1327 projects for "java open source" with 2 filters applied:

  • Retool your internal operations Icon
    Retool your internal operations

    Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.

    Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
    Build an app in Retool
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • 1
    A criteria selection for guiding and assuring activities concerned with the analysis of digital evidence, It covers legal, police and operational aspects. It is not a technical manual for computer forensic analysis, It is a criteria-based manual.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    A web proxy that provides Single Sign-On (SSO) into websites in a manner that protects your passwords and other sensitive information from untrusted network access devices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    RSA Public Key Crypotgraphy for Web Browsers. Use JavaScript to RSA-encrypt data that can only be decrypted on the server, and not by prying eyes. The poor man's SSL...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    XypherChat is a cryptographically secure peer-to-peer instant messaging client.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5
    Access Control Designer is a universal modular tool for visually designing access control policies.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Sanctum allows you to run virtual servers on your computer so you can test the security of software by actually breaking into it. Developers just create a virtual server image and let hackers download it and try their hardest to find exploits.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    A collection of useful Java classes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    An alternative Identification system that is a replacement for Microsoft's Passport and the Liberty Alliance. Its a simple architecture that is setup so anyone can run a server and thereby have control over their online identification.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Visual IP is a network protocol analyzer that works in any operating system with a java VM. At the moment it only allows you to examine data from the disk, and created by tcpdump. You can interactively browse the capture data, viewing summary and det
    Downloads: 0 This Week
    Last Update:
    See Project
  • Axe Credit Portal - ACP- is axefinance’s future-proof AI-driven solution to digitalize the loan process from KYC to servicing, available as a locally hosted or cloud-based software. Icon
    Axe Credit Portal - ACP- is axefinance’s future-proof AI-driven solution to digitalize the loan process from KYC to servicing, available as a locally hosted or cloud-based software.

    Banks, lending institutions

    Founded in 2004, axefinance is a global market-leading software provider focused on credit risk automation for lenders looking to provide an efficient, competitive, and seamless omnichannel financing journey for all client segments (FI, Retail, Commercial, and Corporate.)
    Learn More
  • 10
    Open3SP is a unique system administration framework that provides a secure administrative infrastructure based on the SSH protocol. The aims of the project are to establish role based access, automated configurations and software/patch deployment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    jRevProxy is a lightweight reverse proxy server fully written in Java. jRevProxy accepts HTTP and HTTPS requests and translates these into new requests based on a set of rules. HTTPS with client side authentication (X509 certificates) is supported.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Tattoo will provide a set of command-line scripts for analyzing raw tcpdump files or ASCII hexadecimal representations of network traffic to identify format, function, and communication model.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    ObscureEncrypt is a high level security encrypter. It encrypts at three levels, 448 bit Blowfish encryption, Obscurity, high level encryption. Making it almost impossible to decrypt
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    OpenSST (Open Simple Secure Transaction) is a project to create a simple security protocol for making transaction between (un)trusted parties. The project includes a protocol design specification and a cross-platform software implementation of the speci
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Libike is a cross-platform C library for managing IKE negotiations.The library implements RFC-standard ISAKMP/IKE exchanges and utilizes callbacks to delegate tasks of the packet transmission and security policies management to the external code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    JVerify is a Java app that enables you to monitor for changes in any file on your Unix system, most notably executable binaries, thus alerting you to a possibly backdoored binary. It runs on any platform that supports JSDK 1.4.x and has a MySQL database
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    The Hopefully Uncomprehensible Shell, HUSH, is a secure shell client and programming library written in and for Java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    ECTP - Encrypted Compressed Transfer Protocol This protocol is similar to HTTP but with commands and features like FTP. The main features are security and compression abilities and the consequent use of one perisistant connection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    startx is the project name for an interface build in php which takes the output of some products like MRTG or awstats or ACID... and put them together in the same Web interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Set of tools to generate XUL based forms with xforms support.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    The goal of the Symbiosis project is to develop software which allows people to communicate, share knowledge, and learn. The primary subject of learning will be the Buddha Dharma, but it will be possible to use it for other subjects also.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Blinded digital cash mint, walletware, tools, and open protocols.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    The X Supervisor Extension is a patch for the popular XFree86 X server to make X11 forwarding with openSSH safer when the remote host can not be trusted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    CryptoPy is a pure python implmentation of cryptographic algorithms and applications. The algorithms are developed for readability more than speed. The collection now includes IEEE 802.11i specific algorithms that generated the test vectors for 802.11i.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Manage sources of video (i.e., from a security camera), recording clips where motion has been detected, and allowing those clips to be replayed. Variable lead-in/out time, motion detection, logging.
    Downloads: 0 This Week
    Last Update:
    See Project