Showing 895 open source projects for "java open source"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 1
    KeePassX
    KeePassX is a cross platform port of the windows application "Keepass Password Safe". It is an OpenSource password safe which helps you to manage your passwords in an easy and secure way. It uses a highly encrypted database locked with one master key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    The Sleuth Kit is a C++ library and collection of open source file system forensics tools that allow you to, among other things, view allocated and deleted data from NTFS, FAT, FFS, EXT2, Ext3, HFS+, and ISO9660 images.
    Downloads: 29 This Week
    Last Update:
    See Project
  • 3
    The OVAL Interpreter is a freely available reference implementation that demonstrates the evaluation of OVAL Definitions. Based on a set of OVAL Definitions the interpreter collects system information, evaluates it, and generates a detailed OVAL Results file. Developed to demonstrate the usability of OVAL Definitions and to ensure correct syntax and adherence to the OVAL Schemas by definition writers, it is not a fully functional scanning tool nor an enterprise scanning tool. It is a...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 4

    Cobrax trojan

    Cobrax Trojan - 1.0

    Troyano de conexion inversa desarrollado en C++ & Visual Basic 6.0, con codigo abierto.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • 5

    NCrypted

    NCrypted - simple file encryption software with GPU support

    NCrypted is a simple file encryption software. It is implemented on top of AES 128-bit algorithm. This software was designed to be as simple as possible, so you won't find any fancy, flashy gui elements or complicated advanced options. You can also use it directly from command line. NCrypted can automatically detect and take advantage of your NVidia graphics card to speed up the file processing.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6

    guncat

    Guncat acts like unix's cat, decrypting pgp encrypted sections

    Guncat has moved to GitHub, and can now be reached at https://fbb-git.github.io/guncat/ Please refer to github's location for the latest archive and releases.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    ssh-cron

    cron-like daemon able to use ssh connections

    Ssh-cron has moved to GitHub, and can now be reached at https://fbb-git.github.io/ssh-cron/ Please refer to github's location for the latest archive and releases.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    gpg-remailer

    forwards re-encrypted PGP/GPG mail to a group

    Gpg-remailer has moved to GitHub, and can now be reached at https://fbb-git.github.io/gpg-remailer/ Please refer to github's location for the latest archive and releases.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Gryptonite (formerly GPassword Manager)

    Gryptonite (formerly GPassword Manager)

    Simple but Powerful, Cross-Platform Password Management Utility

    A simple but powerful cross-platform utility for managing and accessing your most secret data. It stores passwords and whole files, so it can literally store any information you want to keep secret. Access your most-used passwords/URLs right out of a desktop tray icon. For advanced users, it includes a separate utility called Grypto-Transforms, which has a universal hash calculator with all the major hash functions, generic encrypt/decrypt functions and a base64/hex converter. Although...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 10
    Cassiopeia's BitMail

    Cassiopeia's BitMail

    Encrypting E-Mail Client

    ... ● Build-in Encryption to secure E-Mails ● IMAP & POP3 ● Additionally a full decentral P2P Email-Option via the Echo Protocol ● Store Email for Offline-Friends in the P2P Network. ● Chat and Instant Messaging is build in. ● POPTASTIC function (Chat over Email) ● Calendar widget functionality. ● Open Source. BSD License. "Cassiopeia is the tortoise of Momo, which can communicate through writing on her shell and guides into the future." - Wikipedia. Source from: https://sf.net/projects/spot-on/files/ & https://github.com/textbrowser/spot-on
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Luadch

    Luadch

    We moved to GitHub! -> http://luadch.github.io/

    We moved to GitHub! New Website: http://luadch.github.io/ There you will find all the necessary informations.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    VoIP Honey project provides a set of tools for building an entire honeynet, thus includes honeywall and honeypot emulating VoIP environments such as Asterisk PBX or OpenSer with fully configurable connections. Voip Honey runs on GNU/Linux and Windows Systems. It can be compiled for Mac OSX as well.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    [[We are in the progress of moving to github]] Metalinks is a project to facilitate data distribution over mirrors and P2P networks. It does so by defining an XML format and the tools to handle these. The metalink files contain all the information needed to download and verify files.
    Leader badge
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    cryptHider

    cryptHider

    encFS qt wrapper, creates encrypted folder

    It is a pure qt version of gtk-based cryptkeeper. It allows to create encrypted folders, mount them and import folders created by encFS utility. Program resides in system tray.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    WinMD5sum

