Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free
Gemini 3 and 200+ AI Models on One Platform
Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build generative AI apps with Vertex AI. Switch between models without switching platforms.
This tool encrypts text using polyalphabetic codetables, like the encryption systems in the middle ages. It can be used for simple text encryption with a small password or as a One-Time-Pad with a random codetable for 100% secure text encryption.
Roots III Encryption is an encryption suite in Java and C++ backed by the strong normality of irrational roots. It can easily offer more than 2048 bit security, and can be seen as a practical one-time key implementation.
This is a simple password manager for java enabled mobile phones. It is supposed to work with all MIDP1 compatible devices. It has been around for a long time and no comatibility problems have been reported in the last few years. FreeSafe uses a TwoFish
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Nikto FrontEnd (Nikto UI) is what we just wrap GUI to the all-time famous nikto.pl by Sullo (CIRT Inc).It usually takes several minutes(even hours) for a complete scan. When it's done, firefox will open and show the result.
obov stands for OATH Based OTP validator. It's a 100% pure Java library that provides simple to use methods to validate (and related utilities) one time passwords generated by OATH compliant devices.
Penny Post is a system to combat spam emails by making the sender "pay for email" by spending a few seconds of computing time. Outgoing mail is marked with postage stamps that convince the receiver that the sender is genuine.
The Cookie-revolver framework provides J2EE web-applications with two-factor authentication security, “something I know” (userid/password) and “something I have” (encrypted one-time cookie).
S/Key Generator. An RFC2289 compliant One-Time Password generator written in Java language and O.S. Thinlet package for GUI.
It uses MD4 and MD5 hash algorithms.
AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
Cryptomni is a program which can encrypt and decrypt files using the one-time pad cipher. If a key is truly random, kept secret, and never reused, this encryption algorithm can be proven to be unbreakable.
S/Key - OTP Generator for J2ME architecture. An RFC2289 compliant One-Time Password generator for mobile phone supporting Java language. It uses MD4 and MD5 hash algorithms.
The PeerTrust system uses policies to describe trust and security requirements. Such policies are a component of Peertrust run-time system that can negotiate to establish trust among systems on the Semantic Web
An electronic votingsystem – Verifiable E-Voting (VEV) – with underlying protocol to help secure the election process from malicious practices at the same time as allowing voters and candidates to verify the correctness of their votes.
Uberviewer is a java/swt log processor for Uberlogger (a kernel-based observatory). It allows real-time analysis of a remote OS, including process and I/O monitoring.
This tool is intended to be helpful for security researchers and malware analysts.
SAM Jr provides real-time analysis of Snort data. SAM Jr is written in Java and should run anywhere a modern JVM is available. SAM Jr will be extendable via plugins so that custom actions can be written easily.
Please note: not having time to complete jSai myself; I came across the ACEGI project which I now recommend instead.
jSai; a Servlet Authentication Implementation. jSai aims to allow easier to use, more powerful authentication for Java Servlets.
A Java-based client-server architecture for processing network intrusion detection data. The server receives XML alerts from Snort sensors buffers them for review by clients. The console provides a real-time view of IDS activity.
Yet another alarms program with features as file modification alarm (maybe useful for security auditories), alarms file saving possibility and of course time and date alarms. This time written in java.
Manage sources of video (i.e., from a security camera), recording clips where motion has been detected, and allowing those clips to be replayed.
Variable lead-in/out time, motion detection, logging.
The JPass.org project relates to the development of a system for authenticating user's identity, more specifically, for providing identity authentication methods using non-reusable and non-reversible one-time IDs.
SyncShare Server is a secure messaging and real-time collaboration
platform. Build solutions to connect people, data, and applications through
firewalls and mobile devices. It handles all networking, security issues and lets
one focus on the business
Time-stamp of a created file can be modified by attacker. This project is meant to track File timestamp values , using NTFS data structures rather than trusting the original time stamp modified by attacker.
...Block forwarding, uploading to unauthorized cloud services, or syncing to personal drives.
Apply time-based access (expiration dates) and geo/device restrictions.
Maintain tamper-evident audit trails for compliance and forensics.