Search Results for "java compiler with source code" - Page 2

Showing 72 open source projects for "java compiler with source code"

View related business solutions
  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • 1
    Bias :: Versatile Information Manager
    Bias is a cross-platform versatile information management application / Organizer
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Google Authenticator OpenSource

    Google Authenticator OpenSource

    Open source version of Google Authenticator (except the Android app)

    Google Authenticator is the open-source counterpart of Google’s one-time passcode apps, implementing industry-standard OATH algorithms such as TOTP (time-based) and HOTP (counter-based) for two-factor authentication. The repository historically hosts code for mobile platforms like iOS and BlackBerry, demonstrating how to generate numeric codes locally without needing network access. Its core purpose is to help services and users add a second factor that’s simple to deploy yet resistant...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    JChecksum

    JChecksum

    MD5 Checksum Tool

    ... content. I have tried to keep the file size to a minimum. And currently, the file size is 20.7 kB (20,701 bytes). Anyone can inspect the source code and use it to modify, develop and redistribute.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    BTCore

    A Collection of Useful Java/Swing Code

    NEWEST FEATURE ---------- Added one line ".zip" extraction to Util class! Added one line ".zip" extraction from URL (web) and one line file download from URL! BTCore is a library that was designed to be used with all of Banotech's software. It includes a tremendous amount of code snippets and classes that have been boiled down to allow ease of use by everyone. BTCore is, and always will be FREE. It has tools that we scrapped together over our last few projects, and that we found were...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    CryptoToolsPack

    CryptoToolsPack

    Basic encode/decode, files comparison and protect sensitive data

    This pack includes the following: FCSG - generate checksum and perform file comparison; JCryptoTool - encrypt/decrypt messages and files; JWallet - password protect sensitive information. See Help menu in each application, Source code included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Mobile-ID USAT applet

    Mobile-ID USAT applet

    The Remarc Mobile-ID USAT applet

    The Remarc Mobile-ID USAT applet this is a JavaCard applet with USIM Application Toolkit menu support. Basic functions of the Remarc Mobile-ID SAT applet: • Authentication function; • Signing function; • Changing PIN1/PIN2; • Changing PUK; • Unblock PIN1/PIN2; • View information - in a USAT menu is present a menu item with information of PIN usage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    FACPL - Access control policies

    FACPL - Access control policies

    A Java library for Attribute-based Access Control Policies

    FACPL: a Java-based library for the specification and enforcement of Access Control policies - Attribute-based Access Control Policies - Advanced features for the management of, e.g., combining algorithms and missing attributes - Generation of XACML code starting from FACPL code - Generation of FACPL code starting from XACML code Source Code: https://github.com/andreamargheri/FACPL/
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    Web Application Protection

    Web Application Protection

    Tool to detect and correct vulnerabilities in PHP web applications

    WAP automatic detects and corrects input validation vulnerabilities in web applications written in PHP Language (version 4.0 or higher) and with a low rate of false positives. WAP detects the following vulnerabilities: - SQL injection using MySQL, PostgreSQL and DB2 DBMS - Reflected cross-site scripting (XSS) - Stored XSS - Remote file inclusion - Local file inclusion - Directory traversal - Source code disclosure - OS command injection - PHP code injection WAP is a static...
    Downloads: 27 This Week
    Last Update:
    See Project
  • 9

    java-sandbox

    Securly execute untrusted code from within your application.

    The java-sandbox allows you to securely execute untrusted code (for example, user generated scripts in scripting languages such as groovy or rhino) from within your application. It allows you to specify resources and classes that may be used by the code, thus, separating the execution from the application's execution environment. It allows to wrap execution environments in threads or even execute them remotely on different jvms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    BinaryCrypt

    BinaryCrypt

    Binary Conversion Calculator

    With BinaryCrypt, you can convert between regular text, binary, hexadecimal, octal decimal and decimal. You can convert only decimal (as of right now) to any base up to base 64. You can also save your converted text to a file or open a converted text file to decrypt the message, and perform basic arithmetic in binary. The git repo for the C# code is located at: https://github.com/m1r4g3/BinaryCrypt-.Net
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    This is a apache v2.0 authentication module. Based on html form authentication and cookie authentication session. Cookie session are stored in memcache deamon. Can be used has an simple "Single Signe-On" (SSO). All the code source and the bug tracking has migrated to github: https://github.com/ZenProjects/Apache-Authmemcookie-Module All the documentation are here: https://zenprojects.github.io/Apache-Authmemcookie-Module/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    OWASP JSEC CVE DETAILS
    OWASP JSEC CVE Details is is an opensource application developed in Java that is used to know about details of CVE , current CVE releases and also search exploits and proof of concept. https://www.owasp.org/index.php/OWASP_JSEC_CVE_Details [Features] [+] Fetch Recent CVEs [New Features included in v2.0] [+] Search for vulnerabilities of different platform/application/categories [+] Search CVEs [+] Search POC & Exploits Project/Source Code : http://dibsy.github.io...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    BTS Pentesting Lab

