Showing 145 open source projects for "linux command line"

View related business solutions
  • Employee monitoring software with screenshots Icon
    Employee monitoring software with screenshots

    Clear visibility and insights into how employees work. Even remotely.

    Stay productive working at any distance from anywhere with Monitask.
  • Achieve perfect load balancing with a flexible Open Source Load Balancer Icon
    Achieve perfect load balancing with a flexible Open Source Load Balancer

    Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.

    Boost application security and continuity with SKUDONET ADC, our Open Source Load Balancer, that maximizes IT infrastructure flexibility. Additionally, save up to $470 K per incident with AI and SKUDONET solutions, further enhancing your organization’s risk management and cost-efficiency strategies.
  • 1
    Mobile-ID USAT applet

    Mobile-ID USAT applet

    The Remarc Mobile-ID USAT applet

    The Remarc Mobile-ID USAT applet this is a JavaCard applet with USIM Application Toolkit menu support. Basic functions of the Remarc Mobile-ID SAT applet: • Authentication function; • Signing function; • Changing PIN1/PIN2; • Changing PUK; • Unblock PIN1/PIN2; • View information - in a USAT menu is present a menu item with information of PIN usage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    JBrute

    JBrute

    Open Source Security tool to audit hashed passwords.

    JBrute is an open source tool written in Java to audit security and stronghold of stored password for several open source and commercial apps. It is focused to provide multi-platform support and flexible parameters to cover most of the possible password-auditing scenarios. Java Runtime version 1.7 or higher is required for running JBrute. Supported...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    ... find this on the official site of this project (german). You can find a link to this very simple site below. How to start: -------- Windows: double-click on CryptolinN.exe -------- Linux: sh CryptolinN.sh OR FIRST chmod +x CryptolinN.sh THAN ./CryptolinN.sh -------- Console: java -jar CryptolinN.exe --help N = version number
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    dex2jar

    Tools to work with android .dex and java .class files

    Mirrors: * https://bitbucket.org/pxb1988/dex2jar * https://github.com/pxb1988/dex2jar dex2jar contains following compment * dex-reader is designed to read the Dalvik Executable (.dex/.odex) format. It has a light weight API similar with ASM. * dex-translator is designed to do the convert job. It reads the dex instruction to dex-ir format, after some optimize, convert to ASM format. * dex-ir used by dex-translator, is designed to represent the dex instruction dex-tools tools to work...
    Leader badge
    Downloads: 1,140 This Week
    Last Update:
    See Project
  • Taking Logistics to the Next Level Icon
    Taking Logistics to the Next Level

    Enterprise Warehouse Management Systems

    By using state-of-the art wireless RF (Radio Frequency) scanners, warehouse managers/employees can easily keep track of inventory, shipments, and item statuses no matter how often they move. Items are tracked in real-time using RF Scanners and across multiple locations.
  • 5
    Web Application Protection

    Web Application Protection

    Tool to detect and correct vulnerabilities in PHP web applications

    WAP automatic detects and corrects input validation vulnerabilities in web applications written in PHP Language (version 4.0 or higher) and with a low rate of false positives. WAP detects the following vulnerabilities: - SQL injection using MySQL, PostgreSQL and DB2 DBMS - Reflected cross-site scripting (XSS) - Stored XSS - Remote file inclusion - Local file inclusion - Directory traversal - Source code disclosure - OS command injection - PHP code injection WAP is a static analysis tool...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    GlobalPlatformPro

    GlobalPlatformPro

    Easy to use GlobalPlatform tool (and a Java library)

    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    PassManConvert

    Password Manager File Format Converter

    A Java application that converts between popular password manager formats such as: Keepass v1 and v2 Password Safe v1, v2, and v3 KeyRing v4 and v5 CSV plain text CSV encrypted with PGP
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Tstconfig

    Tool for automatic security and configuration testing

    Tstconfig is a system administration tool that tests (a large number of) configuration files automatically. Mainly intended for security, it can be used to test any configuration file on a Linux system. The distribution includes examples for testing sshd, ufw, fail2ban, apache, php, mysql, /etc/passwd, and more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    jFileCrypt

    jFileCrypt encrypts and decrypts files

    jFileCrypt encrypts and decrypts files and directories fast and secure. It is written in Java 5 and uses the Java Cryptographic Extensions. It supports the following algorithms: Blowfish, DES, 3DES, AES and RC4.
    Downloads: 2 This Week
    Last Update:
    See Project
  • The Professional Platform For Mystery Shopping Providers and CX/VoC Researchers Icon
    The Professional Platform For Mystery Shopping Providers and CX/VoC Researchers

    Checker offers an integrated market research platform, allowing to conduct Mystery Shopping, CX/VoC, and VoE surveys efficiently.

