Stop wasting engineering hours. Build secure, production-grade apps that connect directly to your company’s SQL and APIs.
Create internal software that meets enterprise security standards. Retool connects to your business data—databases, APIs, and vector stores while ensuring compliance with granular permissions and audit logs. Whether on our cloud or self-hosted, build the dashboards and admin panels your organization needs without compromising on security or control.
Learn More
Find Hidden Risks in Windows Task Scheduler
Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.
Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
ContraCaptcha is a Java-based libary for solving (image-based) captchas. It provides classes for image processing and character recognition. It also includes solvers for some of the popular captcha-systems in use DISCLAIMER: only for learning purpose (;
This tool will anonymize images by destroying the Photo Response Non Uniformity (PRNU) pattern. It can also remove or forge the PRNU patterns, without having a (negative) impact on the quality.
The Benchmark Editor enhances and simplifies the creation and editing of benchmark documents written in standard languages such as XCCDF and OVAL. NOT CURRENTLY MAINTAINED: please see the Recommendation Tracker for a similar, actively maintained tool
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
LiveView is a forensics tool that creates a VMware virtual machine out of a raw (dd-style) disk image. This allows an examiner to "boot up" the image and gain an interactive, user-level perspective of the environment, all without modifying the imag
The main purpose of this project is to develop a Graphic policy definition editor implemented in Java language and based on the XACML standard which manages access control policies
A Steganographic Tool that lets u hide any file into any file. It is based on Image, Audio, Video Steganography that hides any file or message into an image(BMP,JPG,GIF), Audio/Video(MPG, WAV, etc) or any other file format(PDF,EXE,CHM etc..)
Thumbnail steganography creates a thumbnail from a source image and stores data in it by altering it's color channels. To decipher the data, a new thumbnail is made from the original image and the differences between the pixels are calculated.
jCryptPad stores text informationen hierarchical, e.g. passwords, important texts etc. The data is saved in a encrypted xml file. Encryption is done with the AES algorithm. Additionally a password generator and a text encryption editor is also included.
KeyStone is an editor program for Java keystore files, licensed under the GPL. KeyStone may help make your life easier if you're working with symmetric cryptography in Java.
Suite of services and tools for handling PKI requirements. The initial list of programs contains: 1) a viewer/encoding converter for X.509 certificates, 2) a viewer/editor/generator for PKCS#7 and 3) a viewer/editor/generator for various keystores types.
This project provides a simple Java-based steganography tool that can hide a message inside a 24-bit colour image so that knowing how it was embedded, or performing statistical analysis, does not make it any easier to find the concealed information.
An Iris Recognition system written in Java. Acquires an image, locates the iris and produces a unique 'iris profile' for it. Will be fully supported by its own GUI but potentially linked into other applications, such as xlock.
Quickly encrypt and decrypt your files with Petri. View encrypted text and image files containing your passwords or other sensitive information. Petri is written in Java and therefore runs on any operating system supporting the Java Runtime Environment.
Sanctum allows you to run virtual servers on your computer so you can test the security of software by actually breaking into it. Developers just create a virtual server image and let hackers download it and try their hardest to find exploits.
This project will be used for the identification of the thumb impression. We will be having a image of thumb in our database and will use another image for matching purpose. We can also match the images which are not in the data base.