Showing 33 open source projects for "java basic"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    Build gen AI apps with an all-in-one modern database: MongoDB Atlas

    MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
    Start Free
  • Deliver secure remote access with OpenVPN. Icon
    Deliver secure remote access with OpenVPN.

    Trusted by nearly 20,000 customers worldwide, and all major cloud providers.

    OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
    Get started — no credit card required.
  • 1
    OWASP WrongSecrets

    OWASP WrongSecrets

    Vulnerable app with examples showing how to not use secrets

    Welcome to the OWASP WrongSecrets game! The game is packed with real life examples of how to not store secrets in your software. Each of these examples is captured in a challenge, which you need to solve using various tools and techniques. Solving these challenges will help you recognize common mistakes & can help you to reflect on your own secrets management strategy.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    Proxyee

    Proxyee

    HTTP proxy server,support HTTPS & websocket

    Proxyee is a JAVA-written HTTP proxy server library that supports HTTP, HTTPS, and WebSocket protocols, and supports MITM (Man-in-the-middle), which can capture and tamper with HTTP, and HTTPS packets. The CA certificate (src/resources/ca.crt) from the project needs to be imported to a trusted root certificate authority. The CA certificate (src/resources/ca.crt) from the project needs to be imported to a trusted root certificate authority. You can use the CertDownIntercept interceptor to enable...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    Textcryption

    Textcryption

    Tiny application which allows encrypting basic text.

    Application which allows encrypting text. It is encrypted using own libraries. I think it is a very strong way to encrypt, specially if the text has more than 1 KB. The application reads encrypted bytes from disk, and writes encyrpted bytes to disk, so it never is saved in the hard disk decrypted. JDK-17 compatibility
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    EasyJCE

    Provides encryption & password hashing for your app or Hibernate POJOs

    EasyJCE provides an easy to use interface for encrypting, decrypting, and hashing data for transmission or storage using the Java Cryptographic Extension (JCE). A set of Hibernate user types is included to transparently integrate encryption into the data layer in a JPA/Hibernate environment, ensuring data is persisted in its encrypted form while obscuring encryption and decryption logic from application code. EasyJCE supports most algorithms implemented for the JCE, including those provided...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Photo and Video Editing APIs and SDKs Icon
    Photo and Video Editing APIs and SDKs

    Trusted by 150 million+ creators and businesses globally

    Unlock Picsart's full editing suite by embedding our Editor SDK directly into your platform. Offer your users the power of a full design suite without leaving your site.
    Learn More
  • 5
    Google Authenticator Android

    Google Authenticator Android

    Open source fork of the Google Authenticator Android app

    ... on the device and codes are computed locally, it works even without a data connection and avoids server-side dependencies. The UI focuses on clarity and safety cues—timers, account naming, and basic management—to make 2FA adoption accessible to non-experts. For developers, the project doubles as a reference implementation of OTP enrollment, storage, and code generation on Android.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    PLEASE NOTE that we are in the process of moving to GitHub: https://github.com/jasypt/jasypt Jasypt (Java Simplified Encryption) is a java library which allows the developer to add basic encryption capabilities to his/her projects with minimum effort, and without the need of having deep knowledge on how cryptography works. PLEASE NOTE that we are in the process of moving to GitHub: https://github.com/jasypt/jasypt
    Downloads: 18 This Week
    Last Update:
    See Project
  • 7
    CryptoToolsPack

    CryptoToolsPack

    Basic encode/decode, files comparison and protect sensitive data

    This pack includes the following: FCSG - generate checksum and perform file comparison; JCryptoTool - encrypt/decrypt messages and files; JWallet - password protect sensitive information. See Help menu in each application, Source code included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Mobile-ID USAT applet

    Mobile-ID USAT applet

    The Remarc Mobile-ID USAT applet

    The Remarc Mobile-ID USAT applet this is a JavaCard applet with USIM Application Toolkit menu support. Basic functions of the Remarc Mobile-ID SAT applet: • Authentication function; • Signing function; • Changing PIN1/PIN2; • Changing PUK; • Unblock PIN1/PIN2; • View information - in a USAT menu is present a menu item with information of PIN usage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    SecSy: Security-oriented Log Synthesis

    SecSy: Security-oriented Log Synthesis

    Tool for synthesizing business process logs.

    SecSy is a tool for security-oriented log synthesis. Besides basic synthesis properties (cases per day, office hours, randomized activity duration, ...), its detailed parameter setting for simulating business processes also allows to specify data usage (objects + access modality), actors for process activities and access control constraints for task/object permissions. It is also capable of enforcing/violating specific security properties on process traces, such as SoD/BoD, Unauthorized...
    Downloads: 0 This Week
    Last Update:
    See Project
  • No-Nonsense Code-to-Cloud Security for Devs | Aikido Icon
    No-Nonsense Code-to-Cloud Security for Devs | Aikido

    Connect your GitHub, GitLab, Bitbucket, or Azure DevOps account to start scanning your repos for free.

