Showing 35 open source projects for "code editoral software"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • BoldTrail Real Estate CRM Icon
    BoldTrail Real Estate CRM

    A first-of-its-kind homeownership solution that puts YOU at the center of the coveted lifetime consumer relationship.

    BoldTrail, the #1 rated real estate platform, is built to power your entire brokerage with next-generation technology your agents will use and love. Showcase your unique brand with customizable websites for your company, offices, and every agent. Maximize lead capture with a modern, portal-like consumer search experience and intelligent behavior tracking. Hyper-local area pages, home valuation pages and options for rich lifestyle data keep customers searching with your brokerage as the local experts. The most robust lead gen tools on the market help your brokerage, teams & agents effectively drive new business - no matter their budget. Empower your agents to generate free leads instantly with our simple to use landing pages & IDX squeeze pages. Drive more leads with higher quality and lower cost through in-house tools built within the platform. Diversify lead sources with our automated social media posting, integrated Google and Facebook advertising, custom text codes and more.
    Learn More
  • 1
    Ghidra

    Ghidra

    Ghidra is a software reverse engineering (SRE) framework

    Ghidra is a free and open-source reverse engineering framework developed by the NSA for analyzing compiled software. It supports a wide array of instruction sets and executable formats, offering features such as decompilation, disassembly, scripting, and interactive graphing. Designed for security researchers and analysts, Ghidra provides a robust environment for understanding malware, auditing code, and performing software forensics. It includes both GUI-based and headless analysis modes.
    Downloads: 655 This Week
    Last Update:
    See Project
  • 2
    AmazonMSK AWS Identity Access Management

    AmazonMSK AWS Identity Access Management

    Use AWS Identity and (IAM) to connect to Amazon Managed Streaming

    The Amazon MSK Library for AWS Identity and Access Management enables developers to use AWS Identity and Access Management (IAM) to connect to their Amazon Managed Streaming for Apache Kafka (Amazon MSK) clusters. It allows JVM-based Apache Kafka clients to use AWS IAM for authentication and authorization against Amazon MSK clusters that have AWS IAM enabled as an authentication mechanism. This library provides a new Simple Authentication and Security Layer (SASL) mechanism called...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    Surpass

    Surpass

    Simple, secure and easy to use password manager.

    ...If a secret is copied to clipboard it's automatically cleared after 45 seconds. - Support for generating random secrets. For more details and screenshots see https://alternativeto.net/software/surpass/about
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    PiracyChecker

    PiracyChecker

    An Android library that prevents your app from being pirated

    An Android library that prevents your app from being pirated / cracked using Google Play Licensing (LVL), APK signature protection and more. API 14+ required. This library applies some techniques to help protect your app's users and attempt to thwart reverse engineers and attackers. BUT, this isn't guaranteed to stop your app from getting pirated. There is no such thing as 100% security, and a determined and skilled attacker with enough time, could remove these checks from the code. The real...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Total Network Visibility for Network Engineers and IT Managers Icon
    Total Network Visibility for Network Engineers and IT Managers

    Network monitoring and troubleshooting is hard. TotalView makes it easy.

    This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
    Learn More
  • 5

    sls

    SLS Team Java Library

    Java library with Cryptographic algorithms. Easy to use Crypto algorithms. Works on Windows, Linux, Android. No external lib dependencies, no useless abstractions, no 'crypto provider'. Elliptic curves was borrowed from BouncyCastle and simplified a lot. Most of EC classes are custom algorithms for certain curves. Can be easily deleted if u dont need them. With couple of classes u can parse and construct those ugly ASN.1 structures, look at RSA and EC key formats for example. No...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    StrongKey CryptoEngine

    StrongKey CryptoEngine

    FIDO strong authentication, encryption, digital signature engine

    StrongKey CryptoEngine (SKCE) 2.0 is a "crypto Swiss Army knife" server to perform cryptographic functions through web services, while freeing application developers to focus on business functionality. Its modules include: - A FIDO Engine to support FIDO U2F key registrations/authentications - An encryption engine to encrypt/decrypt files using AES/TDES keys - Escrowing keys to on-premises key management system (StrongAuth KeyAppliance/SAKA) - Integration to cloud storage services...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    JChecksum

    JChecksum

    MD5 Checksum Tool

    ...And currently, the file size is 20.7 kB (20,701 bytes). Anyone can inspect the source code and use it to modify, develop and redistribute.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    IP2LocationLookupTool

    Allow you to lookup IP address with geo-location information

    Allow you to embed this Java component into your project for IP geolocation lookup. This component will displays the below geolocation information for an IP address lookup. * Country * Region * City * Latitude & Longitude * ZIP Code * Time Zone It supports both the IPv4 and IPv6 address. Please take note that this component requires the “IP2Location DB11 BIN” data file and “IP2Location Java Component” to function. Below are the download links: * IP2Location DB11.LITE BIN (free...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Web Application Protection

    Web Application Protection

    Tool to detect and correct vulnerabilities in PHP web applications

    WAP automatic detects and corrects input validation vulnerabilities in web applications written in PHP Language (version 4.0 or higher) and with a low rate of false positives. WAP detects the following vulnerabilities: - SQL injection using MySQL, PostgreSQL and DB2 DBMS - Reflected cross-site scripting (XSS) - Stored XSS - Remote file inclusion - Local file inclusion - Directory traversal - Source code disclosure - OS command injection - PHP code injection WAP is a static...
    Downloads: 3 This Week
    Last Update:
    See Project
  • Rent Manager Software Icon
    Rent Manager Software

    Landlords, multi-family homes, manufactured home communities, single family homes, associations, commercial properties and mixed portfolios.