    WinMD5sum

    A simple GUI MD5 sum Tool run on Windows

    WinMD5sum is a MD5sum tool for those who need a small and simple tool to just get the sum.It has a GUI look and keeps small(only 40KB).Runs only on Windows platform.The highlight is it can handle very large file(over TB) and the speed is fast enough.Enjoy it!
    Leader badge
    Downloads: 47 This Week
    Last Update:
    See Project
  • 16
    Gryptonite

    Gryptonite

    Cross-platform encrypted password and file database

    A user-friendly, cross-platform utility for managing and accessing your most secret data. It stores passwords and whole files, so it can literally store any information you want to keep secret. Access your most-used passwords/URLs right out of a desktop tray icon. For advanced users, it includes a separate utility called Grypto-Transforms, which has a universal hash calculator with all the major hash functions, generic encrypt/decrypt functions and a base64/hex converter. It's not just...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Fleeting Password Manager

    Fleeting Password Manager

    Fleeting Password Manager generates and manages passwords.

    Fleeting Password Manager is a simple program that generates highly secure pseudo-random passwords from the given master password, URL/ID (e.g. facebook, www.facebook.com, google, my_server..) and user name. The user needs to remember only her master password to recover other passwords. Passwords are always regenerated on-the-fly from the given login data when needed and are never saved. In other words, Fleeting Password Manager combines the password creation and management. The length of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Hashpipe

    Modular Digestion Tool

    Hashpipe is modular hashing tool which can have its functionality easily expanded with new modules. It can be used as a compact command-line tool, a C library and a C++ object.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    SimpleKey

    SimpleKey

    Generates keys up to 500 characters and hashes.

    Ever wanted a random key generator? With SimpleKey, you can generate random keys up to 500 characters in length and save them to text files. These keys can be all numerical, alphanumeric, all alphabetical or the previous three plus special characters. You may use your generated key for whatever purpose. SimpleKey also includes a hash table with which to hash strings and files alike. Hash algorithms include: MD4/5, Sha, Skein, Keccak, Grostl, JH, and Blake.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 20
    Stealth has moved to GitHub, and can now be reached at https://fbb-git.github.io/stealth/ Please refer to github's location for the latest archive and releases.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Kypeless

    Kypeless

    Fully decentralised secure p2p communication program

    Kypeless encapsulates strong symmetric and asymmetric cryptography so you can get the benefits of secure communication following some simple steps. Right now, Kypeless is unstable pre-alpha software, published only for testing purposes. Kypeless allows you to exchange instant messages, long not-so-instant messages and files, but a lot more features are planned to be implemented later.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Rinzler USB Cleaner

    Rinzler USB Cleaner

    V2.0-Unhides Folder/Files,removes malicious scripts from USB Drive

    V2.0 (30th Dec 2014). It is a USB Malware Cleaner. This is a small tool that removes malicious scripts created by virus or malware, unhides folder and files, deletes all shortcut from selected drive. Also disables autorun completely and provides option to enable registry, folder options and task manager. Visit the project website for more information.
    Leader badge
    Downloads: 219 This Week
    Last Update:
    See Project
  • 23
    HT is a file editor/viewer/analyzer for executables. The goal is to combine the low-level functionality of a debugger and the usability of IDEs. We plan to implement all (hex-)editing features and support of the most important file formats.
    Downloads: 28 This Week
    Last Update:
    See Project
  • 24

    lecithine

    FUSE File system powered by secret sharing scheme

    Lecithine is a FUSE (file system in user space) using a secret sharing scheme. You can use Lecithine as regular file system. When writing to disk, data will be devided into randomly chosen pieces (secret shares) and stored into different places. Upon reading, the shares are merged together such that in turn the plaintext results. From a cryptographers point of view, there is no symmetric or private key ever needed to produce a ciphertext. This is how secret sharing schemes are designed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    BitKiller
    BitKiller securely shreds files and directories, removing them completely from your hard disk. It can quickly and efficiently overwrite files using anything from random data to the Gutmann method. It also changes filenames to make them harder to find. No setup or installation needed.
    Leader badge
    Downloads: 67 This Week
    Last Update:
    See Project