631 projects for "dr java windows" with 2 filters applied:

  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • 1
    IOS6 and recent iTunes updates have broken a few features. We have made some partial fixes, but they are not complete. If you'd like to help support our development, or take over the development please let us know. Explore the internal file structure of your iphone (or of a seized phone in the case of forensic teams) using either the iphone's own backup files or (for jail broken iphones) ssh. Viewing of plist, sqlite, and hex are supported. IOS 5 is now supported iOS 6 only partially...
    Leader badge
    Downloads: 62 This Week
    Last Update:
    See Project
  • 2
    eSCAPe (Enhanced SCAP Editor) is used to create Security Content Automation Protocol (SCAP) content files, in particular OVAL & XCCDF files. Allows experts to create SCAP content without requiring in-depth knowledge of the protocols themselves.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Password Generator Java Library

    Password Generator Java Library

    Password Generator Java Library.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    samizdat

    Kerberized Messaging Toolkit for Java

    Samizdat is a toolkit for Java for building Kerberos secured distributed, message-oriented applications. The toolkit contains base classes that simplifies the management of Kerberos login contexts as well as flexibly sign and seal messages between principals using the Java GSS API. The toolkit contains Transformation classes for Kerberizing JMS traffic as well as a super-lean HTTP based protocol stack that supports both Synchronous (RPC) and Asynchronous modalities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5
    Ralasafe Access Control Middleware focus on data-level privilege management, including database row/column and content privilege management. It also manages 2) login control; 3) function-level privilege management; and 4) URL privilege authentication
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    OhCrypt Encryption Tool
    OhCrypt lets you easily encrypt and decrypt files using some of the most popular algorithms, like AES, Blowfish and Serpent. With OhCrypt, you can secure your data with a password-based encryption algorithm through a clean and simple interface. It demonstrates state of the art of cryptology techniques, such as password hashing and salt. Ohcrypt also features self-extractable and self-destructive encrypted files
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Itilect FTP Proxy

    Itilect FTP Proxy

    Provide users with a managed temporary access to arbitary FTP

    This tool allows you to set proxied access for your users, using predefined FTP accounts. System works like this: Users connects to FTP proxy just like they do with a regular FTP, but using specially formed string as a username (string, that includes their internal profile name and desired target FTP) and their internal password. If they are allowed to access this host, proxy will establish connection with a target FTP and authenticate using real credentials. After that, server will act...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    JPassword Recovery Tool

    JPassword Recovery Tool

    Password recovery tool for compressed archives and md5, sha-1/2 hashes

    This is a simple but sophisticated open source password recovery tool for M$ Windows, it can effectively 'crack' any password protected archive that can be decompressed by 7zip given enough time and resources. It can also bruteforce MD2, MD5, SHA-1 and SHA-2 hashes (SHA-256, SHA-384, SHA-512), CRC16, CRC32, CRC64 and Adler32 hashed passwords for both Windows, and Linux. It requires java 7u4 and above, and 7-zip v9.20 and up for archive recovery.
    Leader badge
    Downloads: 74 This Week
    Last Update:
    See Project
  • 9

    Tetrumble

    Tetrumble is encryption tool.

    Downloads: 0 This Week
    Last Update:
    See Project
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 10
    Files Hash code Verifier

    Files Hash code Verifier

    A tool to verify and generate MD5,SHA,CRC32 hash of multiple files

    A Security tool that will help to verify the hash codes of files . Currently,Our Hash Code verifier tool supports the following Hash types: MD5,SHA,CRC32. More details about the tool can be found in the project homepage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Chi-Square & LSB Enhancement attack

    Chi-Square & LSB Enhancement attack

    Java implementation of Chi-Square Attack and LSB Enhancement Attack

    Chi-square attack is the most commonly known and used statistical attack in steganalysis. LSB enhancement attack is also the most widely known visual attack in this area. This project includes implementation of these two methods in java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The project provides functionality to interface the SmartCardIO Java SDK library to Global Platform compliant smart cards, similar to globalplatform.sf.net. The difference is pure Java implementation and easy plug in to your SmartCardIO applications. This project is now more or less subsumed by Martin Paljak's continuation of the project at https://github.com/martinpaljak/GlobalPlatformPro.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Jidgen is an easy-to-use, but powerful Java-based id generator. It uses templates for automated id generation and optional collision detection to avoid duplicate ids.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    ADPasswordNotificator

    Active Directory password expiration notification tool

    Notifies users in the domain of an impending password expiration
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    TRMSim-WSN
    TRMSim-WSN (Trust and Reputation Models Simulator for Wireless Sensor Networks) is a Java-based simulator aimed to test Trust and Reputation models for WSNs. It provides several Trust and Reputation models and new ones can be easily added.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Steganography Studio
    This project provides a steganography tool that allows to know, use and compare the results of current steganographic techniques. It also incorporates a comprehensive set of stegoanalitics methods for images.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 17
    HashTool

    HashTool

    Easily calculate hash values.

    HashTool calculates the most common hash and hmac values of files and strings by using the "Bouncy Castle Java cryptography API".
    Downloads: 6 This Week
    Last Update:
    See Project
  • 18
    OpenSource Java based cross platform command line file encryption software.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Spring Security (Acegi Security System for Spring) Samples used in the Book "Spring Security - Das Acegi Security System professionell einsetzen" from Mike Wiesner, entwickler.press
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    The 'jpwgen' program is a Java-based password generator whose functionality resembles the popular 'pwgen' program. The *nix based version of 'pwgen' is available at http://sourceforge.net/projects/pwgen/.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    lanupdate is a application to hold a hole LAN up-to-date. lanupdate get from the server all update-infos and syncronize this with local update-infos(wich program with which version is installed).Shows a window with requiered updates.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    pam_mobtok is a PAM module together with a J2ME midlet to realize authentification. A password is entered into the J2ME capable mobile device which then generates a token that is valid for a short time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    uEasy is a wysiwyg editor for use with Content Management System (CMS). It features a wysiwyg client (as applet or application) and a server. You can easily develop: - interfaces for any CMS - plugins for any format (HTML, Wiki, ...)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Cumulus4j is an encryption plug-in for DataNucleus. Applications can thus use JDO or JPA to persist their data into every common database. Using the Bouncy Castle cryptography libs, it provides strong encryption via AES, TwoFish or other algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    Suckerz

    A sort of a virus which secretely copies data from all the usb's

    A sort of a virus which secretly copies data from all the external drives to the pc and will silently copy it to the masters pendrive. It is very helpful if your college professors wont copy their pendrive data on the classroom pc, cuz they would never know and you'll get it all!!!
    Downloads: 0 This Week
    Last Update:
    See Project