Showing 1067 open source projects for "void-linux"

View related business solutions
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • 1

    Khembalancer

    Software to balance a chemical equation (redox too)

    Balacing a chemical equation using the Laplace's rule to solve a system of linear equations or using the brute-force method. Khembalancer 2.5.5 received the "100% Free" award and that means Khembalancer does not contain any viruses, spyware, trojans and backdoors. For more information see: http://www.softpedia.com/progClean/Khembalancer-Clean-207422.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    The Realeyes IDS captures and analyzes full sessions. The graphical user interface will display both halves of captured sessions to determine what occurred. The GUI also provides management of application users, sensors, and the database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Cumulus4j is an encryption plug-in for DataNucleus. Applications can thus use JDO or JPA to persist their data into every common database. Using the Bouncy Castle cryptography libs, it provides strong encryption via AES, TwoFish or other algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Java implementation of Shamir's Secret Sharing algorithm as described in Applied Cryptography [as LaGrange Interpolating Polynomial Scheme].
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5

    Suckerz

    A sort of a virus which secretely copies data from all the usb's

    A sort of a virus which secretly copies data from all the external drives to the pc and will silently copy it to the masters pendrive. It is very helpful if your college professors wont copy their pendrive data on the classroom pc, cuz they would never know and you'll get it all!!!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    This is a JavaScript library which gives the ability to use cryptographic functionality abstracted of available technologies on the browser side. It executes a cryptographic function with the fastest technology including Java, JavaScript and Flash.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    NSIA
    NSIA (Network System Integrity Analysis) is a web application monitoring system that scans web applications for potentially unwanted context such as defacements, unauthorized changes, errors, information leaks, profanity, compliance issues, etc
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Password Cracker
    Crack the encrypted passwords (MD5,SHA, etc....)
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    The CPE Reference Implementation is a freely available application that demonstrates the naming and matching schemes of the CPE specification.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 10
    SSL-Explorer is a fully-featured, web-based SSL VPN server. This project is no longer actively maintained as the SSL-Explorer technology has now been acquired by Barracuda Networks, Inc.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    keytabGUI
    GUI for Kerberos Keytab files. Associate it with *.keytab extension to view them. JNLP installer page: http://keytabgui.sourceforge.net
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    OpenSignX is a document and form signing Java applet for PKI X.509 certificates. It is based on www.openOCES.org and provides generation XAdES enveloping signature of one or multiple documents supporting PKCS#11 Java keystores.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    RivuES is an open source enterprise search server based on the Lucene And Solr, Like Solr, RivuES support XML/HTTP and JSON APIs, hit highlighting, faceted search, caching, replication. It runs in a Java servlet container such as Tomcat,In addition, RivuES provide a visual management and control web UI, most of the functions of Solr can be managed through WEB UI, Data source supported including MS office,XML,TXT,Html, database of Mysql and Access.(In our comercial version,40+ file...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Store several passwords with a single portable program. Just remember only one password. It's up to you to decide how many password you want to store, and which name you want to give to that password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    CesTa (Code Enhancing Security Transformation and Analysis) is a tool for enhancing security by program transformations. Focused on Smart Cards (Java Card in particular), powered by Ant, ANTLR and StringTemplates.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    Password strength testing Java API utilizes Java platform independence and threading mechanisms. Provides a way to conduct custom brute force and dictionary stregth tests.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    This project aims at developing a easy software for the protection of SCP-ECG files and also control the access to the protected files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Using encryption to secure your code or text. Click File->Run to run your code using Ruby, see the pop up for output. Never save your text or code to disk unencrypted. Don't forget your password. Encryption is error-persistent.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    jGuard is written in java. his goal is to provide a security framework based on jaas (java authentication and authorization security) . this framework is written for web and standalone applications, to resolve simply, access control problems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    The PKI Framework (PKIF) is a cross-platform library for performing PKIX-compliant certificate processing. It includes support for SCVP, OCSP, CMS and Timestamps. It uses Windows CAPI, NSS or Crypto++ for cryptographic services and hardware support.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Jumping Spider is a privacy tool to insure that files in a certain computer are free from sensitive and private data. This project still in the pre-alpha phase.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    HTTPBrute is used to calculate HTTP Digest Access Authentication as per RFC 2617. The tool will be able to perform brute force attacks to retrieve a lost password for a given Authentication response. MD5 is the only hashing algorithm implemented.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    The Digital Communication Systems Lib: This library contains digital communucations systems implementations, such as BSPK and MIMO - WOFDM. Various OpenSource Projects: 1. Password/Username/Domain Analyzer
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    FONC (FTP Over Normal Connections) allows both active and passive FTP transfers via normal port connections. This allows FTP (both control and data transfers) over simple ssh tunnels among other things. FONC is easy to setup, and runs anywhere java can.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    IdentityTrust is a library that allows you to express trust criteria for identity providers and the attributes that they can assert in a fine granular and customizable way.
    Downloads: 0 This Week
    Last Update:
    See Project