Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.
Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
Download Free Tool
AI-generated apps that pass security review
Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
Pseudo Random Number Generator (PRNG) frontend using libtomcrypt. It simply writes pseudorandom data (using sober-128, fortuna, yarrow or rc4 algorithm) on standard output. The output may be encoded to base64, base85 or hex or just left binary.
Figaro's Password Manager (FPM) is a GNOME application that allows you to securely store & categorize your passwords, which are encrypted using the blowfish algorithm. It can launch applications using the host names, user names, and passwords you supply.
http://jublogin.sourceforge.net/login_with_challenge A concept for securing passwords on web logins using hashes on the client side (with salt and challenges). Demos plus implementation patches for web applications.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
nessquik is a fast web frontend for the Nessus Vulnerability Scanner. It uses modern javascript technologies to deliver a responsive, easy to use interface that lets people quickly schedule scans using Nessus.
The Advanced Network Traffic Analysis Research and Exploration Suite (ANTARES) is a toolkit for working with flow attributes - computations that can be used to distinguish between different uses of the network, even without using packet payloads.
An nmap output parser for scan data using PERL. Nmap Parser is a PERL module that makes developing security and audit tools using nmap and PERL easier. nmap is one of the best security scanners.
stegotools is a suite of UNIX command-line applications to read/write hidden information from/in files using steganography. It currently fully supports 24bpp bitmap images.
Total Network Visibility for Network Engineers and IT Managers
Network monitoring and troubleshooting is hard. TotalView makes it easy.
This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
stores a free text field strongly encrypted on a cell-phone or PDA using AES encryption with 256 bit -- can be used for storing passwords, pins and other sensitive data
BarTex is a system designed to create inexpensive tickets for events. It uses a crypto system to verify tickets using barcodes; thus eliminating the cost of expensive, colorful tickets that cannot be photocopied/forged.
TPM/J is an object-oriented API using Java for low-level access to the TPM. It was developed as part of the research project on Trusted Computing at MIT.
Cryptomni is a program which can encrypt and decrypt files using the one-time pad cipher. If a key is truly random, kept secret, and never reused, this encryption algorithm can be proven to be unbreakable.
Hash Cracker is an application developed in java swings that allows a user to crack MD2, MD5, SHA-1,SHA-256,SHA-384,SHA-512 hashes either using brute force or using wordlists of the user's choice based on the users choice.
Computer Breaker is a network testing tool that allows networking administrators to test if a computer is vulnerable to malicious attacks. Using the Nessus scanner, computer-breaker scans the remote host and automaticaly exploits its vulnerabilities.
JFish is a simple Java implementation of the popular Twofish cryptography algorithm. It allows any application to easily implement powerful encryption, using a single small library and minimal code changes.
AES.g is a port of the Advanced Encryption Standard (or Rijndael) to the GPU using a mix of C++ and Cg programming languages. It is portable and built as a class-based program, using OpenGL or DirectX libraries.
Soicmp is a remote shell system, similar to telnet or netcat that allows a user to connect to a remote shell daemon, by using ICMP protocol instead of classical TCP. http://soicmp.sourceforge.net/ http://billiejoex.altervista.org/Prj_Py_soicmp.shtml
KX.509: X.509 certificates using Kerberos -- Convenient, Secure, Web Authentication. KX.509 is an open source project that provides a Kerberos realm's users with a secure means of acquiring short-term X.509 certificates via Kerberos authentication.
wlfXchanger is a point-to-point communication software which enable developers to cooperate in a secure way, using an asymmetric encryption system (Public Key Cryptography).
OpenVPN Key Distribution System allows a web server and a OpenVPN server to exist at the edge of a network and gives a reliable system for passing out openVPN keys to the user base using ssl and php5.
B-Trust eDoc is a program built on top of LibDigiDoc a free implementation of the OpenXAdES standard for signing/encrypting files using smartcard tokens. It also contains Openssl and PKCS11 wrapper classes in C++ which might be useful to developers.
OAproject implements a plataform to allow applications to interact. Apps using the platform send/receive messages through a message oriented middleware. Main features are a Single Sign On (SSO), Identity Management System (IMS) and a provisioning system