Showing 938 open source projects for "software open-source"

View related business solutions
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Subcontractor Construction Management Software Icon
    Subcontractor Construction Management Software

    Bidtracer has been built specifically for the MEP/BAC industry for both construction and service side

    Bidtracer has been built specifically for the MEP/BAC industry for both construction and service side including but not limited to CRM, Bid Management, Invitation to Bid, BAC Estimating, BAC Engineering, Project Management, Service Agreement, Service Work Orders, Service Repair, Service Projects all built natively in the cloud. Estimating/Engineering are connected with live pricing to many manufacturers such as JCI, Distech Controls, ABB, Carrier, ALC and many peripheral distributors such as Kele, Alps, Belimo, Siral, Bray. If we don’t have it already, we will import it as many times throughout the year. Whether you're 2 users or 1000s our system works for all levels of business and all types of users: estimators, engineers, PMs, sales, executive, and field workers with built in rich reporting, customizable reporting, charts and graphs to help companies analyze their data in real time.
    Learn More
  • 1

    The ASN.1 Compiler

    Go to github.com/vlm/asn1c for the latest version.

    This ASN.1 compiler turns ASN.1 specifications into C code. The asn1c is shipped together with conformant BER/DER/XER/PER codecs. The X.509, GSM TAP3, MEGACO, RRC and LDAP encoding and decoding examples are part of the source code distribution. NOTE: THE asn1c PROJECT HAS LARGELY MOVED TO GITHUB: http://github.com/vlm/asn1c
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2

    STP

    MOVED TO GITHUB. Code here is STALE.

    THE STP CODE HAS MOVED TO GITHUB. THE CODE HERE IS STALE. PLEASE CHECKOUT THE FOLLOWING WEBSITE: http://stp.github.io/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    javawebutils

    web application utilities

    This library contains utility classes such as a converter from plain text to HTML (for safe inclusion of user-supplied text into web pages, avoiding XSS attacks, etc.), converters from binary to hex representation, and similar functions
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    nsrlquery

    Provides tools to interface with NIST's NSRL RDS.

    The National Institutes of Science and Technology maintains the National Software Reference Library. As part of this, they keep track of SHA-1 hashes of millions of known pieces of software (the "Reference Data Set"). Unfortunately, there are very few tools to help users query the NSRL RDS. That's where nsrlquery comes in.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Download the most trusted enterprise browser Icon
    Download the most trusted enterprise browser

    Chrome Enterprise brings enterprise controls and easy integrations to the browser users already know and love.

    Chrome Enterprise is ideal for businesses of all sizes, IT professionals, and organizations looking for a secure, scalable, and easily managed browser solution that supports remote work, data protection, and streamlined enterprise operations.
    Learn More
  • 5

    ORDO vers.1.0

    AES-128, Linux, OpenBSD, Assembly-Language

    Small cryptographic command line tool for LINUX and OpenBSD (x86) completely in 32-Bit Assembly Language. ORDO encrypt/decrypt files (max. size 2 GB) with AES-128-Algorithm (Rijndael) in CBC-Mode (Cipher-Block-Chaining). No libs are included, only system-calls are used. ORDO is under BSD License.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    iAccess is a trust negotiation-based authorization service. It provides entities with the right to protect their own credentials and negotiate with remote (unknown) servers access to resources. iAccess works with X.509 and SAML standards.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    silvertunnel - Java lib+browser for TOR
    silvertunnel.org is a project that provides an end-user browser, a Java library and additional Java security tools to easily access anonymity networks such as the Tor (torproject.org) network. Secure and easy to use. Tor4Java and Tor Browser. Attention: see project status on page https://sourceforge.net/p/silvertunnel/discussion/962278/thread/83dc2d02/#
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    dynipdrop

    Drop specified IP n seconds remotely, auto-undrop it when timeout.

    It's a IDS-receiver and written in C. Sometimes I want to drop remote IP xx seconds, and Undrop it when timeout; Sometimes my sniffer-server find a hack-action and I want to tell another server/server-group "Drop xxx.xxx.xxx.xxx IP xx seconds". So I written this program -- dynipdrop("dynipdrop" daemon and "ipdrop_local" to send a drop-msg from localhost, and "ipdrop_udp" to send a drop-msg to another server(installed the dynipdrop daemon). And I think: "Maybe I can make a client...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Your friendly neighborhood hackers for hire. We are a group of individuals providing our clients the best support and troubleshooting advice and some of what we believe to be the best open source software and OS. Enjoy!
    Downloads: 0 This Week
    Last Update:
    See Project
  • Figure Markets: OnChain Assets Icon
    Figure Markets: OnChain Assets

    Figure Markets bridges crypto and real-world assets into one seamless platform.

