Showing 5813 open source projects for "java open source"

View related business solutions
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Best Recruitment CRM, ATS, and Staffing Software Icon
    Best Recruitment CRM, ATS, and Staffing Software

    Fast and flexible talent software solutions that empower professional recruiters and maximize growth.

    Crelate is a comprehensive recruitment software designed for staffing and recruiting agencies, and in-house corporate recruiting teams. Offering a powerful Applicant Tracking System (ATS) and Recruitment CRM, Crelate helps streamline the entire hiring process.
    Learn More
  • 1
    RSAmake

    RSAmake

    An Cryptography software with RSA algorithm

    An Cryptography software with RSA algorithm RSAmake using Python and WxPython written
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    WPACrackGUI

    WPACrackGUI

    WPACrackGUI es un entorno gráfico de crackeo de redes WPA con john.

    WPACrackGUI es un programa que mediante a la generación asistida de john puede crackear redes WPA sin ningún problema simplemente clickeando unas veces.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    puff

    puff

    Fast and Strong Data Encryption Algorithm

    svn checkout http://umcipher.googlecode.com/svn/trunk/ umcipher-read-only
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Hide In Picture is a program that allows you to conceal files inside bitmap pictures, using a password. The pictures look like normal images, so people will not suspect there is hidden data in them.
    Downloads: 14 This Week
    Last Update:
    See Project
  • North One Connected Banking Icon
    North One Connected Banking

    North One is a business banking app that integrates cash flow, payments, and budgeting to turn your North One Account into one 'Connected Bank Account

    Connect every part of your business to one bank account
    Learn More
  • 5

    pproxyd

    Passive Proxy Daemon sniffs packets and creates squid proxy logs

    Passive Proxy Daemon (pproxyd) has moved to GitHub (https://github.com/rondilley/pproxyd ) This tool reads pcap format files or reads packets directly from the network, assembles web based traffic and generates squid proxy style logs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    FactHash

    Factorial Hashing Function

    My first attempt at a one-way hashing class/algoritm, built as a python class. It produces variable length hash from a message block of the size you want. The resulting hash will be ~2x the message block in size, and should provide for at least as many bits of security as the block itself. I updated this, with a different hash than original, since I found a potential collision on some blocks, not but specific to that challenge. To further correct this, I modified the padding when it's...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    2Pix
    2Pix integrates with Windows to allow you to easily encrypt and hide files in bitmap images, a process called steganography (not to be confused with stenography). Data is stored in the low-order bits of each pixel of an image, so the file is completely hidden from view. Version 1.1 now provides plausible deniability because no unencrypted signature is stored in the image header. It should be impossible to prove an image contains a hidden file (if you use a strong password and only use 1 or 2...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Pass Phrase Generator

    Strong pass phrase generator using python on ubuntu

    Strong pass phrase generator using python on ubuntu. The code takes 2 random words and a random number, concatenates them together and puts one of the words into upper case. This provides a long easy to remember pass phrase which satisfies "must include numbers, letters, upper and lower case" password guidelines. The code is called Pass Phrase Generator because it lets me use the acronym PPG which is the energy weapons used in Babylon 5.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    KillDisk

    KillDisk

    Disk Wiping Software

    KillDisk is a program written in python for Unix based systems for wiping a hard drive. It can wipe a hard drive using all zeroes or random data, and as many times as you want to specify. If you'd like to donate there's several ways to do so: PayPal: https://paypal.me/gerowen Bitcoin (BTC): bc1q86c5j7wvf6cw78tf8x3szxy5gnxg4gj8mw4sy2 Monero (XMR): 42ho3m9tJsobZwQDsFTk92ENdWAYk2zL8Qp42m7pKmfWE7jzei7Fwrs87MMXUTCVifjZZiStt3E7c5tmYa9qNxAf3MbY7rD LiberaPay: https://liberapay.com/gerowen
    Downloads: 6 This Week
    Last Update:
    See Project
  • Print management system for direct buyers, brokers, in-plants and printers. Icon
    Print management system for direct buyers, brokers, in-plants and printers.

    P3Software is a premier provider of intelligent print management solutions.