    Founded in 2005, the platform has grown exponentially with more advanced features that combine Mystery Shopping with Customer experience management through multichannel data collection, complete operational workflow, and unified reporting tools.
  • 10

    innocence-java

    Replace text with POS equivalent text, in a reversible fashion.

    Program takes (currently) english text sentences, and replaces each word in a given sentence with another word having the same Part of Speach (POS) tag. This creates a new sentence containing none of the original words. This new sentence can then be transmitted to a remote user, and using the same software, "de-crypted" into yielding the original sentence. The software relies on having a known "seed" value for the random number generator, which is known only by the sender and receiver....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    fiskalizacija

    Java code for signing and handling Croatian fiscal service requests

    Java code for signing and handling requests for Croatian fiscal service. Includes unsigned and signed xml samples. For completeness of project my personal testing key is included. Units tests with sample data are available for the ease of use. Whole Eclipse project is committed to source forge Git. Commercial support for implementation into different java application is available upon request. Enjoy
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    RemoteRoot

    Web based management tool for unixes

    Remote Root is an enterprise-class central management tool for Linux, which enables centralized configuration management of a large amount of network connected Linux-based computers (hosts) in a modular form. It is an open source software system relying on operation of traditional operating systems, so it is capable of managing numerous free and commercial Linux distributions or even not Linux-like systems (such as Solaris, HP-UX, FreeBSD, OpenBSD). It can manage every system on which...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    RDonasco Security

    A security application that can be used as a shared service

    For full details of this application, please visit https://bitbucket.org/rdonasco/rdonasco-lib/wiki/Home The source codes for this project can be downloaded by cloning its repository which uses mercurial. ** Use the following clone command: ** hg clone https://bitbucket.org/rdonasco/rdonasco-lib
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    JaStaCry

    Java Stacked Crypto

    Java Stacked Crypto merges different hiding, merging and crypto stacks to secure files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    PasswordGenerator

    PasswordGenerator

    A free Password Generator written in Java

    next version is 2.4.6
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16

    chaOS41

    A cryptocurrency like Bitcoin improved upon with reality binding.

    ... protocol is made public now. It is also the open-source cryptographic protocol. Type in a formatted string as "beacon" and a number. Repeat. When the identical string is produced, prepare. When the identical string repeats, a name is added. This signals that the next line of text you type, is registered. Hint: include a URL.End of protocol. Valid beacon digits are 250, 1024, 2048, 4096, 8192, 16384, 32768 and up.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    PBM stealth

    Data hiding in bi-level pbm images

    Implementation of block parity for hiding data in bi-level pbm images in java. Increasing the security of stenography by using a random symmetric key for embedding and extraction of data from image. The project also has a PBM viewer in java and ascii viewer which shows the pbm images in ascii format.This project uses binary coded pbm images. Research paper : http://arxiv.org/abs/1304.1683 Key mechanism is not functional and program have bugs which are to be fixed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Java Encryption Library

    Simple Java Encryption Library

    I have packaged the Java encryption library with a wrapper used to make saving and loading files in Java easier. I have also included the source for a command line application to encrypt a String and save it to a text file. The source for AESEncryption was actually written by "erickson" from Stack Overflow. The original post can be found here: http://stackoverflow.com/questions/992019/java-256-bit-aes-password-based-encryption/992413#992413
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    DOSTool

    DOS Attack Tool

    A simple DOS attack tool based on the public resources response time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    The system is designed to upload phishing emails to a database where they are automatically analyzed and customized reports can be generated. UnMask was developed by ECIT Labs, Dept of Computer Science, FSU. The director of the Lab is Dr. Sudhir Aggarwal. UnMask has substantial on-line help features and should mainly be self-explanatory.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    SPIZD stands for Stress Probing Invasive Zap Destructor; it's a command-line stress test tool used to determine how many simultaneous (concurrent) connections servers can handle. Protocols: http, pop3, pop3s, imap, imaps, smtp, smtps, ssh, radius.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    iAlertU

    iAlertU

    An alarm for your MacBook.

    iAlertU is an alarm system for your Apple MacBook that uses the built in motion detection to trigger the alarm and the iSight to capture the image of the thief. Among many other features, it incorporates the ability for users with iPhone, iPad, or iPod Touch to connect to and control iAlertU remotely.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 23

    jEncrypt

    jEncrypt is a command line file encryption archiver

    jEncrypt is a command line file encryption archiver designed to help you encrypt files and directories into a single file archive.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    PortableSigner
    PortableSigner is a tool for digital signing (with X.509 certificates) of PDF files
    Leader badge
    Downloads: 22 This Week
    Last Update:
    See Project
  • 25
    FroZenLight connects simple line art and mathematics. The source of light can be positioned so that either symmetric reflection patterns or secret messages (Cryptography) are created. Example light patterns and math exercises for education are provided.
    Downloads: 0 This Week
    Last Update:
    See Project