We can briefly define HDIV as a Java Web Application Security Framework. HDIV extends web application frameworks behaviour (Struts 1.x, Struts 2.x, Spring MVC) in order to avoid most common web application security vulnerabilities
An Open Source Key logger Created in Borland Delphi 7.
Supports any Operaring System, and safest of it's kind.
It's unique and untraceable, use it for anything you can imagine.
A Javascript implementation of the Blowfish Encryption Algorithm described by Bruce Shneier circa 1993. Blowfish is a keyed, symmetric block cipher common in cipher suites and was placed, by Mr. Shneier, in the public domain.
Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
Peruggia is designed as a safe, legal environment to learn about and try common attacks on web applications. Peruggia looks similar to an image gallery, but contains several controlled vulnerabilities to practice on.
Common role (ComoRo) lets you manage all roles for your applications in a centralized way, being the natural extension to single-sign-on (sso).
Comoro recommends the use of a SSO system, like CAS.
The principal target of Segovia is to generate reports for a set of Security Testing tools. This reports show the different found vulnerabilities in a graphical way. Also they explain the most common reasons and the solution of these vulnerabilities.
Orizon is a framework intended to provide tools and facilities to test java sources for security flaws. The main goal is to detect common threats as described in Owasp top 10 vulnerability document.
The IEEE 1619 Committee open-source reference implementations of encryption algorithms, plus testing and certification suites, for each encryption algorithm included in the standard.
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.
Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
This is a simple app, created around an original sudoku solver based only on heuristics, not brute force. It's coded in Java/SWT(GUI toolkit). It's an example of MVC and of Visitor, Observer, Strategy, Abstract Factory, Singleton Design Patterns.
You can compute what you have in common with untrusted parties, without disclosing what you have. This is an implementation of a cryptographic protocol that is tailored for privacy-preserving set intersection.
Skavenger analyzes HTTP traffic logged by various Web proxies (including WebScarab and Burp) for indications of common web vulnerabilities such as XSS, CRLF injection and various kinds of information disclosure.
The Solitox Community system provides an integrated real-time chat service, web interface, and a scalable infrastructure for adding more services with common credentials. These interfaces allow a greater level of communication for your users.
Ex-Tip is a proof-of-concept project to demonstrate the utility of a portable, extensible forensic timeline framework written in Perl. Common modules are supplied, and the simplicity of the framework enables creation of new modules in the field.
ToolME provides J2ME mobile application developers with a set of API utilities (tools) that aim to solve many of the common problems a J2ME developer will face when developing mobile software.
MISec is a feature of the LAMPSecurity.org site. It is designed to release open source security training projects, consisting of virtual machine images demonstrating common Linux, Apache, PHP, and MySQL weaknesses that can lead to compromise.
InstantNSM simplifys Sguil deployment by providing pre-tested software components, and by automating common adminstrative tasks. With InstantNSM, Sguil deployment will be nearly a turnkey solution.
OpenSIMS 2.0 is coming. It will provide a services layer for tying together various security tools into a common collaborative framework taking "Community Centric Security" from dream to reality. 1.0 is still available, but with no upgrade path to 2.0.
ghash is a simple file hashing program with a GTK interface. It currently supports multithreaded hashing of files into MD5, SHA1, GNUnet. It is meant to be become a drag and drop version of the common commandline hashing utilities.
WorkingCode gives you what the name says working pieces of codes in Java. We are talking about code snippets and full utility apps for Java and J2me. It's use is intended as a library.
An open source tool written in python, to easily manage the passwords of the accounts that you might hold in various websites.It is a small stand-alone tool that can remember your internet passwords in an independent, portable and transparent way.