Boost your digital or traditional workplace with MyQ’s secure print and scan solutions that respect your time and help you focus on what you do best.
Learn More
Find Hidden Risks in Windows Task Scheduler
Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.
Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
CincoSecurity module offers big flexibility to protect EJB3 methods, and JSF page elements.It associates a role to each EJB method (fine role) defining a security profile as a set of roles; its use cases manage security profiles and users.Java EE 5 Seam
This project aims at porting visual cryptography, which only works with transparent slides, to ordinary 80g/m^2 white paper. Please read the documentation before using the program.
XML carver which can carve damaged or non-standard XML out of any file. It rebuilds the XML tree, along with giving the offsets for all the carved XML data. This tool was developed for the DFRWS 2010 Forensics Challenge.
A web-based system to assign a set of known persons anonymous ids, such that every person only receives one id. The ids cannot be mapped to the corresponding persons afterwards.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Sun's XACML Implementation is an access control policy evaluation engine written entirely in the Java(tm) programming language. It supports XACML 1.x and 2.0 core features, and provides a number of powerful extensions and extensibility points.
Kotak is just another cracking tool which is based on Java. It is used to crack various types of hash functions with various types of attacks. It's developed to be as simple as possible, so that anyone can use this tool easily.
Q Disassembler is a flexible disassembly engine that aims to provide precise information about machine instructions while maintaining OS-independence and performance.
This simple Java applet will use a few URL obfuscation methods to mask a URL. This isn't meant to be anything earth shattering, but maybe useful. It does more than basic URL encoding (although it does that). Also contains a library to do it all.
Kryptographie is a student project to implement historic encryption methods. It has a linux style command line interface. This project will also include the notes for my talk I'll hold on cryptography in school. (in German).
Start from a prompt and build production-ready apps on your data—with security, permissions, and compliance built in.
Vibe coding tools create cool demos, but Retool helps you build software your company can actually use. Generate internal apps that connect directly to your data—deployed in your cloud with enterprise security from day one. Build dashboards, admin panels, and workflows with granular permissions already in place. Stop prototyping and ship on a platform that actually passes security review.
SIFA (Secure Information Flow Analyser) uses a graph-based approach to reason about the possible vulnerabilities of a system from an information security perspective, supporting multiple views over the system. SIFA is an experimental prototype.
This program aims at providing a java solution to hide secret information(such as secret file) to JPEG images. Hiding algorithm contains Jsteg and F5. The main(probably the toughest) stuff is encoding and decoding JFIF files.
Software solution for creation and verification of digitral signatures. Can replace tokens and smart cards with mobile phones. Components included are client and server. Can creates, verifiy and store content and signatures. Offers secure sharing.
I have implemented transaction signing in Oracle application using digital certificates. Created a java bean to access windows default keystore (SunMSCAPI) to get all certificates and populate them in oracle forms application, Signing oracle forms...
TPMitigation is a transparent HTTP-proxy for mitigation of drive-by-malware. Content is converted on-the-fly and/or replaced where there is a risk of a infection by embedded drive-by-maleware. Also visit http://tpmitigation.sourceforge.net/
A very simple file encryption tool. Release 1 is a text editor that saves encrypted files. Release 1.1 will include the ability to convert any file, even binary, to a GEF (Gulosh Encrypted File). Release 2.0 brings the strong encryption into play.
This project contain chat server and chat client/admin that works on Windows/Unix.. This is a Free software. Developed by Osama Mohammad Oransa, 2009,contain 3 parts : Chat Server ,Admin and Chat Clients, Based on Java RMI, will support XMPP soon.
AccesStream is a Java-based, embeddable identity and access management (IAM), security and access reporting platform. AccesStream includes Single Sign-On using SAML 2.0 and provides profile storage with LDAP v3 access for integration with Linux PAM
SeCURePass password manager. A flexible, secure password manager for use in many situations, applicable for storing personal information. Integration with Firefox is available via an included extension.
Password Generator takes the guesswork out of creating secure completely randomized passwords. It creates a password from a customizable character set and a user defined password length.
URL Signer is a simple utility that uses signs a URL which can then be transmitted in plaintext and validated by the recipient. See project documentation for a detailed description.
Intrusion Detection System made in Java using Snort rule files. The main feature of Nyx are distributiveness, Java based, Software Agent implemented. Iteration 1 has finished. Still more features has to be extended