Showing 549 open source projects for "using"

View related business solutions
  • Retool your internal operations Icon
    Retool your internal operations

    Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.

    Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
    Build an app in Retool
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • 1
    Lib/Framework for using SmartCards in Qt
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Authen::Simple::WebForm - Perl library for simple authentication against existing web based forms using Authen::Simple framework.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    SGJabSh allows you to execute commands remotely using Jabber conversation with daemon. It provides strong privacy and authentication security support (via Off-The-Record and Socialist Millionaire Protocol).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    RSAmake

    RSAmake

    An Cryptography software with RSA algorithm

    An Cryptography software with RSA algorithm RSAmake using Python and WxPython written
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5
    Cumulus4j is an encryption plug-in for DataNucleus. Applications can thus use JDO or JPA to persist their data into every common database. Using the Bouncy Castle cryptography libs, it provides strong encryption via AES, TwoFish or other algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    PasswordGeneratr

    A tool for creating safer passwords

    PasswordGeneratr creates a random password using capital letters, lowercase letters, '!' and '@' and spaces. It is created with batch files. Using this program will make your password uncrackable against hacking tools using a dictionary attack, and make other forms of password cracking incredibly difficult.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    tickets

    pythonic kerberosish ticket system: easy to use, easy to subclass

    A SecureTicket, or Ticket, consists of salt, hash, valid_until, public_flags, flags, data and "invisible" hashed entropy. Tickets are symmetrically signed using SHA256-HMAC. Fields 'valid_until', 'flags' and 'data' may be optionally encrypted using AES128-CBC or TripleAES128-CBC. Values 'data' and 'entropy' may consist of arbitrary objects which are transparently pickled(serialized), optionally gzipped and of course securely signed. Specific implementations are included: FormTicket: provides core implementation of state-less Cross Site Request Forgery protection. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Store Pass

    Password storing with password generator

    ...It needs some encryption on the password files. I haven't implemented this feature yet, but I am planning on it. Also trying to get the FTP upload ability done right. If you are planning on using it, please read the README file enclosed in the installer.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    ANPR for National Borders

    ANPR for National Borders Systems

    The idea is to enhance and develop the national border crossing process by the integration of automated vehicle recognition while crossing country borders. i'm going to use Automatic number plate recognition (ANPR): a system that recognizes the numbers of the vehicle plates by using OCR (optical character recognition) technology and Infrared cameras. This is going to be achieved by taking the license plate image from the camera and processing it using the software I’m going to develop together with an open source OCR system. The output is going to be a text version of the plate number. Then it is going to retrieve that number from a database and get the information of the vehicle owner. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Yeastar: Business Phone System and Unified Communications Icon
    Yeastar: Business Phone System and Unified Communications

    Go beyond just a PBX with all communications integrated as one.

    User-friendly, optimized, and scalable, the Yeastar P-Series Phone System redefines business connectivity by bringing together calling, meetings, omnichannel messaging, and integrations in one simple platform—removing the limitations of distance, platforms, and systems.
    Learn More
  • 10
    MD5-utils
    MD5-utils is a script for MD5 hash function manipulations. It can crypt one or more word(s) and try to crack one or more hash(es) using online servers.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11

    Cryptkeeper

    Cryptkeeper Secuirty tool

    ...some uses encryption keys and some dont. there are AES , 4DES , RC2 , RC4 , MD5 , SHA1 , SHA2 , SHA3 , SHA4 , XoR , Crypt , HeX , BINARY , Rijndael 256 , Obfuscation String , RSA , BASE64. The password manager anything saved WILL NOT BE ENCRYPTED so it is smart to protect the program from others not using it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    pwdex

    Web-based password exchange, sharing and storage system.

    Web-based password exchange, sharing and storage system. It has 2 types of passwords: private and shared. Shared ones can be shared to individual users or to groups of users. The system is written in Ruby using Sinatra framework. Storage backend is any database (e.g. MySQL, sqlite), encryption is done via AES-256.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Using encryption to secure your code or text. Click File->Run to run your code using Ruby, see the pop up for output. Never save your text or code to disk unencrypted. Don't forget your password. Encryption is error-persistent.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    ...German/Austrian ID-card and passport). It can check the numbers for correctness. Also it can extract information from the numbers (e.g. birthday) or generate numbers using custum values.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    Project Aristotle
    Project Aristotle (formerly the Identity Governance Framework (idgov) project) is an openLiberty.org project that enables developers writing applications using identity-related information to access information in a multi-protocol environment supported.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    pyshot, windows session recorder/auditor
    pySHOT is a session recorder for windows. (soon linux session recorder also) It's a client/server python app using gearman. To use pyshot you must install pyshot-client from https://sourceforge.net/projects/pyshot-client/ on monitored server
    Downloads: 3 This Week
    Last Update:
    See Project
  • 17
    MUTE is a secure, anonymous, distributed communications framework. Node-to-node connections are encrypted, and messages are routed using an ant-inspired algorithm. The first MUTE-based app supports anonymous file sharing.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 18
    The Password tools bundle is one application combining three tools - the Analyser (shows the "strength" of your password, the Generator (generates "strong" passwords) and the Manager (stores passwords securely using Rijndael).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    w3pw is a web based password management console written in PHP and using a MySQL Database as storage for the encrypted (using MCrypt) password information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    ARP Poisoning - Show denial of service and man in the middle attacks using raw socket in c http://proxytype.blogspot.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    An open, all-in-one SMTP gateway, scanning your email traffic in order to prevent spam and viruses, using several anti-spam technologies. Based on Ubuntu Server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Java Home Monitor Application
    This application is used to monitor your home via email / FTP using USB camera and microphone , there is a lot of configurations to customize it upon needs. A motion detection is also supported. More info, in my blog http://osama-oransa.blogspot.com/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Hexjector is an Opensource,Cross Platform PHP script to automate Site Pentest for SQL Injection Vulnerabilties.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    ModRWLBF stands for ModRW Logical Brute Force. It's a tool designed to help penetration testers identify rewrite rules used by webservers using logical methods as well as pure bruteforce.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Heuristic password brute force cracking. Project blather attempts to find a middle ground between brute force password cracking and dictionary attacks using language heuristics.
    Downloads: 0 This Week
    Last Update:
    See Project