Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Create free account
Custom VMs From 1 to 96 vCPUs With 99.95% Uptime
General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.
Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
Provides a Java implementation of various Attribute Certificate (AC) functionalities. In particular, it provides various client interfaces to the Virtual Organisation Management System (VOMS) system, as well as an AC server that can act as a VOMS Server.
URL Signer is a simple utility that uses signs a URL which can then be transmitted in plaintext and validated by the recipient. See project documentation for a detailed description.
If you need to protect your confidential files in office or shared desktops, here is the robust commandline and GUI utility to do password based encryption using AES. It can encrypt and decrypt a folder structure containing any number of files.
A suite of source and binary programs to test the capabilities of code analysis tools. A reference implementation of x86 binary analysis in C# is also included.
Security is a subject of major concern in mobile agents. This project provides a security framework that allows the protection of mobile agents from third parties. A self-protected approach, where the agents themselves manage the process, is used.
Java project.
A java application that creates jars with encrypted content inside. With a selfextract and decrypt built in.
GUI aswell as console functionallity.
Options to include a key salt inside of the jar to hinder bruteforce attempts.
Orizon is a framework intended to provide tools and facilities to test java sources for security flaws. The main goal is to detect common threats as described in Owasp top 10 vulnerability document.
Java based Portable hashing application capable of multiple individual file signatures or proprietary group signatures (1 signature for a folder and all its contents). GUI and commandline in the same executable. -sha1 -sha256 -sha51 -md5 -crc32
Velo is an open Identity and Access Management platform, with many IDM services such as provisioning, access control, password synchronization, audit & compliance, self service interfaces and much more.
Easy-SEND is an implementation of the SEND (SEcure Neighbor Discovery) protocol for IPv6. It is aimed to be used for learning and testing purposes. SEND is described in RFC 3971. Easy-SEND includes a tool (CGAGen) to generate and verify CGAs (RFC 3972).
Shasummer is a SHA hashsum utility in Java. It can calculate SHA1, SHA256 and SHA512 hashes of a file or of a directory (and its subdirectories) and verify the hashes later. Shasummer has a graphical and a command-line interface.
A lightweight, compact, stand-alone, platform-independent application to forward TCP (over IPv4 or IPv6) connections to another host. Possible uses include - but not limited to - firewall hacking, tunneling, proxying, fortifying ADSL, creating multi-plat
Project Sypher is a Java program that is intended to take a document and cipher the text, output the result in a new document and delete the original file.
SJEA version 1.0 - Simple Java Encryption Algorithm. SJEA is a simple command-line binary encryption algorithm (symmetric block cipher) written in JAVA. It uses a password and a byte-vector array to scramble the input file.
Console of administration WEB for clients with installed ClamWin. The objective of this project is to use an opensource software, and generate a comprehensive solution of Antivirus. The antivirus ClamWin was selected. The project is a Web interface for a
Jaxseed processes XCCDF documents used for SCAP (NIST Security Content Automation Protocol) checklists. It performs benchmark resolution, i.e., the 6 "Loading" steps. Given an XCCDF document, it returns a resolved benchmark in the form of a DOM.
A graphical tool for creating and checking MD5 and SHA-1 checksums. Comes with a convenient batch mode. Works also from the command-line. Written in Java/Swing as a comfortable tool for your file checks.
Secure Storage service is a set of tools to store in a secure way and in an encrypted format confidential data on the grid storage elements. The service has been designed for the grid Middleware of the EGEE infrastructure, gLite.
Penny Post is a system to combat spam emails by making the sender "pay for email" by spending a few seconds of computing time. Outgoing mail is marked with postage stamps that convince the receiver that the sender is genuine.
OpenRCA is a highly flexible and modular Certificate management and Registration Authority based on J2EE technology. OpenRCA is designed to be a very flexible, extensible and low cost enterprise PKI solution.
Thumbnail steganography creates a thumbnail from a source image and stores data in it by altering it's color channels. To decipher the data, a new thumbnail is made from the original image and the differences between the pixels are calculated.
A simple java library (1.5.* and higher versions) in order to crypt (or decrypt) a file using a password. The library accepts the following parameters: an input file, the operation to perform, and the user password.
WorkingCode gives you what the name says working pieces of codes in Java. We are talking about code snippets and full utility apps for Java and J2me. It's use is intended as a library.