Open Source Java Security Software - Page 40

Java Security Software

View 5801 business solutions

Browse free open source Java Security Software and projects below. Use the toggles on the left to filter open source Java Security Software by OS, license, language, programming language, and project status.

  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 1
    This is a simple app, created around an original sudoku solver based only on heuristics, not brute force. It's coded in Java/SWT(GUI toolkit). It's an example of MVC and of Visitor, Observer, Strategy, Abstract Factory, Singleton Design Patterns.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Sureness

    Sureness

    A simple and efficient security framework

    Sureness allows you to security any server written with jvm modern frameworks such as Spring, Spring Boot, Spring WebFlux, Javalin, Quarkus, Micronaut, Solon, Jfinal or Ktor as well as frameworks for Kotlin. The essence of Sureness is to use an interceptor (like a servlet filter or Spring interceptor) to intercept all rest requests for authenticating and authorizing. So no matter any framework, as long as it has an interceptor, it can integrate with sureness. Sureness uses Exception Handling Process, checkIn() will return SubjectSum(user information) when auth success, or throw different types of auth exceptions when auth error. Sureness has a sensible default configuration, is easy to customize, and is not coupled to any one framework, which enables developers to quickly and safely protect their projects in multiple scenarios.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    SurveyKing

    SurveyKing

    Make a better survey system

    The most powerful " build the simplest & more friendly online exams/questionnaires/public queries/question bores/voting/assessment system to support a key deployment. Supports more than 20 question types, such as filling-in-the-blank, selection, drop-down, cascading, matrix, pagination, signature, question group, upload, horizontal fill-in-the-blank, etc. A variety of ways to create questionnaires, Excel import questionnaires, text import questionnaires, online editors to edit questionnaires. A variety of questionnaire settings, support white list answers, public inquiries, answer restrictions, etc. Simple installation and deployment ( deployment within 1 minute at the fastest ), supports one-click windows deployment, one-click docker deployment, front-end and back-end separation deployment, single jar deployment, and secondary directory deployment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    A system that allows people to open doors by using a Bluetooth enabled phone or other device.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Access competitive interest rates on your digital assets.

    Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 5
    SwiftCrack is a wireless LAN (WLAN) tool which recovers encryption keys. SwiftCrack operates by proactively monitoring transmissions, injecting traffic with known key streams, computing the encryption key when enough packets have been gathered.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Swiss password depot program
    "Swiss password depot program" for administration "login and password" informations. The passwords are all crypted on the local file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    The goal of the Symbiosis project is to develop software which allows people to communicate, share knowledge, and learn. The primary subject of learning will be the Buddha Dharma, but it will be possible to use it for other subjects also.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Safe all your passwords and encrypt them with a single password? Yawn. Synchronize your encrypted entries between different machines? Without compromising your security? Here comes SyncYourSecrets
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Project Sypher is a Java program that is intended to take a document and cipher the text, output the result in a new document and delete the original file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 10
    Szyfrator i deszyfrator pliku za pomoca algorytmu MARS
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    TACS (Trust Ant Colony System) is a Trust model for P2P, Ad-hoc and Wireless Sensor networks (also valid for multi-agent systems) based on the bio-inspired algorithm ACS (Ant Colony System).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    TCP-Beholder is a client/server traffic sniffer with a userfriendly gui.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The CDSA Java Interface project allows you to use CDSA services as JCA-JCE services from your Java applications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Private-key, symmetrical (same password to encrypt and decode) file encryption with 8-bit to 2147483647-bit (2^3 to 2^31) encryption using my own algorithm and my own extension of MD5 (http://blog.robtoth.net/2009/06/tencryption-computer-programming.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    TLSBench

    A tool for benchmarking the TLS performance of Cloud database systems.

    TLSBench is a tool for benchmarking the performance of Transport Layer Security (TLS) in cloud storage systems / cloud database systems like Apache Cassandra, Apache HBase, and Amazon's DynamoDB. This tool is built for research purposes. A paper which describes the general benchmarking approach and some experiments is available here: http://www.aifb.kit.edu/images/5/58/IC2E2014-Performance_Overhead_TLS.pdf.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    TPM/J is an object-oriented API using Java for low-level access to the TPM. It was developed as part of the research project on Trusted Computing at MIT.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    TPMitigation
    TPMitigation is a transparent HTTP-proxy for mitigation of drive-by-malware. Content is converted on-the-fly and/or replaced where there is a risk of a infection by embedded drive-by-maleware. Also visit http://tpmitigation.sourceforge.net/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    TRMSim-WSN
    TRMSim-WSN (Trust and Reputation Models Simulator for Wireless Sensor Networks) is a Java-based simulator aimed to test Trust and Reputation models for WSNs. It provides several Trust and Reputation models and new ones can be easily added.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A library for accessing a Time Stamp Authority Server using both HTTP and TCP protocols. It implements RFC3161.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    TSEFS is an encrypting filesystem.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    A client-server-system for distributively editing and signing documents. (technologies: Java, Java Servlets / JSPs, EJBs)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Talos is an environment-agnostic authorization engine that uses the most expressive API you can find, so you can write authorization statements in code that reads almost like english.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    A JAAS extension library that provides Authentication, Authorization and Accounting (user profiling); it includes LDAP, Kerberos and JDBC authentication/profilation modules.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    An implementation of a Non-Interactive Zero knowledge Proof system to be used in a voting simulation software, as part of our BCS project.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    Tcp/Ip API Wrapper

    TCP/IP API (SSL Encryption, ZLIB Compression)

    TCP/IP connectivity warpped in an API extended to provide the following major features: SSL Encryption, ZLIB compression, packet oriented mode rather stream oriented mode. Asynchrounous. One liner to declare server or connect to server.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB