377 projects for "using" with 2 filters applied:

  • Retool your internal operations Icon
    Retool your internal operations

    Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.

    Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
    Build an app in Retool
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • 1
    deEncrypt is an HTML tool which encrypts arbitrary texts (e.g., password) using AES. It is ideal for use within a business where you have to remember tons of different passwords but not allowed to install any application to help you remember them.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    ConDEnSE (Confidential Data Enabled Statistical Exploration) will be a web-based environment for statistical analysis of confidential data from various database sources, based on Plone and R, and using the Jackknife method of confidentiality protection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    ...It is a SOCKS 4-proxy that listens on localhost and acts as a middleman between your chat client and the outside world, intercepting messages and performing PGP-encryption using GnuP
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    A configurable system for synchronising multiple passwords of different types. Password quality can be imposed by using histories, cracklib based tests, and forcing certain passwords to be distinct. CGI and PAM modules exist for tight integration.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5
    A smart card-based public key cryptography system based on elliptic curves, using AES for session key generation and SHA for hashing. This project will include the smart card software, terminal software, and a public key server.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    sanesigner is a high level digital signature api component. it support generating and verifying digital signatures as well as encryption and decryption using public keys, and lots of other features in between.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    CF is a Linux/Unix command line utility for editing/managing AES-encrypted text files. Multiple users can edit the same files using their own separate passwords. It supports basic file locking, piping, adding, changing, removing, and listing keys.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Pidgin-paranoia is a plug-in for Pidgin (formerly known as Gaim) that provides information-theoretically secure encrypted conversations using one-time-pads.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    XMail anti-spam filters using libantispam.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 10
    To run fortify scan using fortify software, we are using apache-ant till now . There is no maven plugin for fortify. So i wrote a maven plugin which will do all tasks similar to ant such as fortify parse,scan and clean etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    This tool encrypts text using polyalphabetic codetables, like the encryption systems in the middle ages. It can be used for simple text encryption with a small password or as a One-Time-Pad with a random codetable for 100% secure text encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The purpose of this project is to demonstrate Information Card interoperability on heterogeneous platforms written using Java language to support Apache Tomcat, JBoss & SUN Application Server platforms running on Linux.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    DKIM for JavaMail is a small JAR that can be easily implemented in existing Java projects using JavaMail for sending DKIM signed emails.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Raiden block cipher: An extremely lightweight and fast block cipher, developed using genetic programming, with the intention to be an alternative to TEA. This cipher is as fast as TEA, and without many of its known weaknesses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Clam AntiVirus Client Library provides a simple API to the ClamAV daemon. ClamAVC does not require ClamAV to be installed. ClamAVC communicates with clamd using clamd's documented protocol using either TCP or a local Unix domain socket.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    PySumpas is a simple, graphical password generating utility written in Python/Tkinter. Using tools from the Python Cryptography Toolkit, it generates secure passwords from user input that can be regenerated if forgotten.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    A procmail based antivirus filter for incoming mail servers on Unix. It is efficient and tiny. Supports UUE, Zip and Rar attachments, Base64 and Quoted-Printable encodings. Identifies viruses, PUAs and phishings using the ClamAV clamscan virus scanner
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Python wrapper around a small subset of the OpenSSL library. Includes: X509 Certificates, SSL Context objects, SSL Connection objects using Python sockets as transport layer. The Connection object wraps all the socket methods and can therefore be use
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    JChecksum allows you to obtain the hash of a given file using a simple GUI. Hash algorithms supported include MD2, MD5, SHA-1, SHA-256, SHA-384, and SHA-512.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Blowfish Encryption over HTTP. It encrypts with your username and password using the server-generated unique key which you must have, so as to use this service. The malicious third-party can't decrypt your login info if they don't have the key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Secure downloads by checksum verification using several hash algorithms like md5 or sha1 to verify your downloaded packages using an independet third site.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Encryption application using one time pad algoritm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Recently, security is becoming a social issue. Security patch of Microsoft was cracked in several days after releasing. This kind of binary cracking is composed by debugging and reverse engineering technique.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    By emulating widespread vulnerabilities the honeypot Nepenthes is able to catch and store viruses worms using these vulnerabilities. The api interface to add new vulnerability modules is easy to use, so there is no problem in writing new ones.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Authenticating proxy server software for Mac OS X. The front-end is written in Obj-C using the Cocoa framework, but the actual proxy daemon application is written in C using plain BSD sockets.
    Downloads: 0 This Week
    Last Update:
    See Project