Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.
Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
Download Free Tool
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
A Java Hijacking tool for web application session security assessment. A simpleJava Fuzzer that can mainly be used for numeric session hijacking and parameter enumeration. Demonstration video is also available.
JChecksum allows you to obtain the hash of a given file using a simple GUI. Hash algorithms supported include MD2, MD5, SHA-1, SHA-256, SHA-384, and SHA-512.
Hiitch is a secure and advanced desktop social networking platform. It allows you to build a focused and private network of communities for your family, friends, company and etc. It gives you total control and freedom for your social networking needs.
Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
The project consist in an open source implementation of the W3C Recommendation of the XML Key Management Specification 2.0 XKMS 2.0. It is compound of a XKMS Server and a Client API to access to the Server via Web Service.
This is a simple app, created around an original sudoku solver based only on heuristics, not brute force. It's coded in Java/SWT(GUI toolkit). It's an example of MVC and of Visitor, Observer, Strategy, Abstract Factory, Singleton Design Patterns.
An easy-to-use generator for large numbers of passwords.
Originally for my school's IT Department, I have now released the source code under the GNU GPL. It supports the random generation of huge numbers of passwords that can be determined in a variety of ways.
The main purpose of this project is to develop a Graphic policy definition editor implemented in Java language and based on the XACML standard which manages access control policies
Safe all your passwords and encrypt them with a single password? Yawn. Synchronize your encrypted entries between different machines? Without compromising your security? Here comes SyncYourSecrets
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
obov stands for OATH Based OTP validator. It's a 100% pure Java library that provides simple to use methods to validate (and related utilities) one time passwords generated by OATH compliant devices.
jCryptPad stores text informationen hierarchical, e.g. passwords, important texts etc. The data is saved in a encrypted xml file. Encryption is done with the AES algorithm. Additionally a password generator and a text encryption editor is also included.
XMLStore is a new project that cares about XML-based Databases Access with users Authentication and Authorization and more such as dead-lock accesses.
It will be soon introduced to other kind of databases such as SQL,...
A simplejava library (1.5.* and higher versions) in order to crypt (or decrypt) a file using a password. The library accepts the following parameters: an input file, the operation to perform, and the user password.
This project provides a simpleJava-based steganography tool that can hide a message inside a 24-bit colour image so that knowing how it was embedded, or performing statistical analysis, does not make it any easier to find the concealed information.
This application is meant for those end users, who wish to quickly learn how to use XACML based systems. It provides the user to create and load XACML policies, and then analyze the XACML response in a separate window.
JDO is a Java DeObfuscator that works on class files directly. JDO contains a simple and easy to use GUI that makes automatic deobfuscation of Java projects a one-click operation!
One of the project requirements is to be able to digitally sign parts of the IPC 1752 XML documents before it is electronically transmitted between two business partners.
INTIX-JSIGNER is a java web application for signing documents (XML and/or PDF) of unattended way and in the server side. It has as main modules the following: Authentication, XML and PDF Signing and Keys and Certificates Management.
Open WS-Policy,an Open Source Web Services Policy Framework implementation,is a set of open source Java libraries that implement the ws-policy specifications.
CivilAction lets you create a Choose Your Own Adventure type story that can be played on Java enabled cell phone. A desktop application lets you write story files. People run the story on their phone. Make a 'Tresure hunt' or 'Amaze Race' type game.
JSDSI is a Java implementation of the Simple Public Key Infrastructure / Simple Distributed Security Infrastructure (SPKI/SDSI). JSDSI implements a Java Cryptographic Provider for SPKI/SDSI certificates and certificate chain discovery algorithms.