    Instantly unlock liquidity with Crypto-Backed Loans—borrow against BTC or ETH at rates starting from 12.5% APR, with no credit checks, no prepayment penalties, and 3-month terms. Keep your crypto, get your cash.
    Learn More
  • 10
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    ECommands

    ECommands

    Commands made Easy and practical for Unix/Linux

    This software is made with the purpose of making easy the Unix/Linux Server management. Is made completly in Python, making this project as a OS independent. Was tested over Linux and Windows. For documentation go to http://www.life-microsystems.com/index.php/ecommands-documentation
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Software library for development of Swedish Medical administrative applications involving secure communication and document handling. Implementation supports standards as CMS/SMIME and modern XML security standards from W3c, Oasis etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    IdMUnit is an xUnit automated testing framework for Identity Management solutions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Web KeePass Password Safe
    Web AND Mobile (Apple iPhone) based, multi user, java port of the KeePass project. A free, easy to use password manager which helps you to manage your passwords in a secure way. Focused on deep encryption and ease of use.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 15
    This is an encrypter. It can be used to encrypt confidential information. Prefect for sending file over the Internet without others knowing the content of the file. The encryption algorithm used in this software is similar to the one that's used by espionage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Ralasafe Access Control Middleware focus on data-level privilege management, including database row/column and content privilege management. It also manages 2) login control; 3) function-level privilege management; and 4) URL privilege authentication
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Trike

    Computer-aided threat modeling

    Trike is a platform-independent tool for systematic, computer-assisted threat modeling, from requirements through deployment. We are developing Trike v2 on GitHub (https://github.com/octotrike/trike). Our mailing lists are still here on SourceForge, and we're leaving the old code repository & releases up for archival purposes. Plus you probably want to use something while you're waiting for v2.
    Leader badge
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    User AES-128 bit encryption in counter mode of operation. supports interactive mode of operation and command line mode of operation.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 19
    OhCrypt Encryption Tool
    OhCrypt lets you easily encrypt and decrypt files using some of the most popular algorithms, like AES, Blowfish and Serpent. With OhCrypt, you can secure your data with a password-based encryption algorithm through a clean and simple interface. It demonstrates state of the art of cryptology techniques, such as password hashing and salt. Ohcrypt also features self-extractable and self-destructive encrypted files
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Encryptron

    Encryptron

    An encryption software using C# 4.0

    First of all, let us understand the need for an encryption software. Just think of you sending a message of extreme confidentiality, someone else fetches it and goes through it. A breach in the security! We can’t allow that to happen. So, virtually every data send over a network is encrypted now-a-days. Let’s look at this now: Vdmbnld!`f`ho...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Password Wallet

    Password Wallet

    Progetto "Password Wallet" (Università degli Studi di Padova)

    Progetto didattico "Password Wallet" per l'insegnamento di Ingegneria del Software (Anno Accademico 2011/2012) del Corso di Laurea in Informatica dell'Università degli Studi di Padova.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    DAL4j

    Data Access Layer 4 Java

    Welcome to Data Access Layer for Java (DAL4j) a set of command line tools and framework used to reverse engineer a MySQL or SQLServer database schema into a set of JPA Entity Beans. DAL4j can be useful for scenarios where there is an existing database schema but a technology other that JPA is used to interact with the database. DAL4j can provide an easy way to migrate your code base from other technologies such as JDBC or Hibernate to JPA. The beans generated can be 1 or two types:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Moihack Port-Flooder

    A simple TCP/UDP Port Flooder written in Python.

    This is a simple Port Flooder written in Python 3.2 Use this tool to quickly stress test your network devices and measure your router's or server's load. Features are available in features section below. Moihack DoS Attack Tool was the name of the 1st version of the program. Moihack Port-Flooder is the Reloaded Version of the program with major code rewrite and changes. Code is much smaller in size now - from about 130 pure lines of codes to 35 lines only. To run it you must...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    AntiDef

    Anti defacement command line tool

    AntiDef is written in order to handle with defacement attacks. This tool written in Java in a fast-and-dirty manner; However is works. This tool is working straight forward. Server administrator should run the application with the following specific parameters: path to the copy of the web site (source), path to the application directory, path to log directory and few more optional parameters. This tool compares the source and the destination files, then copies the "defaced" files if...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    libObfuscate
    libObfuscate 2.00 ISO C / open-source / system independent * Modern 256bit cryptography: AES, Anubis, Camellia, Cast-256, Clefia, FROG, Hierocrypt3, Idea-NXT, MARS, RC6, Safer+, SC2000, Serpent, Speed, Twofish, Unicorn-A, Wrapper * CSPRNG (based on AES) * Modern 512bit hashing: Grostl, Keccak, SHA2, Skein, Wrapper * Scrambling * Multi-layered obfuscation
    Downloads: 0 This Week
    Last Update:
    See Project