No hidden charges. No surprise bills. Cancel anytime.
Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
Start Free
Earn up to 16% annual interest with Nexo.
Let your crypto work for you
Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform.
Geographic restrictions, eligibility, and terms apply.
A fast contractual framework based Monitoring agent for Java with extended support for temporal operators and customizable agents for JVMTI, Javassist and Dynamic Proxy APIs.
Sting is a simple, host-based approach to detecting arp cache poisoning based man in the middle attacks (such as made by ettercap) on your LAN. It uses SNMP to periodically query the arp cache of your router and make sure its entry for you is correct.
The PeerTrust system uses policies to describe trust and security requirements. Such policies are a component of Peertrust run-time system that can negotiate to establish trust among systems on the Semantic Web
HumanSudokuSolver is intended to solve Sudoku puzzles in a way human beings would do (non brute force). It currently solves most of the puzzles I tried and can output a step-by-step solution. Developers who want to contribute are welcome!
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.
Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
JSerpent is an easy to use Java implementation of the powerful Serpent cryptography algorithm. It can be easily implemented into any project, and is complete with ECB, padding, and a simple API.
Hash Cracker is an application developed in java swings that allows a user to crack MD2, MD5, SHA-1,SHA-256,SHA-384,SHA-512 hashes either using brute force or using wordlists of the user's choice based on the users choice.
JFish is a simple Java implementation of the popular Twofish cryptography algorithm. It allows any application to easily implement powerful encryption, using a single small library and minimal code changes.
JRijndael is a 100% pure Java implementation of the popular Rijndael (aka AES) cryptography algorithm. It's designed to be implemented as easily as possible and features ECB, padding, and a simple API.
S/Key - OTP Generator for J2ME architecture. An RFC2289 compliant One-Time Password generator for mobile phone supporting Java language. It uses MD4 and MD5 hash algorithms.
An implementation of Shoup's "Practical Threshold Signature" in Java. This is an (n,k)-threshold signature system: at least k parties out of n must independently sign a piece of data to produce a valid group signature.
wlfXchanger is a point-to-point communication software which enable developers to cooperate in a secure way, using an asymmetric encryption system (Public Key Cryptography).
HashserGUI is a GUI interface for Jacksum. It is intended to provide a graphical tool to create hashes for files within a directory, and check the hashes generated. It works with many hash functions, as md5, sha1, sha256, sha512, md4, crc, etc.
This project is intended to host developer clients for openhuman.org web services - free collaborative protection system against userbase contamination by disposable email addressing (DEA) and public accounts.
Encryption plugin for Alfresco. Enables the user to crypt and decrypt (it handles the 'pkcs5' MIME-type). This is a component of the IDX-eDOC project (OpenTrust suite), contributed by IDEALX
AmavisAdmin is a tool to maintain SPAMs, Viruses and blocked mails written to an SQL database by Amavisd-new. Mails can be removed automatically or manually, or they can be released to be send to the recipients.
Mica has been developed in the project SicAri (www.sicari.de), sponsored by the BMBF (www.bmbf.de), and allows for all kind of means authentication at windows systems. Mica is based on Kerberos and therefore supports single sign-on.
Offers a complete structure of security for Spring-based projects. It turns any bean in a protected resource. It uses a non invasive approach, and once you create a security policy it makes the bean a PEP (Policy Enforcement Point).
Cervantes (Certificate Validation Test-bed) is a client/server project that has been developed to test, develop and evaluate certificate revocation systems.
This project aims to release an IP unencumbered implementation of the core services provided by Mesmerize: an open framework for enterprise security management.