Showing 1253 open source projects for "java-orm"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 1
    This site is intended as a location containing a suite of tools to (1) Aid in the design of db APIs to be utilized in a J2EE environment and (2) generate stubs for the db API, Java classes and SQL DDL necessary to support the MVC pattern and the Data Own
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    MINI is a secure service discovery protocol for the M2MI ad-hoc networking library and written in Java (and soon, Python).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    FreeToken is an attempt to develop a free of charge alternative to other two factor authentication systems such as those marketted by RSA and Verisign.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Java servlet implementation of the Lightweight Identity Management (LID), URL Management Software. More information about LID can be found at <a href="http://lid.netmesh.org>http://lid.netmesh.org</a>
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    SACRED (Securely Available Credentials) is an IETF framework and protocol for credential portability to allow secure, authenticated access to security credentials. This project provides SACRED client and server implementations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Cryptix OpenPGP is a library which implements the OpenPGP standard (RFC 2440) in Java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Crypty is your tool for encrypting and decrypting your private messages and files with security provided by the usage of TripleDES (3DES) or RSA.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    PrivaSphere Secure Messaging Service is a convinced user of open source. This is to give back to the community. The first contribution is a port of best practice crypto to Java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Open source implementation of the Java Authorization Contract for Containers (JACC) Provider
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    CarrierPigeon enables intelligent, transparent and secure usage of data sources across networked sites. The underlying, distributed Java-framework is built on the concept of proxy drivers to provide a real VPN experience.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    The Intrusion Detection Exchange Protocol (IDXP) is an application-layer protocol for exchanging data between intrusion detection entities. IDXP-Java is a Java-based implementation based upon the Java BEEP Core implementation of RFC 3080 / RFC 3081.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The Dashboard Linux PC Project. A Linux UI for automobile multimedia. To be used for MP3's, GPS, DVDs, CD, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Cryptix is an international volunteer effort to produce robust, open-source cryptographic software libraries. Cryptix products are free, both for commercial and non-commercial use and are being used by developers all over the world.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    GridAuth is a user credential management system for distributed data and computational grids. GridAuth is configurable and extensible to just about any system requiring credential management, advanced authorization and secure authentication.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    x:einfach simple java components is a library for java. it includes various things like a page cache for web-content, a virtual string table, an ip subnet checker, string and date handling utilities, a connection pool and other simple things.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Web Scanner is a command-line program that is designed to scans web servers to find default and potentially vulnerable web pages. 2.0 - Java, 1.3 - Perl Web scanner supports both HTTP and HTTPS protocols and can be configured to use custom data files.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 17
    oraOink is a cross-platform java swing client for gathering Snort alert statistics from an Oracle database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    This project provides a 'brute-force' search for optimum assembler fragments for Microchip Technology Inc's mid-range PIC processor range.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    This proyect is an implementation of OpenPGP (RFC2440) written entirely in Java. It let's you sign, encrypt, decrypt messages and files, using public key cryptography.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    TSEFS is an encrypting filesystem.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    COMMON VULNERABILITIES AND EXPOSURES (CVEŽ) DATABASE BROWSER, CVEBROWSER A web search engine for the CVE dictionary, targeted to be used on a intranet. CVEBrowser uses Java Servlets / JSP and MySQL and its designed to work well on RedHat
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    GPP is a General Purpose Proxy Java graphical application intended mainly for packet inspection and modification. It's main idea is to be a little user-friendly portable man-in-the-middle tool for security analysis. Later, some protocols should be added
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Role Manager is a security management framework based on the NIST model for Role Based Access Control (RBAC) and the Java[TM] 2 Platform security standards. The access control policies and the RBAC Model are implemented using the RBAC profile of XACML.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    SecurityFilter is a Java Servlet Filter that mimics the behavior and configuration format of container managed security, with several development and deployment advantages. See the Home Page for more details.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    JHoney is a honeypot tool for Linux written in Java. It simulates vulnerable net services to trick an attacker or trojan to attack them. The attacker IP is blocked once a service is attacked, and then the intruder cannot attack for example webservers.
    Downloads: 1 This Week
    Last Update:
    See Project