    P3Software's affordable print management system, is ideally suited for corporate, non-profit and educational print buyers, print managers, in-plants and print manufacturers. Designed by print experts, this easy-to-use print procurement management system helps users manage the print sourcing and buying workflow, from initial job specification to project delivery. Core features include bid and buy or direct buy, customer proposal (estimate), customer direct ordering, enhanced CRM, powerful reporting, easy access to current and historical data, and outstanding training and support.
    Learn More
  • 10
    Password Cracker
    Crack the encrypted passwords (MD5,SHA, etc....)
    Downloads: 5 This Week
    Last Update:
    See Project
  • 11

    BO cracker

    Live System pour attaque réseau.

    BO-cracker est un système LIve CD comportant LOIC, W3af et Framework 4.0.0
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Lock Windows workstation upon disconnection of bluetooth device. The program is able to run user specified commands on device connection and disconnection. Requires .NET 3.5
    Downloads: 14 This Week
    Last Update:
    See Project
  • 13

    OpenVpnLauncher

    Windows launcher for OpenVPN-GUI

    The OpenVPN-GUI project requires you to configure Windows to launch it with elevated privileges, and also requires an awkward process of launching, right-clicking and selecting a connection to open. This launcher handles both tasks graphically. Requires .NET Framework 2.0 or higher.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    ZenCrypter

    Zinga's interpretation of an Encryption Program

    A file encryption program created specifically for the soul purpose of security. This program is completely free and open-source, but the source code may only be distributed by Zinga, unless authorized.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Python module for the libpcap packet capture library, based on the original python libpcap module by Aaron Rhodes.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 16
    CRePE (Context-Related Policy Enforcement) aims to support efficient context-related policy enforcement on mobile platforms. A context-related policy is a policy which enforcing requires the awareness of the user/device context.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Pombo

    Pombo

    Pombo can help you recover your computer in the event it's stolen.

    Pombo works silentely in the background, hidden, and sends tracking information to a webserver of your choice. If your computer is stolen, just log into your webserver to get the lastest file uploaded by Pombo, decrypt and hand it to the police. They will have all they need to catch the thief: IP address, date/time, nearby routers, screenshot, and even a photo of his/her face if you have a webcam ! Pombo protects your privacy: Tracking information is encrypted with rock-solid GnuPG and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Windows Phone App Analyser

    An application to decompile and analyse Windows Phone apps

    An application to decompile and analyse Windows Phone apps specifically focusing on finding security issues.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    PyEvcs

    Extended Visual Cryptography Schemes in Python

    Visual Cryptography is a graphical form of information concealing. In a 2-out-of-2 Visual Cryptography Scheme a dealer will "split" a secret image into two shares, print the shares onto separate transparencies and hand them to the participants to the scheme. If the two participants come together, they'll be able to reveal the secret image without a computer, perfectly superimposing the transparencies they own. Analyzing a single share, no one will be able to obtain any information...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    sqlsus is an open source (My)SQL injection tool, written in perl. It focuses on speed and efficiency, optimising the available injection space. It provides an easy to use interface with lots of neat features. For more information, please visit http://sqlsus.sf.net
    Downloads: 2 This Week
    Last Update:
    See Project
  • 21
    NSIA
    NSIA (Network System Integrity Analysis) is a web application monitoring system that scans web applications for potentially unwanted context such as defacements, unauthorized changes, errors, information leaks, profanity, compliance issues, etc
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    SuStorID is an advanced Intrusion Detection System (IDS) for web services, based on machine learning. Its name comes from the term “Su Stori”, which in Sardinian language means “The Falcon”. It’s version is experimental, but demonstrates a number of interesting features, that can be readily exploited to detect and act against web attacks. SuStorID can be coupled with modsecurity, the well known web application firewall, to gather training data and provide for real-time counteractions. So,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Mantra on Chromium

    Mantra on Chromium

    Chromium based portable browser for pentesters

    MoC is a chromium based portable browser with collection of open source extensions meant for penetration testers, web application developers and security professionals etc.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    iBox
    iBox is a powerful information management tools for Android, which gives you a safe and secure way to store all of your critical information. It could be credit card numbers, accounts, passwords, marketing plans, product ideas, minutes and much more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    The CPE Reference Implementation is a freely available application that demonstrates the naming and matching schemes of the CPE specification.
    Downloads: 0 This Week
    Last Update:
    See Project