Showing 1477 open source projects for "software"

View related business solutions
  • Auth0 B2B Essentials: SSO, MFA, and RBAC Built In Icon
    Auth0 B2B Essentials: SSO, MFA, and RBAC Built In

    Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.

    Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
    Sign Up Free
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 1
    Fingerprint Laboratory - a portable and layered package of libraries and tools for academic research and productive use that allows people to easily integrate Automatic Fingerprint Recognition technology into their software or system with little know-how.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Md5some aims to be a clone of the Gnu md5sum utility, which the additional (and seemingly unique) feature of being able to directly calculate the md5sum of a CD under Windows. It's written in C and builds on Gnu/Linux and Cygwin/Windows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Software for a van eck phreaking device. Please use to test security only. <a href="http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci550525,00.html">Here</a>'s an explanation if you don't know what van eck phreaking is.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    OS based on Agent based Security with a new type of split kernel and agents platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure Icon
    Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure

    Native application identity and user-based security for your Azure cloud

    Gain integrated visibility across all traffic in a single pass. Deploy Palo Alto Networks VM-Series to determine application identity and content while automating security policy updates via rich APIs.
    Get a free trial
  • 5
    babel.lib is Babel Com Australia's PHP Components Library, which we are releasing under an open source license for other PHP developers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Execution monitor for Java Applications.<br/> BERSERK implements the Intercepting Filter design pattern. <br/> Allows composing and runtime editing of execution flow and intercept services with access control, logging or any user-defined filters.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Develop PC based voting machine software for demonstration. Production quality software development project to follow successful demo.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    sfick (pronounced as "s-fick") is a two part software system whose function is to assist system administrators with the process of verifying the integrity of critical files. Given a system compromise, system administrators must be able to verify the integ
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    This project provides an interface to Sun's JCE (Java Cryptographic Extensions) as a JSP taglib. It brings strong encryption algorithms such as AES and Blowfish to your JSP applications. It uses the bouncycastle.org cleanroom JCE 1.2.1 implementation as
    Downloads: 0 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10
    Hashish is a file and string hashing utility that computes cryptograhpic hashes. It is cross platform and includes a gui front end.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Java Mechanic can modify public, private and protected fields and activate methods of live running apps. Also decompiles,or saves any objects or source code. Using a built in java code interpreter, objects can be created on the fly. Contains many tools.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Aiakos is a suite of software components that together provide a collaborative Single-Signon System across multiple trusted websites. A simple open protocol is provided for collaboration, and working libraries are provided for ASP and Zope.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The Enforcer is a Linux Security Module designed to improve integrity of a computer running Linux by ensuring no tampering of the filesystem. It can interact with TCPA hardware to provide higher levels of assurance for software and sensitive data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    TLogin is a java login applet for tomcat that uses a database to track login attempts and the source of those attempts. Tlogin provides features for preventing web based password guessing attack by placing temporary locks on the account after every fail
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    This is a multiplatform general utility suite for use with existing network stumbling software, such as Kismet or NetStumbler. The program will convert between multiple output logs, including the popular wi-scan format, between platforms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    CJAN is the Comprehensive Java Archive Network. It makes finding, managing and using Java software and documentation easy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    jSmithy Single Sign On project. In just time containts only custom and LDAP/ActiveDirectory authorizations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Fingerprint Verification System; an easy to use library that allows programmers to integrate fingerprint technology into their software without specific know-how. Fast, easy to use, and small; great for embedded systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    SSCL is a small, secure C++ library with some useful data types (list, avltree), stream handling, networking support, lexical analyzer, etc. SSCL's primary goal is to help daemon development in C++.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Haskell User-Submitted Libraries includes anything we can get our hands on and clean up for general use, as well as new libraries that would be useful to the general Haskell community. Submit your libs, or join the project to create needed libs!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    The mod_auth project provides authn and authz modules for the apache httpd 2.1 authentication framework.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    Java Network Library

    tacacs implementation in java

    Java Network Library - built to encompass such things as Cisco's TACACS protocol - implemented in Java
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    It is a small java eclipse plugin. This software makes workspace backups and restores them. You can use this plugin as workspace switcher too.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    IPsec2k is a C++ library that implements API for interacting with built-in Windows IPsec driver. It is self-contained and is capable of creating all policies one can create with MMC, IPsecPol or VPNtool.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    The Entitlements Library provides for the enforcement and administration of application software entitlements or permissions. The Administration component permits the creation of roles and is Servlet based.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB