Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
Try Retool free
Outgrown Windows Task Scheduler?
Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.
Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
Java security module using JAAS with JDBC. A Pluggable Authentication Module (PAM) using database store user information. Contains implementation over Tocam Realm, JBoss JAAS. Sponsored by http://knowledgesurf.com.
OpenSST (Open Simple Secure Transaction) is a project to create a simple security protocol for making transaction between (un)trusted parties. The project includes a protocol design specification and a cross-platform software implementation of the speci
JVerify is a Java app that enables you to monitor for changes in any file on your Unix system, most notably executable binaries, thus alerting you to a possibly backdoored binary. It runs on any platform that supports JSDK 1.4.x and has a MySQL database
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
startx is the project name for an interface build in php which takes the output of some products like MRTG or awstats or ACID... and put them together in the same Web interface.
Infranet is a system that attempts to circumvent web censorship by allowing clients to surreptitiously request sensitive content via cooperating Web servers distributed across the global Internet.
The goal of the Symbiosis project is to develop software which allows people to communicate, share knowledge, and learn. The primary subject of learning will be the Buddha Dharma, but it will be possible to use it for other subjects also.
Dun and Bradstreet Risk Analytics - Supplier Intelligence
Use an AI-powered solution for supply and compliance teams who want to mitigate costly supplier risks intelligently.
Risk, procurement, and compliance teams across the globe are under pressure to deal with geopolitical and business risks. Third-party risk exposure is impacted by rapidly scaling complexity in domestic and cross-border businesses, along with complicated and diverse regulations. It is extremely important for companies to proactively manage their third-party relationships. An AI-powered solution to mitigate and monitor counterparty risks on a continuous basis, this cutting-edge platform is powered by D&B’s Data Cloud with 520M+ Global Business Records and 2B+ yearly updates for third-party risk insights. With high-risk procurement alerts and multibillion match points, D&B Risk Analytics leverages best-in-class risk data to help drive informed decisions. Perform quick and comprehensive screening, using intelligent workflows. Receive ongoing alerts of key business indicators and disruptions.
The NEO Project uses the NEO-c (Network Exchange Operation for Charity) platform to participate in various computing challenges and projects, and donates any winnings to the charities specified by its users.
Manage sources of video (i.e., from a security camera), recording clips where motion has been detected, and allowing those clips to be replayed.
Variable lead-in/out time, motion detection, logging.
JECC is an open source implementation of public key Elliptic Curve Cryptography written in Java. As of now it provides en-/decrypted out- and input streams.
JavaIDMEF is an implementation of IDMEF in Java originally developed by Chris McCubbin. The Intrusion Detection Message Exchange Format (IDMEF) describes the structure and transport facility of information between IDS and management.
Lizard Cart CMS offers an easy way for people with limited HTML experience to manage the content and products of their websites.It uses PHP/MySql/Java Script comes complete with a WYSIWYG online editor.
A similar to Tripwire, file system integrity checking tool but develop in java and cross platform.
This tools checking and source control using check sum algorithm like MD5, SHA and CRC.
A secure collaborative framework that is being used by other projects such as CFAgent (online customer service), CFWeb (pure HTTP communication for CFAgent) and much more in addition to serving as a standalone all-in-one collaboration platform by itself.
The JPass.org project relates to the development of a system for authenticating user's identity, more specifically, for providing identity authentication methods using non-reusable and non-reversible one-time IDs.
LDAP Enabled Application Framework(LEAFs), is a J2EE based application framework that couples a strong security model with MVC. The security of LEAFs is modeled after the TCSEC Class 2 (C2) security specification.
The Filters project team are building API's which will filter malicious input to applications that is used to launch various attacks. The filters will sanitize input rendering it harmless and detect specific attacks. This project will develop imple
SyncShare Server is a secure messaging and real-time collaboration
platform. Build solutions to connect people, data, and applications through
firewalls and mobile devices. It handles all networking, security issues and lets
one focus on the business
A Java library for validation of credit cards. Implements the Luhn Algorithm to ensure the card number is well formed, checks card type prefix's and length. The rules are stored in a text file allowing new cards to be added without changing the source