Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.
Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
Download Free Tool
AI-generated apps that pass security review
Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
Labrador is a Host-based Intrusion Detection System (HIDS) and Integrity Checker written entirely in Perl. It aims to be a complete, free, multiplatform, and open-source solution for detecting modifications and tamperings in files.
Erinaceus is an esoteric two dimensional programming language which uses bitmaps as sourcecode. It is turing complete and able to modify itself. It has been created with the goal to create a language that can be hidden in pictures easily.
OCTV it is a robust and complete solution of security and monitoring.It has support for different models of cameras IP.Among its functions includes playback, recording, motion detection, event scheduling and can work simultaneously with many cameras
Kasai is a 100% Java based authentication and authorization framework. It allows you to integrate into your application a granular, complete and manageable permission scheme.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
JSerpent is an easy to use Java implementation of the powerful Serpent cryptography algorithm. It can be easily implemented into any project, and is complete with ECB, padding, and a simple API.
Q5 is a complete fully open linux based router / network appliance, including hardware. It supports up to four wireless minipci cards and two 10/100 Mbps NICs. The hardware is build around AMD's AU1500 MIPS processor, running at 264 MHz.
Offers a complete structure of security for Spring-based projects. It turns any bean in a protected resource. It uses a non invasive approach, and once you create a security policy it makes the bean a PEP (Policy Enforcement Point).
CCTVnix will be a complete CCTV video surveillance system for use with V4L2 complient capture cards. Much like Kodicom, and other commercial Windows based software, it will feature motion detection, remote interfaces and event notification. Watch this sp
This project provides a user-level command to edit NFSv4 Access Control Lists
(ACLs). The command allows users to display and change NFSv4 ACLs from
clients that do not have complete NFSv4 ACL support.
Ncartographer takes the xml output from an Nmap scan and displays it graphically in an attractive, compact, scalable, and complete manner. Supports saving the display of a scan as .png or .jpg images, and can generate images from a command line.
Odyssi PKI aims to be a complete PKI suite written in Java, and designed from the ground up with security in mind. When completed, it will be fully standards compliant with PKIX, XKMS, OCSP, and other PKI standards.
Waste.NET is a complete rewrite of the now defunct W.A.S.T.E. project. It aims to become a highly secure file sharing application, as well as a secure chat/VOIP platform.
KSB26 [Kernel Socks Bouncer] is Linux Kernel 2.6.x loadable module that redirects tcp connections (to user-defined target hosts) through socks 4/5 chains, in a complete transparent way.
Project Identity aims to develop an Open source Biometric Solution i.e. complete set of tools and libraries for Biometric identifiction systems.
This project has intial code done by students as their summer project at Echo IT Labs Pvt. Ltd.
Please note: not having time to complete jSai myself; I came across the ACEGI project which I now recommend instead.
jSai; a Servlet Authentication Implementation. jSai aims to allow easier to use, more powerful authentication for Java Servlets.
PACIE (Perl Analysis Console for Intrusion Events) Attempts to be a complete replacement for ACID. Place this cgi script on your internal webserver and receive powerfull reporting on your current snort database.
Secrets is a complete, standalone, personal encryption solution that works much like PGP (Pretty Good Privacy). With Secrets you can encrypt information before emailing it to a friend or coworker, or before storing it on a removable disk. Secrets is buil
trafanal monitors your complete network offering realtime statistics who sends/recvs how much packets/bytes from whom
its a really good placed on a router, showing you who takes which bandwidth, and who made how much traffic
The sandbox system call API is a simple yet powerful mechanism for
confining untrusted code. It is similar to chroot() and BSD jails, but has
much greater flexibility and expressive power. The code is mostly complete
but not yet fully functional.
bns is a network simulator.
You can create a complete network, add services to host, ... It can be usefull to study network behavior, make presentations, learn hacking techniques, ...