377 projects for "using" with 2 filters applied:

  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • Vibes don’t ship, Retool does Icon
    Vibes don’t ship, Retool does

    Start from a prompt and build production-ready apps on your data—with security, permissions, and compliance built in.

    Vibe coding tools create cool demos, but Retool helps you build software your company can actually use. Generate internal apps that connect directly to your data—deployed in your cloud with enterprise security from day one. Build dashboards, admin panels, and workflows with granular permissions already in place. Stop prototyping and ship on a platform that actually passes security review.
    Build apps that ship
  • 1
    Web-Check is a tool for comparing two web pages using md5 digests. It can be run from the command line or as a daemon. This project plans to become an opensource version of Tripwire for Apache.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    This project is a Linux-PAM module designed for mounting a user's encrypted, home directory using the user's login credentials as the decryption key. The module also unmounts the user's home directory at logout to re-encrypt the protected data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    A RTLinux X10 CM11 Driver using RT_COM. Plan on having a configuration file for input and control. In addition, plan on having output via HTML/CGI. Possibly have some control items via the web page.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    A Java Swing application to 'securely' store passwords using symmetric encryption. A user can set up one or many 'datastores' of password/username combinations and commit them to disk. They are stored on the file system using PBE Blowfish.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5
    PHP Project to intercept and stop worms from attacking your Apache server. Offending IP addresses are blocked using iptables/ipchains and the administrator/owner of the source of the attack is notified of the time, date and source IP Address.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A password manager that is able to encript data in various algorithms and store them in file, database, ... It is written in 100% pure Java using only Java technology.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    This is an authentication module for Apache that allows you to authenticate HTTP clients using user entries in an ACE/Server. Users must have a SecurID token and you must have an ACE/Server your Apache Web Server can talk to.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Komoku implements an intrusion detection system using embedded system. Unlike other integrity tools, as tripwire, it does not rely on the operating system. The IDS is actually implemented in an INtel EBSA-285 board.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Secure local and Network based authentication using pluggable backends which provide authentication and user/groupnames, uidmappings, tokensupport and the lot.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place. Icon
    Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place.

    For healthcare Providers and Facilities

    Incredable streamlines and simplifies the complex process of medical credentialing for hospitals and medical facilities, helping you save valuable time, reduce costs, and minimize risks. With Incredable, you can effortlessly manage all your healthcare providers and their credentials within a single, unified platform. Our state-of-the-art technology ensures top-notch data security, giving you peace of mind.
    Learn More
  • 10
    Remote Access Session is a security tool to analyze the integrity of systems. The program tries to gain access to a system using the most advanced tecniques of remote intrusion. It lets to work on normal mode (fast) and hard mode (more intensive).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    A console based encryption engine using private key files
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    GAIM encryption plugin using GPG (PGP clone). It works transparently and smoothly. Automatically establishes secure conversations with other enabled users, passes keys (if enabled) and eventually will allow you to specify your own keys to use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    dkbf is a distributed, keyboard, brute-force program for Linux clusters that attacks Windows NT Lanman and NT hashes using the Message Passing Interface (MPI).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Hyperfile provides an easy-to-use and flexible interface to power and maintain highly dynamic user-defined data sources. The data sources are stored using a secure and reliable encryption algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    This project will provide a library for using the AES round 3 cipher candidates (Mars, RC6, Rijndael, Serpent, and Twofish) in an easy to use API. Support for MD5, SHA.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    petrovich is a GPLed filesystem integrity checker similar to Tripwire. It is written in Perl using standard perl modules available from www.cpan.org. It currently supports Base64 MD2, MD5, and SHA1 hashes. Petrovich has been tested on windows 2000, Ope
    Leader badge
    Downloads: 63 This Week
    Last Update:
    See Project
  • 17
    ISP Controller is a project aimed at designing a complete sollution for a ISP-wide management system. Basically, we want the use to be able to configure any daemon, on any machine, using a central PHP/Apache backend.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Construct, inject and capture raw IP,ICMP, TCP and UDP packet using java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Very simple wrapper for using some common pgp commands from within python. Requires PGP5.0i or better(ish).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    The RAZip bitstream format was designed to provide a faster random access to compressed data than what is currently possible using the GZIP format. During the desing phase, some other features were added, like encryption and error correction.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    sectar: a program that creates encrypted tape archives(tar files), using the AES algorithm Rijndael. Encryption exported under exemption TSU 740.13. Was star, now sectar.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Haley is a Steganography Tool written in C++ using Trolltech Qt4 Toolkit.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Portable, optimised implementation of Bruce Schneier's 64-bit symmetric block cipher, Blowfish. Includes support for ECB, CBC, CFB, OFB and CTR block cipher modes, weak key detection and parallelisation using OpenMP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Open eSign allows software developers and technical parties in a company to create secure, online (web-based) forms and documents that follow a business process flow and enable legally recognized electronic signatures using digital signature technology.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    A simple and incredibly powerful tool for scripting and fuzzing arbitrary network protocols written using the Chicken Scheme-to-C compiler.
    Downloads: 0 This Week
    Last Update:
    See Project