Showing 895 open source projects for "java open source"

View related business solutions
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 1
    IPsec2k is a C++ library that implements API for interacting with built-in Windows IPsec driver. It is self-contained and is capable of creating all policies one can create with MMC, IPsecPol or VPNtool.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Live Security/Forensics Linux Distribution, built from scratch and packed full of tools useful for vulnerability analysis, penetration tests, and forensic analysis.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    OnePassword aims to take away the burden of passwords and user accounts from the typical Internet user. All you have to remember is One Password. OnePassword will remember the rest.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Random number generator, and random number seed generator classes for C++. Includes abstract base classes and derived generators. Cross platform compatible.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 5
    Psniff is a packet sniffer and spoofer based on the PF_PACKET protocol family provided in kernel >=2.0 . Some of the protocols initially supported are IPV4,IPV6,TCP,UCP,BGP,ICMP,RIP, NTP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Encrypt-roller is a encryption/decryption package. The goal of the project is to incorporate multiple encryption schemes and mechanisms to provide security and validity for files being stored or transferred.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    JPassGen is an usefull strong password generator for secure login protection. (GPL / Java Swing / JNLP)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    The modWASTE project is used by WASTE developers to experiment with modifications that may be added to the main WASTE source tree. These modifications are experiments for WASTE 2. modWASTE may eventually contain features not avalible in WASTE.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A fast and easy-to-use crypto library with support for Blowfish, CAST5, MD5, SHA-{0,1}, TEA, IDEA, RC2, RC4, RC5, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Yeastar: Business Phone System and Unified Communications Icon
    Yeastar: Business Phone System and Unified Communications

    Go beyond just a PBX with all communications integrated as one.

    User-friendly, optimized, and scalable, the Yeastar P-Series Phone System redefines business connectivity by bringing together calling, meetings, omnichannel messaging, and integrations in one simple platform—removing the limitations of distance, platforms, and systems.
    Learn More
  • 10
    RemenDeKO is a file repair program that you can use to generate off-line patch files to apply over damaged files. It's targeted for corrupted downloads, so the downloader just need to re-download a (probably) small file to fix the damaged download.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    The John Darm project aims at developping a software that can tests a brute force attack on weak UNIX passwords. It s a multi-client application that dispatches the calculations between the different clients.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    An anonymizing peer-to-peer file storage network, similar to Freenet and Gnutella - only better, of course.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Steghide is a steganography program that is able to hide data in various kinds of image- and audio-files. The color- respectivly sample-frequencies are not changed thus making the embedding resistant against first-order statistical tests.
    Leader badge
    Downloads: 981 This Week
    Last Update:
    See Project
  • 14
    sntm is a Qt based GUI snort monitor. Currently, it is capable of monitoring multiple snort sensors in a centralized monitor screen. Each snort sensor creates a SSL encrypted communication thread to connect to the moniter server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A stable and fast Linux/Unix toolset to aid in the security and ease of use of *Nix.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    A C++/Qt program for use in encrypting and decrypting simple substitution cyphers. These cyphers are often found in newspapers and various puzzle books.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    The Lattice An anonymous, secure and scalable peer-to-peer network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    This program demonstrates a weakness in the authentication process of 802.1X EAP-MD5 in Wi-Fi networks that allows an attacker to gain login information by a dictionary attack. A Wi-Fi compliant card (802.11a,b,g) that supports monitor-mode is required.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    ReHash is an easy-to-use console-based hash calculation tool written in C++. It supports many algorithms and output formats and it can be fully configured using some of the many command-line arguments which can be passed to the tool.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 20
    The SWAP (Secure Wireless Access Point) project is intended for use in embedded appliances. These appliances will operate in the role of a WEP (wireless encryption protocol) and IPSEC enabled wireless access point, IPSEC VPN gateway, and firewall.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Kerberizer adds Kerberos support to insecure IMAP, POP and FTP clients running on Windows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Dynamic tool for effectivly removing troublesome hosts from a routed network using ettercap and snort. This tool has been proven to be effective in slowing the spread of the RPC DCOM virii that have been in circulation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    tcpamp is a simple GUI for tcpdump and tcpreplay written in Qt/C++. Features: save tcpdump expression in XML format, intuitive dump expression maker, friendly replay interface, multi-platform (Qt based).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    SIPES (Security Incident Pollicy Enforcement System) aims to provide an automated e-mail,XML and PKI based system for automated security policy enforcement based on statefull risk assesment and open exchange formats.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    PATC is a client/server package for controlling internet access on public terminals (e.g., in a library). Users log in, and are given access to the internet with a time limit determined by the server.
    Downloads: 0 This Week
    Last Update:
    See Project