Showing 1392 open source projects for "java open source"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • 1
    foosh is a Unix shell replacement for security conscious admins. Advanced keystroke logging, restrict commands to approved list with MD5 checksums, restrict interactive ssh logins, and lots more. If you need restricted access you need foosh!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    The subject of this project is development of the Intrusion Detection System (IDS) with Artificial Neural Network (ANN). This model will allow the implementation of a system capable to analyze and to identify possible intrusions, based on the method of an
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Utilities for measuring characteristics of cryptographic hash functions: avalanche property, (partial) collision search, Maurer's universal statistical test, Filiol's Mobius ANF statistical analisys. EdonC, EdonR, MD5 and SHA-1 hash-plugins included.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    Encrypt-roller is a encryption/decryption package. The goal of the project is to incorporate multiple encryption schemes and mechanisms to provide security and validity for files being stored or transferred.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place. Icon
    Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place.

    For healthcare Providers and Facilities

    Incredable streamlines and simplifies the complex process of medical credentialing for hospitals and medical facilities, helping you save valuable time, reduce costs, and minimize risks. With Incredable, you can effortlessly manage all your healthcare providers and their credentials within a single, unified platform. Our state-of-the-art technology ensures top-notch data security, giving you peace of mind.
    Learn More
  • 5
    Eselstall Secure Environment to Launch Software you don't Trust At aLL: Combined chroot/setuid tool to easily launch background processes (servers) in a confined environment. Eliminates the need for su in the changeroot directory.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    CPU is meant to be a swiss army knife for administrators who are currently using or wanting to use an LDAP backend for user authentication. This project allows for easy user administration of LDAP users and allows for user and group mods, deletes and add
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Passes, while seemingly just another password generator, is actually the first 100% pure Cocoa open-source password generator (that I know of, at least). Passes strives to be the most flexible solution for generating passwords out there.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    The modWASTE project is used by WASTE developers to experiment with modifications that may be added to the main WASTE source tree. These modifications are experiments for WASTE 2. modWASTE may eventually contain features not avalible in WASTE.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    ThreatMan is an IDMEF compliant threat manager application which makes use of a multi-tier architecture. It aims in event and vulnerability correlation from alerts sent by IDSs, firewalls and other IDMEF compliant applications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cloud data warehouse to power your data-driven innovation Icon
    Cloud data warehouse to power your data-driven innovation

    BigQuery is a serverless and cost-effective enterprise data warehouse that works across clouds and scales with your data.

    BigQuery Studio provides a single, unified interface for all data practitioners of various coding skills to simplify analytics workflows from data ingestion and preparation to data exploration and visualization to ML model creation and use. It also allows you to use simple SQL to access Vertex AI foundational models directly inside BigQuery for text processing tasks, such as sentiment analysis, entity extraction, and many more without having to deal with specialized models.
    Try for free
  • 10
    A "Theoretically Secure Operating System", focused on information protection, that is provably secure provided that a specific part of the kernel would be free of bugs. In particular, bugs in application can't be exploited to attack the system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    A fast and easy-to-use crypto library with support for Blowfish, CAST5, MD5, SHA-{0,1}, TEA, IDEA, RC2, RC4, RC5, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The John Darm project aims at developping a software that can tests a brute force attack on weak UNIX passwords. It s a multi-client application that dispatches the calculations between the different clients.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    A ultrafast lightweight (no GUI) encryption/decryption software using the CryptoAPI on Windows platform, to secure just about anything - regular files and directories, consoles, communication resources(COM ports), Disk devices, pipes and sockets anythin
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    xhelix: python C extension implementing Helix encryption and authentication. Based on the article named "Helix: Fast Encryption and Authentication" by Niels Ferguson and Bruce Schneier, published in the Nov 2003 issue of Dr Dobbs Journal.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Extendable game server for a Linux Deathmatch. Basically, a Linux Deathmatch is a realtime hacking competition where several teams share a network and try to set up services, for which they get scores, and hack the other players.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This is a client/server project. Server part is store information about logins in SQL database. Client part it\'s NSS-module for glibc. Client integrates into any program, which use standard getpw.../getgr...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    LavaRnd is a random number generator that converts a digitized chaotic source (such as a lens capped web camera) into cryptographically strong random numbers. LavaRnd comes with both an APIs (currently C and Perl) as well as a number of demos.
    Leader badge
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    OceanStore is an architecture for a global-scale file system which uses erasure coding, cryptography, and Byzantine agreement to provide available, highly durable storage in a peer-to-peer environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    sud is a daemon to execute interactive and non-interactive processes with special (and customizable) privileges in a nosuid environment It is based on a client/server model and on the ability to pass file descriptors between processes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    sntm is a Qt based GUI snort monitor. Currently, it is capable of monitoring multiple snort sensors in a centralized monitor screen. Each snort sensor creates a SSL encrypted communication thread to connect to the moniter server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    AmritaVPN (amvpn) is an easy-to-use virtual private networking tool that allows two private IP networks to be seamlessly connected together through a public network such as the Internet. Uses SSL for strong encryption and authentication.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    SVPN provides an encrypted tunnel between two hosts, which in combination with IP forwarding enabled on one of the hosts can create a VPN.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 23
    A stable and fast Linux/Unix toolset to aid in the security and ease of use of *Nix.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    KAVClient is a C language interface to Kaspersky Antivirus Daemon (KAVDaemon), a part of Kaspersky Antivirus for Linux, a popular anti-virus software from Kaspersky Lab (www.kaspersky.com).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    sLink is a package for administering an EDM/Bosch Solution-16 alarm panel.
    Downloads: 0 This Week
    Last Update:
    See Project