Showing 1392 open source projects for "java open source"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • 1
    A suite of tools (a sniffer, a TCP hijacker, an ARP poisoner and a TCP tunnel through ICMP/IGMP packets) created for testing TCP/IP weakness and using them in a non-conventional way. [Up to now I've done only the sniffer-related part]
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    AGT is a powerful console frontend to iptables, supporting nearly all of the iptables extensions. All options can be specified in a configuration file with similar syntax to 'ipf' and 'ipfw'.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    microCODE is a PHP module that allows inclusion of encrypted PHP sourcecode instead of plain PHP scripts. Protect your intellectual property using standard encryption algorithms like DES or AES.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    An alternative Identification system that is a replacement for Microsoft's Passport and the Liberty Alliance. Its a simple architecture that is setup so anyone can run a server and thereby have control over their online identification.
    Downloads: 1 This Week
    Last Update:
    See Project
  • The Most Powerful Software Platform for EHSQ and ESG Management Icon
    The Most Powerful Software Platform for EHSQ and ESG Management

    Addresses the needs of small businesses and large global organizations with thousands of users in multiple locations.

    Choose from a complete set of software solutions across EHSQ that address all aspects of top performing Environmental, Health and Safety, and Quality management programs.
    Learn More
  • 5
    The Sentry tools provide host-level security services for the Unix platform. PortSentry, Logcheck/LogSentry, and HostSentry protect against portscans, automate log file auditing, and detect suspicious login activity on a continuous basis.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    pam_krb5 is designed to allow smooth integration of Kerberos 5 passwordchecking with applications built using PAM. It also supports session-specific ticket files (which are neater), Kerberos IV ticket file grabbing, and AFS token-grabbing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Protowatch is a userspace extension to Linux\'s 2.4 iptables firewalling code. Userspace will dynamically start a server to accept the packet, and log whatever the client sends. Useful for discovering what protocols are in use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    The Smart Linux Firewall will provide IP filtering, Network Address Translation, Vistual servers, mail relay and DNS cache. We will use existing network tools as much as possible, and produce a web interface to administrate this tools.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    The goal of the Stik's Security Module project is to provide a vehicle for implementation of a label based security policy complimentary to the existing Linux security model. The module is implemented by hooking the Linux 2.4.x system call table.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Financial reporting cloud-based software. Icon
    Financial reporting cloud-based software.

    For companies looking to automate their consolidation and financial statement function

    The software is cloud based and automates complexities around consolidating and reporting for groups with multiple year ends, currencies and ERP systems with a slice and dice approach to reporting. While retaining the structure, control and validation needed in a financial reporting tool, we’ve managed to keep things flexible.
    Learn More
  • 10
    Bootable CD Forensics/Virus Scanning/Recovery/PenTesting platform
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    This project is aimed to provide good support of smartcard readers for Linux/Unix users. In contrast to MUSCLE we try to implement our drivers as portable as possible and currently focus on Towitoko drives.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Seahorse is a Gnome front end for GnuPG. It is a tool for secure communications and data storage. Data encryption and digital signature creation can easily be performed through a GUI, and Key Management operations also can be performed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    OpenSST (Open Simple Secure Transaction) is a project to create a simple security protocol for making transaction between (un)trusted parties. The project includes a protocol design specification and a cross-platform software implementation of the speci
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Libike is a cross-platform C library for managing IKE negotiations.The library implements RFC-standard ISAKMP/IKE exchanges and utilizes callbacks to delegate tasks of the packet transmission and security policies management to the external code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Get your files crypted in easy way, absolutely non-painful. For Linux kernel.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    A port scanner, with special abilities agianst IDS and Firewalls. It's under development and new features will be added slowly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    ICMP-Chat is a simple chat for the console that uses blowfish encrypted packets for communication.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 18
    A replacement to traditional syslog daemons. Including cryptographic log protection, mysql, postgresql. Supported on Linux, BSD, Irix, Solaris and AIX.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    UNIX billing system, for network servers, voip, etc.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 20
    A filtering proxy which processes HTTP- and HTML-traffic to enhance the security: Remove javascript calls, check document types, remove client infos (operating system, browser version)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    A gpg crypto module for apache. This is an add-on module for the popular apache webserver to provide gpg functionality to web pages via an xmlrpc interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    An ultrasecure communications server and clients for *NIX and Windows hosts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Syslog-sec, provides an open secure syslogd implementation based on (RFC) standards, including rfc3164 ("syslog") and the upcoming "syslog-sign" . Other extensions, will/can be added. More tools will be added, too
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Open Source Stenography engine usable from the command line. Uses various techniques for hiding and retriving stenographic information. Includes a small image analysis suite for detecting stenographic images.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    sechk - SEcurity CHecKer It is a powerful and useful tool to check if you got exploited and rooted, it will use checksum comparation via md5 sum, it exchanges file lists and csums from the sechk server. It\'s gonna work with all posixes and unixes.
    Downloads: 0 This Week
    Last Update:
    See Project