Showing 414 open source projects for "stable-diffusion-webui"

View related business solutions
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 1

    AntiDef

    Anti defacement command line tool

    AntiDef is written in order to handle with defacement attacks. This tool written in Java in a fast-and-dirty manner; However is works. This tool is working straight forward. Server administrator should run the application with the following specific parameters: path to the copy of the web site (source), path to the application directory, path to log directory and few more optional parameters. This tool compares the source and the destination files, then copies the "defaced" files if...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    JPassword Recovery Tool

    JPassword Recovery Tool

    Password recovery tool for compressed archives and md5, sha-1/2 hashes

    This is a simple but sophisticated open source password recovery tool for M$ Windows, it can effectively 'crack' any password protected archive that can be decompressed by 7zip given enough time and resources. It can also bruteforce MD2, MD5, SHA-1 and SHA-2 hashes (SHA-256, SHA-384, SHA-512), CRC16, CRC32, CRC64 and Adler32 hashed passwords for both Windows, and Linux. It requires java 7u4 and above, and 7-zip v9.20 and up for archive recovery. Keeping these above applications up to date...
    Leader badge
    Downloads: 86 This Week
    Last Update:
    See Project
  • 3
    The Martus (TM) Bulletin System is used by human rights and social justice groups to track violations. This Java program is as easy to use as email. Bulletins can be encrypted or searched, and can be backed up to a remote server. See www.martus.org.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Barada
    Barada (Barada Aint Respecting Any Deceptive Adversaries) is a PAM module designed to provide two-factor authentication support. There is companion software called Gort which runs on Android devices, essentially turning your phone into a SecureID token. The PAM module is available in the repositories for Debian based distributions. Gort, the Android client, is available from the android market (https://play.google.com/store/apps/details?id=net.sf.crypt.gort)
    Downloads: 0 This Week
    Last Update:
    See Project
  • Axe Credit Portal - ACP- is axefinance’s future-proof AI-driven solution to digitalize the loan process from KYC to servicing, available as a locally hosted or cloud-based software. Icon
    Axe Credit Portal - ACP- is axefinance’s future-proof AI-driven solution to digitalize the loan process from KYC to servicing, available as a locally hosted or cloud-based software.

    Banks, lending institutions

    Founded in 2004, axefinance is a global market-leading software provider focused on credit risk automation for lenders looking to provide an efficient, competitive, and seamless omnichannel financing journey for all client segments (FI, Retail, Commercial, and Corporate.)
    Learn More
  • 5

    Tetrumble

    Tetrumble is encryption tool.

    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    JMD5 is a multi-threaded Java program to calculate the MD5 sums of files. It uses Java Swing as GUI framework
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Files Hash code Verifier

    Files Hash code Verifier

    A tool to verify and generate MD5,SHA,CRC32 hash of multiple files

    A Security tool that will help to verify the hash codes of files . Currently,Our Hash Code verifier tool supports the following Hash types: MD5,SHA,CRC32. More details about the tool can be found in the project homepage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    NTRU

    NTRU

    NTRUEncrypt and NTRUSign in Java

    This project provides an implementation of the NTRU public-key cryptosystem: NTRUEncrypt and NTRUSign.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    Injection Wizard is an application for injecting traffic into WEP protected Wi-Fi networks, like aireplay-ng, but it's much more easy to use and it can work with worse conditions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Nonprofit Budgeting Software Icon
    Nonprofit Budgeting Software

    Martus Solutions provides seamless budgeting, reporting, and forecasting tools that integrate with accounting systems for real-time financial insights

    Martus' collaborative and easy-to-use budgeting and reporting platform will save you hundreds of hours each year. It's designed to make the entire budgeting process easier and create unlimited financial transparency.
    Learn More
  • 10
    A cross platform steganography software written completely in java, with a juicy AES support. The project is pretty extensible, so new smarter steganography algorithms's are fully implementable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Hippikon is a powerful authorization API that was developed for enterprise software applications and is now provided free under the GNU LGPL. Hippikon may be integrated in any java application or framework to provide complex security models with ease.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Chi-Square & LSB Enhancement attack

    Chi-Square & LSB Enhancement attack

    Java implementation of Chi-Square Attack and LSB Enhancement Attack

    Chi-square attack is the most commonly known and used statistical attack in steganalysis. LSB enhancement attack is also the most widely known visual attack in this area. This project includes implementation of these two methods in java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Steganography Studio
    This project provides a steganography tool that allows to know, use and compare the results of current steganographic techniques. It also incorporates a comprehensive set of stegoanalitics methods for images.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 14
    OpenSource Java based cross platform command line file encryption software.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    eMayor provides process and applications that enable the cheap, secure and sustainable realization of standard e-government services, everything from processing a change of personal information to issuing certificates or licenses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    The overall objective of the SWEB project is to develop a secure, interoperable, open, affordable platform upon which secure cross border government services will be built.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    pam_mobtok is a PAM module together with a J2ME midlet to realize authentification. A password is entered into the J2ME capable mobile device which then generates a token that is valid for a short time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    The 'jpwgen' program is a Java-based password generator whose functionality resembles the popular 'pwgen' program. The *nix based version of 'pwgen' is available at http://sourceforge.net/projects/pwgen/.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Khembalancer

    Software to balance a chemical equation (redox too)

    Balacing a chemical equation using the Laplace's rule to solve a system of linear equations or using the brute-force method. Khembalancer 2.5.5 received the "100% Free" award and that means Khembalancer does not contain any viruses, spyware, trojans and backdoors. For more information see: http://www.softpedia.com/progClean/Khembalancer-Clean-207422.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Cumulus4j is an encryption plug-in for DataNucleus. Applications can thus use JDO or JPA to persist their data into every common database. Using the Bouncy Castle cryptography libs, it provides strong encryption via AES, TwoFish or other algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Java implementation of Shamir's Secret Sharing algorithm as described in Applied Cryptography [as LaGrange Interpolating Polynomial Scheme].
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    iBox
    iBox is a powerful information management tools for Android, which gives you a safe and secure way to store all of your critical information. It could be credit card numbers, accounts, passwords, marketing plans, product ideas, minutes and much more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    NSIA
    NSIA (Network System Integrity Analysis) is a web application monitoring system that scans web applications for potentially unwanted context such as defacements, unauthorized changes, errors, information leaks, profanity, compliance issues, etc
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    OpenSignX is a document and form signing Java applet for PKI X.509 certificates. It is based on www.openOCES.org and provides generation XAdES enveloping signature of one or multiple documents supporting PKCS#11 Java keystores.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    Using encryption to secure your code or text. Click File->Run to run your code using Ruby, see the pop up for output. Never save your text or code to disk unencrypted. Don't forget your password. Encryption is error-persistent.
    Downloads: 0 This Week
    Last Update:
    See Project