Showing 822 open source projects for "using"

View related business solutions
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 1
    This GUI tool written using Qt4 sets Access Control Lists (ACLs) of files and directories.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    CF is a Linux/Unix command line utility for editing/managing AES-encrypted text files. Multiple users can edit the same files using their own separate passwords. It supports basic file locking, piping, adding, changing, removing, and listing keys.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Pidgin-paranoia is a plug-in for Pidgin (formerly known as Gaim) that provides information-theoretically secure encrypted conversations using one-time-pads.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    XMail anti-spam filters using libantispam.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5
    To run fortify scan using fortify software, we are using apache-ant till now . There is no maven plugin for fortify. So i wrote a maven plugin which will do all tasks similar to ant such as fortify parse,scan and clean etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    This tool encrypts text using polyalphabetic codetables, like the encryption systems in the middle ages. It can be used for simple text encryption with a small password or as a One-Time-Pad with a random codetable for 100% secure text encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    The purpose of this project is to demonstrate Information Card interoperability on heterogeneous platforms written using Java language to support Apache Tomcat, JBoss & SUN Application Server platforms running on Linux.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Process Memory Dumper it's developed for IT Consultants IT Security Consultants that need to dump the entire memory of a process and/or save informations about all running processes and modules. It's developed in C++ using MFC
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    DKIM for JavaMail is a small JAR that can be easily implemented in existing Java projects using JavaMail for sending DKIM signed emails.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 10
    Raiden block cipher: An extremely lightweight and fast block cipher, developed using genetic programming, with the intention to be an alternative to TEA. This cipher is as fast as TEA, and without many of its known weaknesses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Clam AntiVirus Client Library provides a simple API to the ClamAV daemon. ClamAVC does not require ClamAV to be installed. ClamAVC communicates with clamd using clamd's documented protocol using either TCP or a local Unix domain socket.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    PySumpas is a simple, graphical password generating utility written in Python/Tkinter. Using tools from the Python Cryptography Toolkit, it generates secure passwords from user input that can be regenerated if forgotten.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    SMScryptor encrypts and decrypts messages sent from any mobile phones using : - AES 256 encryption - J2ME MIDP2.0 CLDC1.1 - ECMAScript - Apache / PHP / mysql
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A procmail based antivirus filter for incoming mail servers on Unix. It is efficient and tiny. Supports UUE, Zip and Rar attachments, Base64 and Quoted-Printable encodings. Identifies viruses, PUAs and phishings using the ClamAV clamscan virus scanner
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    This is SSL Scanner that can be used to check, what ciphers can be used in https connection. You can also download page using each cipher. Also reports from scanning can be available.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Python wrapper around a small subset of the OpenSSL library. Includes: X509 Certificates, SSL Context objects, SSL Connection objects using Python sockets as transport layer. The Connection object wraps all the socket methods and can therefore be use
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    This a a small program to encrypt/decrypt files using AES (Advanced Encryption Standard)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    JChecksum allows you to obtain the hash of a given file using a simple GUI. Hash algorithms supported include MD2, MD5, SHA-1, SHA-256, SHA-384, and SHA-512.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    The Epic Web Honeypot Project aims to lure attackers using various types of web vulnerability scanners by tricking them into believing that they have found a vulnerability on a host.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    GNIPS is a network intrusion prevention system for Linux using Snort and iptables. It alerts user of incoming attacks on their network and allows them to block any offending hosts. It's also possible to configure GNIPS to send out alert emails.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    This applet allows digitally sign documents with standard CMS is developed in Java using free software (libraries bouncycasttle).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Blowfish Encryption over HTTP. It encrypts with your username and password using the server-generated unique key which you must have, so as to use this service. The malicious third-party can't decrypt your login info if they don't have the key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Secure downloads by checksum verification using several hash algorithms like md5 or sha1 to verify your downloaded packages using an independet third site.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Encryption application using one time pad algoritm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Recently, security is becoming a social issue. Security patch of Microsoft was cracked in several days after releasing. This kind of binary cracking is composed by debugging and reverse engineering technique.
    Downloads: 0 This Week
    Last Update:
    See Project