    Rent Manager is award-winning property management software built for residential, commercial, and short-term-stay portfolios of any size. The program’s fully customizable features include a double-entry accounting system, maintenance management/scheduling, marketing integration, mobile applications, more than 450 insightful reports, and an API that integrates with the best PropTech providers on the market.
    Learn More
  • 10

    java-sandbox

    Securly execute untrusted code from within your application.

    The java-sandbox allows you to securely execute untrusted code (for example, user generated scripts in scripting languages such as groovy or rhino) from within your application. It allows you to specify resources and classes that may be used by the code, thus, separating the execution from the application's execution environment. It allows to wrap execution environments in threads or even execute them remotely on different jvms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    PHParser

    PHParser

    A Lexer and a Parser to PHP scripts

    PHParser 1.2 generates a pure Java parser for PHP programs. Invoking this parser yields an explicit parse tree (AST) and a tree walker suitable for further analysis. This tool package is based upon: - ANTLR 3.2 or higher (www.antlr.org). - JDK 1.6 or higher (java.sun.com). - Grammar specifications of PHP 5.3.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    innocence-java

    Replace text with POS equivalent text, in a reversible fashion.

    Program takes (currently) english text sentences, and replaces each word in a given sentence with another word having the same Part of Speach (POS) tag. This creates a new sentence containing none of the original words. This new sentence can then be transmitted to a remote user, and using the same software, "de-crypted" into yielding the original sentence. The software relies on having a known "seed" value for the random number generator, which is known only by the sender and receiver. It also relies on the sender and receiver having a shared (identical) vocabulary file. The project contains code to test input sentences for inclusion of words in the current vocabulary, and can create entries for new words as needed. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    web4thejob.org

    web4thejob.org

    Open source to productivity

    Web4thejob is an open source java framework for the rapid development of data-centric web applications. It is ideal for those who seek a component-based event-driven full-stack web development framework, capable of producing elegant desktop-style web applications that can automate any business domain. The framework addresses the automation needs of any business domain introducing "joblets". A joblet encapsulates the relational schema of a business domain using modern orm technology....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    The Open Web Application Security Project (OWASP) software and documentation repository.
    Downloads: 41 This Week
    Last Update:
    See Project
  • 15
    Codegroup

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    Codegroup is a Java application that will allow one to convert binary (or text) computer files in to 5 letter codegroups for transmission over email, landline telephones, radioteletype or Morse Code. Codegroup has internal error correction & limited cryptography capabilities. Codegroup : ZZZZZ YBPIL AIAIG FMOPP CPAAA DGNGP GPGPA ADNJN ELJKO ELIMO GEOHF KIFGP IFBCB PKCPI YJMHE PHBHP PPOBH NCOHD AKLLL AGHFP DEGEF LKELC EAIJI ABAGP AHPPO IHHPH OHPDF YNFPB ALEPO KMPKP Once this...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    Mjolnir

    Java code for brute forcing keystore certificates

    Mjölnir is a a java-based brute force algorithm for obtaining keystore passwords by brute force. It is multi-threaded
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    STP

    MOVED TO GITHUB. Code here is STALE.

    THE STP CODE HAS MOVED TO GITHUB. THE CODE HERE IS STALE. PLEASE CHECKOUT THE FOLLOWING WEBSITE: http://stp.github.io/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    DAL4j

    Data Access Layer 4 Java

    Welcome to Data Access Layer for Java (DAL4j) a set of command line tools and framework used to reverse engineer a MySQL or SQLServer database schema into a set of JPA Entity Beans. DAL4j can be useful for scenarios where there is an existing database schema but a technology other that JPA is used to interact with the database. DAL4j can provide an easy way to migrate your code base from other technologies such as JDBC or Hibernate to JPA. The beans generated can be 1 or two types:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    RIDSystem

    capturing packet and detecting intruders with their signature

    ...Intrusion Detection System will certainly minimize the unauthorized access and take immediate response to stop such illegal works. MNCs manages their whole information system using application software over their network.It will be helpful to monitor all the activity in the network. Planning: >Studying network protocols and prototypes >Studying similar kind of existing technologies >Writing of Code in Java using jpcap library >Deployment and testing over anetwork Online References: >http://netresearch.ics.uci.edu/kfujii/Jpcap/doc/ >http://docs.oracle.com/javase/tutorial/ >http://docs.oracle.com/javase/7/docs/api/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    CesTa (Code Enhancing Security Transformation and Analysis) is a tool for enhancing security by program transformations. Focused on Smart Cards (Java Card in particular), powered by Ant, ANTLR and StringTemplates.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    Using encryption to secure your code or text. Click File->Run to run your code using Ruby, see the pop up for output. Never save your text or code to disk unencrypted. Don't forget your password. Encryption is error-persistent.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Commons-SSH is a thin bridge between different Java SSH implementations libraries. It doesn't contain any crypto-related code and created to be used by projects who doesn't want to care about export control regulations (let client to decide)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    A suite of source and binary programs to test the capabilities of code analysis tools. A reference implementation of x86 binary analysis in C# is also included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Orizon is a framework intended to provide tools and facilities to test java sources for security flaws. The main goal is to detect common threats as described in Owasp top 10 vulnerability document.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    Milk is a security source code assessment tool using Orizon as API. Milk scans java and .NET source file in order to perform a security code review trying to point out safe coding best practices misuse.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next