Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.
Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
Download Free Tool
AI-generated apps that pass security review
Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
An easy-to-use generator for large numbers of passwords.
Originally for my school's IT Department, I have now released the source code under the GNU GPL. It supports the random generation of huge numbers of passwords that can be determined in a variety of ways.
SJEA version 1.0 - SimpleJava Encryption Algorithm. SJEA is a simple command-line binary encryption algorithm (symmetric block cipher) written in JAVA. It uses a password and a byte-vector array to scramble the input file.
The main purpose of this project is to develop a Graphic policy definition editor implemented in Java language and based on the XACML standard which manages access control policies
Project37 is a model-driven software application that uses an XML schema to generate security services which can be used to alter GUI forms or XML data sets.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Console of administration WEB for clients with installed ClamWin. The objective of this project is to use an opensource software, and generate a comprehensive solution of Antivirus. The antivirus ClamWin was selected. The project is a Web interface for a
Safe all your passwords and encrypt them with a single password? Yawn. Synchronize your encrypted entries between different machines? Without compromising your security? Here comes SyncYourSecrets
obov stands for OATH Based OTP validator. It's a 100% pure Java library that provides simple to use methods to validate (and related utilities) one time passwords generated by OATH compliant devices.
ToolME provides J2ME mobile application developers with a set of API utilities (tools) that aim to solve many of the common problems a J2ME developer will face when developing mobile software.
jCryptPad stores text informationen hierarchical, e.g. passwords, important texts etc. The data is saved in a encrypted xml file. Encryption is done with the AES algorithm. Additionally a password generator and a text encryption editor is also included.
For companies looking to automate their consolidation and financial statement function
The software is cloud based and automates complexities around consolidating and reporting for groups with multiple year ends, currencies and ERP systems with a slice and dice approach to reporting. While retaining the structure, control and validation needed in a financial reporting tool, we’ve managed to keep things flexible.
XMLStore is a new project that cares about XML-based Databases Access with users Authentication and Authorization and more such as dead-lock accesses.
It will be soon introduced to other kind of databases such as SQL,...
A simplejava library (1.5.* and higher versions) in order to crypt (or decrypt) a file using a password. The library accepts the following parameters: an input file, the operation to perform, and the user password.
Cnc's IP Data Volume Report:
Logs IP to IP contact, number of packets, bytes, time of contact, Ethernet too!
View via local web interface.
Very simple for those who want to view who your computer is contacting the most!
This project provides a simpleJava-based steganography tool that can hide a message inside a 24-bit colour image so that knowing how it was embedded, or performing statistical analysis, does not make it any easier to find the concealed information.
This application is meant for those end users, who wish to quickly learn how to use XACML based systems. It provides the user to create and load XACML policies, and then analyze the XACML response in a separate window.
Watermill is a watermarking and fingerprinting software written in Java. It consists of a generic watermarking library which is used by other libraries to watermark relational databases (Postgresql,MySQL), XML Dbs (Xindice) and Web Services. WARNING:
JDO is a Java DeObfuscator that works on class files directly. JDO contains a simple and easy to use GUI that makes automatic deobfuscation of Java projects a one-click operation!
Sting is a simple, host-based approach to detecting arp cache poisoning based man in the middle attacks (such as made by ettercap) on your LAN. It uses SNMP to periodically query the arp cache of your router and make sure its entry for you is correct.
JSerpent is an easy to use Java implementation of the powerful Serpent cryptography algorithm. It can be easily implemented into any project, and is complete with ECB, padding, and a simple API.
JFish is a simpleJava implementation of the popular Twofish cryptography algorithm. It allows any application to easily implement powerful encryption, using a single small library and minimal code changes.
JRijndael is a 100% pure Java implementation of the popular Rijndael (aka AES) cryptography algorithm. It's designed to be implemented as easily as possible and features ECB, padding, and a simple API.
The Eclipse XML-Security Plug-In allows you to experiment with the W3C recommendations on digital signatures and encryption and to learn all about their background. Arbitrary XML documents can be canonicalized, signed, verified and en- or decrypted.
Heimdall is a Java content validation framework that addresses checking of data in distributed software systems. Developers are encouraged to identify potentially untrustworthy data sources, and specify validation rules in XML.
The file recovery process is not an easy task to run on Linux and Unix based OSes and there`s almost no good user interfaces for end users, so that`s why, El Recuperador, is intended to make a generic Web-based GUI framework based on forensics informatic