Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.
Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
Download Free Tool
AI-generated apps that pass security review
Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
sfick (pronounced as "s-fick") is a two part software system whose function is to assist system administrators with the process of verifying the integrity of critical files. Given a system compromise, system administrators must be able to verify the integ
Stinger is a Java validation engine for HTTP requests. Deploy it as a J2EE filter or integrated into servlets and JSPs. Specify simple regex-based rules in XML-based Security Validation Description Language (SVDL). Flexible logging and error handling.
AuthServlet is a Java Servlet (and JSPs/TagLibs) which provides a simple pluggable authentication and role-based authorization service. It can be easily incorporated into any Servlet-based web applications.
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
A Java-based client-server architecture for processing network intrusion detection data. The server receives XML alerts from Snort sensors buffers them for review by clients. The console provides a real-time view of IDS activity.
Distributed Syslog collector and viewer system with reliable Syslog msgs over tcp, and query with reg ex. using PERL. Supports IETF syslog and syslog relay, JAVA/JINI based, uses postgreSQL, JBOSS. Chain of custody raw to db data link. UTF8, D, F , UK
Simple Encoder/Decoder, written in the .net framework.
It is basicly an encryption program which supports serveral encryption methods.
It can encode or decode texts in the forms of files or just plain text written directly in the program.
An alternative Identification system that is a replacement for Microsoft's Passport and the Liberty Alliance. Its a simple architecture that is setup so anyone can run a server and thereby have control over their online identification.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
HandyVault is a password-manager program. It's simple to use and pretty secure. All your account information (name, optional url, username, password, comments) for websites or anything else is safely stored using an open-source Blowfish symmetric-key enc
OpenSST (Open Simple Secure Transaction) is a project to create a simple security protocol for making transaction between (un)trusted parties. The project includes a protocol design specification and a cross-platform software implementation of the speci
A fast and flexible implementation of SSH and SCP for Java, modelled on OpenSSH. In the beginning it should be simple, but hopefully eventually feature-rich.
The Flow Controller is an implementation of the controler layer of the MVC pattern, using a servlet and a XML based flow description. The Flow Controller has transparent support for HTTPS and file uploads.
The functional objective is to provide a simple secure socket infrastructure for client/server apps. The usability objective is to allow inexperienced developers to deploy the system and write "Hello World" with a single page of documentation.
The goals of jiCard project is to provide robust, Microsoft CardSpace compatible, Java object model for WS-* stack and XML binding for the model via JIBX framework.
Terrier is a RBAC framework, business oriented and with focus on manageability and access control. Integrating all company tecnhnologies (java, ruby, delphi and others). The owner of a system can manage and delegate manageability to the systems, reducing
KiSS, Kilobyte SOAP Security, is a J2ME library that provides WS-Security for kSOAP2. It supports the WSS Username Token Profile and a subset of the XML Encryption and Processing recommendation.
A secure PKI-based client/server encrypted chat engine under development in Java. Encryption will be supported via JCE and PKCS#11. A simpleJava interface can be implemented by other projects wishing to develop a Java GUI or CLI for the client.
Malabar is a simple, context-agnostic authentication library for Java applications. It strives to be equally usable in J2EE/Web, GUI, and other applications requiring user authentication.
This is a simple tool that generates a set of self-signed certificates for a group of distributed Java-based servers. It also creates the trusted key store to house the public keys and allow for the servers to communicate via SSL
CDCL (Cascading Disclosure-Control Language) is a simple, transparent, high-confidence mechanism for declaring rules of disclosure. It is a language and framework built expressly for item-level disclosure control.
Meergoose is a multi-use social suite of applications that allows users to setup a portal on their personal computing platform that encrypts and stores files locally and synchronizes encrypted files with a secure cloud.
MeerCrypt is a component of Meergoose and is opensource. The vision is simple: Encrypt Locally. Share Remotely. YOU remain in control of your security, your keys, your data.