Showing 179 open source projects for "using"

View related business solutions
  • Retool your internal operations Icon
    Retool your internal operations

    Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.

    Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
    Build an app in Retool
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 1
    This program allow you to extract files from network traffic under HTTP and FTP protocols. It should permit you to see, for instance, using an antivirus on the files, if a machine of your network have downloaded a virus.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    SysK allows to crypt text by using system informations calculate the algorithm. For each user,the crypt algo will be different. It's written in C language for Linux x86. The objective is to allows it to crypt streams, binaries and more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    James Bond Log is a daemon log watcher similar to swatch or logcheck , it's completly written in C using PCRE Library and it provides the ability to be chrooted. It's actually at developing stage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    This project will convert the RSA Ace/Agent Authentication API 5.0.1 into JAVA API by using JNI Interface. Currently RSA doesn\\\\\\\'t provide any Java API.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • 5
    RSA-IP is a Linux kernel net _protocol_ which encrypts IPv[4;6] using RSA public/private key.Think of it as a kernel level implementation of ssl. RSA needs prime number so we release a prime searcher.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    PDApass is a one time password authentication system, designed using a Palm Pilot as a password generator, with a PAM module to allow there server to perform the authentication.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    scroll is a file integrity scanner. It is designed to be a fast, secure replacement to Tripwire, and is implemented using OpenSSL. Current database support includes local file and MySQL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    This project is a Linux-PAM module designed for mounting a user's encrypted, home directory using the user's login credentials as the decryption key. The module also unmounts the user's home directory at logout to re-encrypt the protected data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A RTLinux X10 CM11 Driver using RT_COM. Plan on having a configuration file for input and control. In addition, plan on having output via HTML/CGI. Possibly have some control items via the web page.
    Downloads: 0 This Week
    Last Update:
    See Project
  • BoldTrail Real Estate CRM Icon
    BoldTrail Real Estate CRM

    A first-of-its-kind homeownership solution that puts YOU at the center of the coveted lifetime consumer relationship.

    BoldTrail, the #1 rated real estate platform, is built to power your entire brokerage with next-generation technology your agents will use and love. Showcase your unique brand with customizable websites for your company, offices, and every agent. Maximize lead capture with a modern, portal-like consumer search experience and intelligent behavior tracking. Hyper-local area pages, home valuation pages and options for rich lifestyle data keep customers searching with your brokerage as the local experts. The most robust lead gen tools on the market help your brokerage, teams & agents effectively drive new business - no matter their budget. Empower your agents to generate free leads instantly with our simple to use landing pages & IDX squeeze pages. Drive more leads with higher quality and lower cost through in-house tools built within the platform. Diversify lead sources with our automated social media posting, integrated Google and Facebook advertising, custom text codes and more.
    Learn More
  • 10
    This is an authentication module for Apache that allows you to authenticate HTTP clients using user entries in an ACE/Server. Users must have a SecurID token and you must have an ACE/Server your Apache Web Server can talk to.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Komoku implements an intrusion detection system using embedded system. Unlike other integrity tools, as tripwire, it does not rely on the operating system. The IDS is actually implemented in an INtel EBSA-285 board.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Secure local and Network based authentication using pluggable backends which provide authentication and user/groupnames, uidmappings, tokensupport and the lot.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Remote Access Session is a security tool to analyze the integrity of systems. The program tries to gain access to a system using the most advanced tecniques of remote intrusion. It lets to work on normal mode (fast) and hard mode (more intensive).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    GAIM encryption plugin using GPG (PGP clone). It works transparently and smoothly. Automatically establishes secure conversations with other enabled users, passes keys (if enabled) and eventually will allow you to specify your own keys to use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    dkbf is a distributed, keyboard, brute-force program for Linux clusters that attacks Windows NT Lanman and NT hashes using the Message Passing Interface (MPI).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This project will provide a library for using the AES round 3 cipher candidates (Mars, RC6, Rijndael, Serpent, and Twofish) in an easy to use API. Support for MD5, SHA.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    ISP Controller is a project aimed at designing a complete sollution for a ISP-wide management system. Basically, we want the use to be able to configure any daemon, on any machine, using a central PHP/Apache backend.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    This is a driver for PCI encryption cards using the Hi/fn 7751 encryption processor, including cards from GTGI, NETSEC, Invertex and Hi/fn themselves. Supports all card modes and functions, including encryption unlock and compression.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Construct, inject and capture raw IP,ICMP, TCP and UDP packet using java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    sectar: a program that creates encrypted tape archives(tar files), using the AES algorithm Rijndael. Encryption exported under exemption TSU 740.13. Was star, now sectar.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    NetBox is a software programmed in C for testing vulnerabilities in the network. Using this software you can attack your network using a combination of differents known attacks (ARP or DNS Spoofing, MITM, ...) and detect bugs of security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    libHDCP2

    HDCP 2.x framework in C

    Open source HDCP 2.x framework, written in C, using openSSL library
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Time-stamp of a created file can be modified by attacker. This project is meant to track File timestamp values , using NTFS data structures rather than trusting the original time stamp modified by attacker.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    A Gnome 2 Applet that listen,notify and log arp changes using arpwatch.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Portable, optimised implementation of Bruce Schneier's 64-bit symmetric block cipher, Blowfish. Includes support for ECB, CBC, CFB, OFB and CTR block cipher modes, weak key detection and parallelisation using OpenMP.
    Downloads: 0 This Week
    Last Update:
    See Project