others based on interests, diet & other factors. Objectives are to allow intelligent, conditional, secure exchange of contact info, A/V & more.