    BTS Pentesting Lab

    BTS Pentesting Lab - a deliberately vulnerable Web application

    BTS PenTesting Lab is an open source vulnerable web application, created by Cyber Security & Privacy Foundation (www.cysecurity.org). It can be used to learn about many different types of web application vulnerabilities. Currently, the app contains the following types of vulnerabilities: *SQL Injection *XSS(includes Flash Based xss) *CSRF *Clickjacking *SSRF *File Inclusion * Code Execution *Insecure Direct Object Reference *Unrestricted File Upload vulnerability *Open URL...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 14
    ISC - The ISAAC Stream Cipher

    ISC - The ISAAC Stream Cipher

    ISC lets you encrypt & decrypt text and files of any type up to 4GB

    ISAAC is a cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It was developed by Bob Jenkins from 1993-1996 and placed in the Public Domain. ISAAC is fast - especially when optimised - and portable to most architectures in nearly all programming and scripting languages. After more than 20 years of existence ISAAC has not been broken, and the little program you have here allows you to use it to encrypt and decrypt text of arbitrary length, files of any...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15

    CryptoX

    AES Encryption Program

    v2.0.0 (Latest) ---CHANGE LOG--- v1.0.0 - Original Release v1.0.1 - Source Code Cleanup v2.0.0 - Now Features File Encryption Protect your privacy! Encrypt your messages and files with a cryptographic strength of up to 256 bits before sending them to others!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    innocence-java

    Replace text with POS equivalent text, in a reversible fashion.

    .... It also relies on the sender and receiver having a shared (identical) vocabulary file. The project contains code to test input sentences for inclusion of words in the current vocabulary, and can create entries for new words as needed. The vocabulary has a "MD-5 hash" value to make sure that the share vocabulary file is identical for both sender and receiver. The software also contains a "bad-words" list of words that should never be generated in the text to be sent.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Java Sandbox Library

    Runs untrusted code in a safe, sandboxed environment easily.

    This library helps developers easily run untrusted code in a safe, sanboxed environment. It's easy to use and is similar to Java's existing "AccessController.doPriviledged()" methods, so users who are familiar with the standard Java class will already be able to use the library. It is extremely customizable, so you can fine-tune exactly which permissions you wish to grant your untrusted code. It also includes many classes to to the hard work for you and has support for multi-threaded...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    The Open Web Application Security Project (OWASP) software and documentation repository.
    Downloads: 21 This Week
    Last Update:
    See Project
  • 19
    web4thejob.org

    web4thejob.org

    Open source to productivity

    Web4thejob is an open source java framework for the rapid development of data-centric web applications. It is ideal for those who seek a component-based event-driven full-stack web development framework, capable of producing elegant desktop-style web applications that can automate any business domain. The framework addresses the automation needs of any business domain introducing "joblets". A joblet encapsulates the relational schema of a business domain using modern orm technology. Joblets...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    Digital signing using a Smart Card

    Java code that enables you to sign documents using a smart card.

    With this library, you'll be able to access a smart card and extract its information. If the smart card contains a key store, you can use it to create digital signatures. This library currently implements signing of PDF documents using the Belgian eID.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Codegroup

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    Codegroup is a Java application that will allow one to convert binary (or text) computer files in to 5 letter codegroups for transmission over email, landline telephones, radioteletype or Morse Code. Codegroup has internal error correction & limited cryptography capabilities. Codegroup : ZZZZZ YBPIL AIAIG FMOPP CPAAA DGNGP GPGPA ADNJN ELJKO ELIMO GEOHF KIFGP IFBCB PKCPI YJMHE PHBHP PPOBH NCOHD AKLLL AGHFP DEGEF LKELC EAIJI ABAGP AHPPO IHHPH OHPDF YNFPB ALEPO KMPKP Once this program...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22

    The ASN.1 Compiler

    Go to github.com/vlm/asn1c for the latest version.

    This ASN.1 compiler turns ASN.1 specifications into C code. The asn1c is shipped together with conformant BER/DER/XER/PER codecs. The X.509, GSM TAP3, MEGACO, RRC and LDAP encoding and decoding examples are part of the source code distribution. NOTE: THE asn1c PROJECT HAS LARGELY MOVED TO GITHUB: http://github.com/vlm/asn1c
    Downloads: 2 This Week
    Last Update:
    See Project
  • 23
    Maroniecoder

    Maroniecoder

    Encrypt a text through a list of encryption methods

    I came to the conclusion that this program is not worth the time for further development. Use different Encryption methods with parameters to en- or decrypted a text through the list With downloadable source-code since 1.3 You need to have Java installed http://www.oracle.com/technetwork/java/javase/downloads/index.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    CesTa (Code Enhancing Security Transformation and Analysis) is a tool for enhancing security by program transformations. Focused on Smart Cards (Java Card in particular), powered by Ant, ANTLR and StringTemplates.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Using encryption to secure your code or text. Click File->Run to run your code using Ruby, see the pop up for output. Never save your text or code to disk unencrypted. Don't forget your password. Encryption is error-persistent.
    Downloads: 1 This Week
    Last Update:
    See Project