Showing 150 open source projects for "command-line"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Context for your AI agents Icon
    Context for your AI agents

    Crawl websites, sync to vector databases, and power RAG applications. Pre-built integrations for LLM pipelines and AI assistants.

    Build data pipelines that feed your AI models and agents without managing infrastructure. Crawl any website, transform content, and push directly to your preferred vector store. Use 10,000+ tools for RAG applications, AI assistants, and real-time knowledge bases. Monitor site changes, trigger workflows on new data, and keep your AIs fed with fresh, structured information. Cloud-native, API-first, and free to start until you need to scale.
    Try for free
  • 1
    Console of administration WEB for clients with installed ClamWin. The objective of this project is to use an opensource software, and generate a comprehensive solution of Antivirus. The antivirus ClamWin was selected. The project is a Web interface for a
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Jaxseed processes XCCDF documents used for SCAP (NIST Security Content Automation Protocol) checklists. It performs benchmark resolution, i.e., the 6 "Loading" steps. Given an XCCDF document, it returns a resolved benchmark in the form of a DOM.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    A graphical tool for creating and checking MD5 and SHA-1 checksums. Comes with a convenient batch mode. Works also from the command-line. Written in Java/Swing as a comfortable tool for your file checks.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    Secure Storage service is a set of tools to store in a secure way and in an encrypted format confidential data on the grid storage elements. The service has been designed for the grid Middleware of the EGEE infrastructure, gLite.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Smart Business Texting that Generates Pipeline Icon
    Smart Business Texting that Generates Pipeline

    Create and convert pipeline at scale through industry leading SMS campaigns, automation, and conversation management.

    TextUs is the leading text messaging service provider for businesses that want to engage in real-time conversations with customers, leads, employees and candidates. Text messaging is one of the most engaging ways to communicate with customers, candidates, employees and leads. 1:1, two-way messaging encourages response and engagement. Text messages help teams get 10x the response rate over phone and email. Business text messaging has become a more viable form of communication than traditional mediums. The TextUs user experience is intentionally designed to resemble the familiar SMS inbox, allowing users to easily manage contacts, conversations, and campaigns. Work right from your desktop with the TextUs web app or use the Chrome extension alongside your ATS or CRM. Leverage the mobile app for on-the-go sending and responding.
    Learn More
  • 5
    Penny Post
    Penny Post is a system to combat spam emails by making the sender "pay for email" by spending a few seconds of computing time. Outgoing mail is marked with postage stamps that convince the receiver that the sender is genuine.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    OpenRCA is a highly flexible and modular Certificate management and Registration Authority based on J2EE technology. OpenRCA is designed to be a very flexible, extensible and low cost enterprise PKI solution.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Thumbnail steganography creates a thumbnail from a source image and stores data in it by altering it's color channels. To decipher the data, a new thumbnail is made from the original image and the differences between the pixels are calculated.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    A simple java library (1.5.* and higher versions) in order to crypt (or decrypt) a file using a password. The library accepts the following parameters: an input file, the operation to perform, and the user password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    WorkingCode gives you what the name says working pieces of codes in Java. We are talking about code snippets and full utility apps for Java and J2me. It's use is intended as a library.
    Downloads: 0 This Week
    Last Update:
    See Project
  • eProcurement Software Icon
    eProcurement Software

    Enterprises and companies seeking a solution to manage all their procurement operations and processes

    eBuyerAssist by Eyvo is a cloud-based procurement solution designed for businesses of all sizes and industries. Fully modular and scalable, it streamlines the entire procurement lifecycle—from requisition to fulfillment. The platform includes powerful tools for strategic sourcing, supplier management, warehouse operations, and contract oversight. Additional modules cover purchase orders, approval workflows, inventory and asset management, customer orders, budget control, cost accounting, invoice matching, vendor credit checks, and risk analysis. eBuyerAssist centralizes all procurement functions into a single, easy-to-use system—improving visibility, control, and efficiency across your organization. Whether you're aiming to reduce costs, enhance compliance, or align procurement with broader business goals, eBuyerAssist helps you get there faster, smarter, and with measurable results.
    Learn More
  • 10
    Mock in the Middle is a Java Proxy designed for testing network applications. It serves as a mock proxy between a client and a server. By recording and replaying network conversations, the client can later be tested without a live server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Java-based security platform which provides a multi-user service middleware for distributed systems. Features: service environment, Shell-based interaction, user authentication (password, soft-token, smard-card), policy enforcement, Web services support
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    PortableNotary permits you to verify pdf signature. Is OS independent and can be used from command line.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Bork is a very small, cross-platform file encryption utility. It is written in Java and designed to be included along with the files it encrypts for long-term storage (eg on CD-R). Its minimal external dependencies make it fairly futureproof.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    BarTex is a system designed to create inexpensive tickets for events. It uses a crypto system to verify tickets using barcodes; thus eliminating the cost of expensive, colorful tickets that cannot be photocopied/forged.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    SAWS is a Secure Audit Service that cryptographically protects all log messages. It can run as either a standalone web service called SAWS (Secure Audit Web Service) or as a Java Secure Audit Trail Service (JSATS) that is called via a Java API.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    TPM/J is an object-oriented API using Java for low-level access to the TPM. It was developed as part of the research project on Trusted Computing at MIT.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Cryptomni is a program which can encrypt and decrypt files using the one-time pad cipher. If a key is truly random, kept secret, and never reused, this encryption algorithm can be proven to be unbreakable.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    Sting is a simple, host-based approach to detecting arp cache poisoning based man in the middle attacks (such as made by ettercap) on your LAN. It uses SNMP to periodically query the arp cache of your router and make sure its entry for you is correct.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    HumanSudokuSolver is intended to solve Sudoku puzzles in a way human beings would do (non brute force). It currently solves most of the puzzles I tried and can output a step-by-step solution. Developers who want to contribute are welcome!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Privale is a p2p network following the form of onion routing/mixmaster networks. But, it is an anonymous publish and retrieval medium, not a proxy system. Privale attempts to defend against denial of service attacks, Sybil attacks, and traffic analysis
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Offers a complete structure of security for Spring-based projects. It turns any bean in a protected resource. It uses a non invasive approach, and once you create a security policy it makes the bean a PEP (Policy Enforcement Point).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    anti spam tool. uses an active algorithm (not filtering).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    SNames is a threaded java dns scanner. It uses patterns to provide good bruteforce strength when trying to resolve hostnames.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Open Identity Management (OIDM)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Tecnotel is a project that seeks security and comodity to the end-user, controlling your house through the telephone line, internet or remote-controller. The software available controls the electronic-equipment and others.
    Downloads: 0 This Week
    Last Update:
    See Project