377 projects for "using" with 2 filters applied:

  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 1
    Provides a simple site protection for static sites, using PHP and mod_rewrite.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    A plattform independent encryption-tool with a simple user interface (swing/java). It uses 'Password Based Encryption' (PBE) to encrypt and/or decrpyt files on the filesystem. Encryted files will also be compressed using the zip-format.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Access Point Utilites for Unix - it's a set of utilites to configure and monitor Wireless Access Points under Unix using SNMP protocol. Utilites knownly compiles and run under Linux, FreeBSD, NetBSD, OpenBSD, MacOS-X, AIX, QNX.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    WEPCrack is a tool that cracks 802.11 WEP encryption keys using the latest discovered weakness of RC4 key scheduling.
    Downloads: 14 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 5
    ClamSMTP is an SMTP filter that allows you to check for viruses using the ClamAV anti-virus software. It accepts SMTP connections and forwards the SMTP commands and responses to another SMTP server. Works well with Postfix.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Qryptix consists of a PAM object and utilities for session- and key-management for encrypted home directories using the International Kernel (CryptoAPI) patches for Linux. It simplifies login/logout, mounting/unmounting, and key generation and changing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Secure Key is an uncrackable security mechanism that minimizes trust given to stored keys, and obfuscates key data in random noise. The Secure Key itself is a hardware device that plugs into your PC (and the server the other end). The key is sent to user
    Downloads: 3 This Week
    Last Update:
    See Project
  • 8
    Junto is a Java-based peer-to-peer framework which allows using, simulating, and testing different trust management models which can be employed in peer-to-peer networks. Junto is available for free under the terms of the GPL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Java SSL Engine using OpenSSL for higher performance SSL thoughput with ability to use Java 1.4.x NIO channels.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Easy-to-use Business Software for the Waste Management Software Industry Icon
    Easy-to-use Business Software for the Waste Management Software Industry

    Increase efficiency, expedite accounts receivables, optimize routes, acquire new customers, & more!

    DOP Software’s mission is to streamline waste and recycling business’ processes by providing them with dynamic, comprehensive software and services that increase productivity and quality of performance.
    Learn More
  • 10
    The purpose of this project is to provide a biometric security solution by using voice print, fingerprint and/or facial recognition along with a password and/or smart card support using AES to protect data. Please read forums for if interested.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Ncurses based tool for easily deploying IPsec tunnels using FreeSWAN (Linux only) Easy to configure a tunnel, simple options, user friendly interface
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    FreeIPS is an intrusion prevention system originally coded for FreeBSD. It has the possibility of using regular expressions and byte-by-byte comparison of packet payloads. It includes plugin support, to allow maximum expandibility.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Password Keeper: Password Keeper will be a program that lets you put all of your passwords in one file and encrypt it easily instead of using a flat file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    StegoGO is an open source software that allows the embedding of hidden data in GO games, using GNUGo. It allows both the embedding of hidden data in an already existing GO game, and the creation of new GO games to hide data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A Secure Diary Program written in Java and using the bouncycastle JCE Cryptograpic library. It uses a combination of BlowFish and TripleDES (XORed) to encrypt Diary entries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    USRBAC is a kernel patch and userspace daemon that allows role based access control to be mitegated in userspace. The goal is to allow a secure way to impliment RBAC compliant security systems using a daemon in userspace
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    A small bash script to create, mount and unmount an encrypted partition / file. Using the kernel's cryptoloop, and all encryption cyphers supported.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Cryptar is a cryptographic network backup program that is able to be very efficient with network resources by using an algorithm derived from the rsync algorithm. It uses SHA-1 hashes to verify (sign) its data and AES to encrypt it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Invenire vera is a tool designed to detect attacks using standard unix logs of one or more systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Simple XOR Encryption is written in c++ and can encrypt files using insecure XOR encryption. Could be used to form framework for implementing XOR encryption in other programs, such as encrypting save game files in games, etc. Tested on Windows + Linux.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    Awesum is an automated graphical checksum verification utility written in Python using the PyGTK toolkit. It currently supports both MD5 and SHA checksums.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    A hybrid dictionary/brute passphrase search tool for PMK discovery on 802.11 networks using WPA with preshared keys (PSKs)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    A full-featured, Java-based back-office suite specifically designed for use in global financial institutions to facilitate straight-through-processing and other much-needed operational efficiencies. Built using best-of-breed, open-source technologies.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Ultramagnetic is a concurrent fork of GAIM that provides strong end-to-end encryption using libgcrypt and anonymous routing using the Six/Four protocol.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 25
    Java Mechanic can modify public, private and protected fields and activate methods of live running apps. Also decompiles,or saves any objects or source code. Using a built in java code interpreter, objects can be created on the fly. Contains many tools.
    Downloads: 0 This Week
    Last Update:
    See Project