Showing 989 open source projects for "front-end"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • Secure File Transfer for Windows with Cerberus by Redwood Icon
    Secure File Transfer for Windows with Cerberus by Redwood

    Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.

    Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
    Try for Free
  • 1
    How do you find anything in the mountain of data on your PC? How do you organise, maintain, archive and protect your files? How do you avoid surrendering to the Powers of Darkness? Checkpoint Commander, the vital tool for Information Management!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Implementation of "Functional Specification of the OpenPGP application on ISO Smart Card Operating System" (OpenPGPCard) on Java Card.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    JSSF - Java Server Security Faces it's framework for security layer. With JSP tags and pages/resource access control. Support MyFaces and Sun RI JSF
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Spring Security (Acegi Security System for Spring) Samples used in the Book "Spring Security - Das Acegi Security System professionell einsetzen" from Mike Wiesner, entwickler.press
    Downloads: 0 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 5
    The High Interaction Honeypot Analysis Toolkit (HIHAT) allows to transform arbitrary PHP applications into a web-based Honeypot. A semi-automatic user interface supports the analysis process, scans for attacks etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    This is a java based encryption program that can encrypt any file you point it to.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    MicroSafe is a J2ME 1.0 application to store and access notes in a hierarchical data structure (outline) on mobile devices (CLDC - Connected Limited Device Configuration). Notes can be encrypted to store data like PINs, passwords, etc. securely.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Sanshi is HTTP requests generator. You can use Sanshi as a web application security test tool. It can find vulnerabilities automatically.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    epacrypt is a tool to encrypt and decrypt plaintext and binary data using different encryption algorithms which can be chosen from a list.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    PortableNotary permits you to verify pdf signature. Is OS independent and can be used from command line.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Type no more passwords. Use PhoneID to store passwords on your mobile phone, and automatically send them to Windows login, browsers, FTP/SSH clients, OTP, file encryption, PKI, etc. Uses BlueCove. See Wiki page for more details.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    A graphical tool for generating RSA and ECDSA cryptographic key-pairs, creating Certificate Signing Requests (CSRs) from them, and combining the key-pair with an issued digital certificate to create a secure portable container (PKCS12, JKS, JCEKS, etc.).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    With Tiger Envelopes you can stop snoops from reading your email. Same email client. No extra steps. One click to install on Windows and Linux. Configures Outlook, Thunderbird, and KMail. Supports GPG, PGP, Bouncy Castle encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A graphical monitoring and control interface to the Snort IDS
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A text editor which saves data encrypted with strong cryptography (AES, Blowfish..)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Virtual Keyboard for security web systems access
    Downloads: 2 This Week
    Last Update:
    See Project
  • 17
    Bork is a very small, cross-platform file encryption utility. It is written in Java and designed to be included along with the files it encrypts for long-term storage (eg on CD-R). Its minimal external dependencies make it fairly futureproof.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    The main philosophy of the project is "the best protection a bad password can give". People will choose bad password as long as they have this option, so Neocryptex builds a strong crypographical defence between the password and encrypted data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    The Web Application Reliability and Defense (WARD) framework is a two-part security solution composed of a vulnerability detection component, SecureUnit, and a vulnerability protection component, SecureFilter.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    An Open-Source GUI for encryption of several filetypes using various algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    SecureVault is a graphical manager of private-only (secret) data, such as credit cards, internet passwords, bank codes, etc. It is a small, portable application that can be run off a USB drive, so you can take all your secrets with you wherever you go.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    An application to provide a worldwide mobile secure/confidential payment system over the internet and other kinds of insecure/unreliable networks
    Downloads: 3 This Week
    Last Update:
    See Project
  • 23
    With SIP Proxy you will have the opportunity to eavesdrop and manipulate SIP traffic. Furthermore, predefined security test cases can be executed to find weak spots in VoIP devices. Security analysts can add and execute custom test cases.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    A collection of tomcat authentication modules, based on JAAS, so that changing an authentication method is easy
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Java COPS implementation
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB