Showing 1477 open source projects for "software"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    Sha4j is a one class implementation of SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512 algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    This is rarbrute, a shell script to brute force encrypted rar files under unix and linux. A long wordlist and a paper about security in internet cafes is included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Here is pag, it is a password generator written in c. It can create passwords with numbers, signs or both together. You can set the length of the password. The program can create a list with x passwords or one pw to stdout - compiles under unix and win
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    VMWare-based firewall for Windows
    Downloads: 0 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 5
    Eraser software for secure deletion of files and cleaning of free disk space with full functionality and lightweight GUI.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    The WSGW (Web Security GateWay) is a security-centric HTTP/s proxy, based on the Apache web server and some bundled third party modules. The goal of the WSGW project is to provide a web application and XML "firewall" for the masses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    using PHP (and some ShellScript) to protect your linux server against bruke force attacks(http://en.wikipedia.org/wiki/Brute_force_attack). also keep a log in MySQL and have email reporting
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    With this software, you can embed the text message into a graphic file. The result file looks exactly the same with the original. But if you use this software, you can see the hidden text inside the pciture
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    The Racal Simulator Library is an implementation of a software emulation of the Thales (formerly Zaxus, formerly Racal) RG7000 Host Security Module cryptographic device. (Note: This project is now hosted at Codeplex as ThalesSim).
    Downloads: 2 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 10
    A Spring.NET security framework port of the Java based Spring security framework, Acegi Security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    An enhanced and smaller version of Cryptography Application Block from Microsoft patterns & practices Enterprise Library 2.0.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    sudosh is a sudo shell, filter and can be used as a login shell. Sudosh records all keystrokes and output and can play back the session as just like a VCR.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The goal of the project is to develop Role Based Access Control software which can be used in any application. The software can be deployed as a server which can cater to multiple applications. Rules can be written for fine grained access control.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Adapdev.NET is an enterprise framework that builds on the Microsoft.NET framework, providing enhanced components for object caching, database access and querying, code generation, unit testing and encryption, among others.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Olate is a software development company specialising in products designed for the web written using PHP. As a company, it produces three products, one of which is an open source download manager called Olate Download.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Flash/PHP adaptation of the XTEA encryption algorithm. Allows encryption/decryption of sensitive data using 128-bit key. May be used for network data (HTTP) or offline for implementations like secure CD-ROM projects.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Java Crypt Framework (JCryptFX) is a java-based education project for de-/encrypting streams. It has a implementation of DES and TripleDES in it but the framework user can write own cryptography algorithms and stream types for it - includes a console app
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    NetworkTools has 2 components: A protocol analyzer which plays a TCP client or server or pipeline, which sits between a client and server and shows how they communicate. A port scanner can scan a range of IP addresses and ports. See screenshots.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    The SSTCP protocol permits to establish a simple TCP/IP connexion across multiple AES secured channel. Simple but (/so?) secured and strong cryptographic methods are used. OpenSSTCP is the LGPL implementation of the SSTCP protocol.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    ...Supports Cisco pix, snort and intruvert natively. Building additional support and API for additional device support. This is the open source version of our commercial software. This op
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Hasher is a .NET class library to help programmers implement standard hashing and checksum algorithms into their own software. Written entirely in C#, Hasher providers a uniform interface to easily use any of the algorithms contained within this library
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    This is a collection of vb class modules written in native Visual Basic. They provide the following functionality: Processing of very large integer numbers, hashing algorithms, prime number handling and an implementation of the RSA algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    PRE4J (Partial RDF Encryption API for Jena) is a lightweight API for encrypting selected RDF graph elements. PRE4J provides cryptographic extensions to the Jena Semantic Web Framework.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    ...The WTP Integrated Development Platform CD contains an integrated suite of programs for delivering Web applications using the Apache, MySQL and Postgres database, Perl and PHP languages. The software is installed by using a Web browser-based interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Cryptographically secure your files with asymmetric and symmetric keys, as well as password based encryptions and file/text checksums. Use upto 6 different keys to encrypt/decrypt and get checksums using MD2, MD5, SHA1, CRC32, etc..
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB