Showing 13 open source projects for "applied"

View related business solutions
  • Top-Rated Free CRM Software Icon
    Top-Rated Free CRM Software

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
  • The Most Powerful Software Platform for EHSQ and ESG Management Icon
    The Most Powerful Software Platform for EHSQ and ESG Management

    Addresses the needs of small businesses and large global organizations with thousands of users in multiple locations.

    Choose from a complete set of software solutions across EHSQ that address all aspects of top performing Environmental, Health and Safety, and Quality management programs.
  • 1
    Keycloak

    Keycloak

    Identity and access management for modern applications and services

    ... individual applications. This means that your applications don't have to deal with login forms, authenticating users, and storing users. Once logged-in to Keycloak, users don't have to login again to access a different application. This also applied to logout. Keycloak provides single-sign out, which means users only have to logout once to be logged-out of all applications that use Keycloak.
    Downloads: 20 This Week
    Last Update:
    See Project
  • 2
    Traefik Forward Auth

    Traefik Forward Auth

    Forward authentication service. Google/OpenID oauth based login

    A minimal forward authentication service that provides OAuth/SSO login and authentication for the traefik reverse proxy/load balancer. Traefik prepends the namespace to the name of middleware defined via a Kubernetes resource. This is handled automatically when referencing the middleware from another resource in the same namespace (so the namespace does not need to be prepended when referenced). However, the full name, including the namespace, must be used when referenced from static...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    AIAST

    AIAST

    AIAST –An advanced interactive application security tool

    AIAST –An advanced interactive application security tool identifying vulnerabilities in both self-developed code and open-source dependencies. Seamlessly integrate into CI/CD and can be applied in both application development phase and application deployment phase. ZeroDay –A global company headquartered in the U.K., focusing on R&D of state-of-the-art application security testing tools. Shift left security, and build security into DevSecOps. Technical Details Identifying vulnerabilities...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    kraken.js

    kraken.js

    An express-based Node.js web application bootstrapping module

    ...; it configures a complete express 4 application. kraken loads configuration files, routes, and registers middleware so this directory is the path against all relative paths are resolved. The default value is the directory of the file that uses kraken, which is generally index.js (or server.js). Using environment suffixes, configuration files are applied and overridden according to the current environment as set by NODE_ENV.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Discover Multiview ERP: The Financial Management Revolution Icon
    Discover Multiview ERP: The Financial Management Revolution

    Reclaim precious moments with loved ones while our robust cloud accounting software streamlines your financial processes.

    Built for growing businesses and well-established enterprises alike, Multiview is a highly scalable and robust ERP.
  • 5
    SSH MITM

    SSH MITM

    SSH man-in-the-middle tool

    This penetration testing tool allows an auditor to intercept SSH connections. A patch applied to the OpenSSH v7.5p1 source code causes it to act as a proxy between the victim and their intended SSH server; all plaintext passwords and sessions are logged to disk. Of course, the victim's SSH client will complain that the server's key has changed. But because 99.99999% of the time this is caused by a legitimate action (OS re-install, configuration change, etc), many/most users will disregard...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    miniPHP

    miniPHP

    A small, simple PHP MVC framework skeleton that encapsulates a lot of

    ... it in any of your projects. It's indented to remove the complexity of the frameworks. I've been digging into the internals of some frameworks for a while. Things like authentication, and authorization that you will see here is not something I've invented from the scratch, Some of it, is aggregation of concepts applied already be frameworks, but, built in a much simpler way, So, you can understand it, and take it further.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    KMIP4J

    KMIP4J

    Open Source Implementation of KMIP 1.0 in Java

    The Key Management Interoperability Protocol (KMIP) defines the communication between a Key Lifecycle Management System (KLMS) and its clients. Some companies have been working with proprietary implementations of KMIP in different programming languages for a while, but up until now, no open-source solution existed. KMIP4J is an open-source implementation of KMIP 1.0 in Java. This software was developed by Stefanie Meile and Michael Guster at the University of Applied Sciences "NTB...
    Leader badge
    Downloads: 9 This Week
    Last Update:
    See Project
  • 8
    Codegroup

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    Codegroup is a Java application that will allow one to convert binary (or text) computer files in to 5 letter codegroups for transmission over email, landline telephones, radioteletype or Morse Code. Codegroup has internal error correction & limited cryptography capabilities. Codegroup : ZZZZZ YBPIL AIAIG FMOPP CPAAA DGNGP GPGPA ADNJN ELJKO ELIMO GEOHF KIFGP IFBCB PKCPI YJMHE PHBHP PPOBH NCOHD AKLLL AGHFP DEGEF LKELC EAIJI ABAGP AHPPO IHHPH OHPDF YNFPB ALEPO KMPKP Once this...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Java implementation of Shamir's Secret Sharing algorithm as described in Applied Cryptography [as LaGrange Interpolating Polynomial Scheme].
    Downloads: 1 This Week
    Last Update:
    See Project
  • Intelligent network automation for businesses and organizations Icon
    Intelligent network automation for businesses and organizations

    Network automation for the hybrid multi-cloud era

    BackBox seamlessly integrates with network monitoring and NetOps platforms and automates configuration backups, restores, and change detection. BackBox also provides before and after config diffs for change management, and automated remediation of discovered network security issues.
  • 10
    "Dynamic Behavioral Attestation for Mobile Platform", Objective of Project is to develop a dynamic remote attestation technique for diverse computing environments enabled by mobile platforms and to implement remote attestation on mobile platforms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Hardening Moodle Project of Fachhochschule Gießen Friedberg - University of Applied Sciences. Contains of two Plugins for the eLearning-System Moodle (moodle.org) (#1) Intrusion Detection & Prevention System (#2) Suhosin-Extension-Administration
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The Secure Java Code Filter (SJCF) provides an ICAP-based filter mechanism for mobile Java code and the signatures applied to it. Administrators can define a centralized policy determining which applications and signatures respectively are allowed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    viewstate is a decoder and encoder for ASP .Net viewstate data. It supports the different viewstate data formats and can extract viewstate data direct from web pages. viewstate will also show any hash applied to the viewstate data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next