    Aikido provides a unified security platform for developers, combining 12 powerful scans like SAST, DAST, and CSPM. AI-driven AutoFix and AutoTriage streamline vulnerability management, while runtime protection blocks attacks.
    Start for Free
  • 10
    Cygnus Editor

    Cygnus Editor

    Java text editor with AES file encryption.

    Cygnus Editor is a basic text-editing program created entirly in Java. And it's most commonly used to view or edit text files (.txt). A text file is a file type typically identified by the .txt file name extension. In Cygnus Editor you can encrypt your text document, so nobody can see the content of your document. Also you can decrypt your document and edit it. Cygnus Editor uses AES-256 encryption. AES-256 is the most powerful encryption standard yet. AES-256 uses many applications, websites...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    BinaryCrypt

    BinaryCrypt

    Binary Conversion Calculator

    With BinaryCrypt, you can convert between regular text, binary, hexadecimal, octal decimal and decimal. You can convert only decimal (as of right now) to any base up to base 64. You can also save your converted text to a file or open a converted text file to decrypt the message, and perform basic arithmetic in binary. The git repo for the C# code is located at: https://github.com/m1r4g3/BinaryCrypt-.Net
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12

    LogSeCA

    SIEM based tool supporting audit and security assessment

    ... be impossible to do if each data centre processed events separately; » alerting and notification to the interested parties (e.g. security manager of the storage infrastructure); » control on the status of the corrective actions; » reporting at different levels (for basic audit inspection, statistical) and for different purposes (for final users, for internal purposes, for auditing). The design and development of this prototype have been partially founded by the VISION Cloud EU FP7 project
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    F-Talk P2P Encrypted Secure Voip

    F-Talk P2P Encrypted Secure Voip

    F-Talk cross-platform p2p encrypted secure voip software

    This project connect to two peers directly ( using without any central server, stun server ) together with 128bit encrypted secure voip communication. http://ftalk.armanasci.com/guide Spefications * Peer to peer direct connection without using any central dedicated server. ( First basic part of the security ) * 128bit AES Symmetric end-to-end encryption PCM datas. ( Second basic part of the security ) * 64bit Base64 Encoding transferred server side info. * Ipv4 and Ipv6 Supoort...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    Zillya AVEngine SDK

    Zillya AVEngine SDK

    Antivirus engine that allows you to create your own anti-virus

    Antivirus engine with a set of virus databases and regular updates. Detects and cures all types of malware. Allows you to create your own anti-virus software without the creation of a personal virus lab, connect antivirus functionality to applications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    The Password tools bundle is one application combining three tools - the Analyser (shows the "strength" of your password, the Generator (generates "strong" passwords) and the Manager (stores passwords securely using Rijndael).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    CoDec is a Java package for encoding and decoding ASN.1 data structures. CoDec supports the Basic Encoding Rules (BER) as well as the Distinguished Encoding Rules (DER) and provides a library with data structures for many cryptographic standards.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    JHide
    JHide is simple steganography tool aimed to demonstrate basic steganography techniques.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    This simple Java applet will use a few URL obfuscation methods to mask a URL. This isn't meant to be anything earth shattering, but maybe useful. It does more than basic URL encoding (although it does that). Also contains a library to do it all.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    Dr. Crypt Encryption Algorithm & Library
    DrCrypt, based on basic xor(exclusive or) encryption which is designed to be fast and reliable. Also DrCrypt supports 3 platform.(Java, .NET, Win32)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    It's a tool for testing HTTP servers and Web applications. It supports HTTP/HTTPS protocols, GET,POST and HEAD methods, HTTP proxies, refferes and cookies. It's like HTTP Debugger in network tool AccessDiver or HAS.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 21
    A smart card-based public key cryptography system based on elliptic curves, using AES for session key generation and SHA for hashing. This project will include the smart card software, terminal software, and a public key server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    SIMRAN adds security to the famous AODV protocol. The project is based on SAODV draft and AODV RFC.Its basic functionality lies in securing the AODV protocol by authenticating the non-mutable fields of the routing message using digital signatures.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    SwiftCrack is a wireless LAN (WLAN) tool which recovers encryption keys. SwiftCrack operates by proactively monitoring transmissions, injecting traffic with known key streams, computing the encryption key when enough packets have been gathered.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    J2EP is a reverse proxy running on a J2EE engine. The proxy is written in java and was originally designed with Tomcat in mind, but any engine should work fine. A set of basic mapping rules are included but they can easily be extended to your own needs.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25
    Pure-Java cryptographic calculator, featuring basic arithmetic operators, cryptographic operations, multiple key file formats and edition of ASN.1 object files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.