Showing 444 open source projects for "java open source"

View related business solutions
  • Vibes don’t ship, Retool does Icon
    Vibes don’t ship, Retool does

    Start from a prompt and build production-ready apps on your data—with security, permissions, and compliance built in.

    Vibe coding tools create cool demos, but Retool helps you build software your company can actually use. Generate internal apps that connect directly to your data—deployed in your cloud with enterprise security from day one. Build dashboards, admin panels, and workflows with granular permissions already in place. Stop prototyping and ship on a platform that actually passes security review.
    Build apps that ship
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 1
    snavtclient is free open source network client program for CCTV security surveillance digital video recorders (DVR) manufactured by the AV TECH Corporation. For more information please see software web site: http://snavtclient.epipe.com/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    This is is a modular, test driven website that tries to break web clients of all kind. If you are developing applications that interact with websites you might want to throw it at this website first and see if it survives.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    a perl script to perform Vigenere (polialphabetic enciphering and deciphering) for teaching classes. Keys are stored in a dedicated file in order to have a one time pad to use for messages exchange.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    inundator is a tool used to anonymously inundate intrusion detection logs with false positives to obfuscate a real attack, leaving the IDS analyst feeling completely inundated.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Total Network Visibility for Network Engineers and IT Managers Icon
    Total Network Visibility for Network Engineers and IT Managers

    Network monitoring and troubleshooting is hard. TotalView makes it easy.

    This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
    Learn More
  • 5
    FWAuto is a Perl script and should work on any system with Perl installed. Provide the running config of a PIX firewall to fwauto. It will analyze and give you a list of weak rules in your rule base and store the result in multiple output files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    ENCAM is an asset management database and configuration backup tool for Cisco network devices. ENCAM pulls configuration data from devices, stores it, reports changes, analyzes configuration defects, generates asset lists and compliance reports.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Scripts to run Nmap and analyze results in very large networks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Ourmon is a network monitoring and anomaly detection system and displays the data for multiple BPF expressions via RRDTOOL-based graphs. It also helps the user identify various kinds of network anomalies using various flow analysis tools and logging.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    NetCop UTM with Secure Wi-Fi HOTSPOT
    NetCop is UTM, UTM Firewall, ClamAV Antivirus, Web Cache, Content Filter,IPS/IDS, WAN Link Manager, Bandwidth Manager, Anonymous Proxy Blocker, Wifi Hotspot Controller, SSL VPN, Network Virtulization in single ISO CD distribution.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Upgrade your productivity with your own free AI Meeting Assistant Icon
    Upgrade your productivity with your own free AI Meeting Assistant

    Fathom records, transcribes, highlights, and summarizes your meetings so you can focus on the conversation. Get setup in minutes.

    Fathom records, transcribes, highlights, and summarizes your meetings so you can focus on the conversation. Get setup in minutes. When the call ends you have instant access to the call recording, fully transcribed, along with all of your highlighted moments. All recordings created with Fathom are 100% private. They can only be seen if you share your recordings or highlights with others. Show, not tell, with playlists of what “good” sounds like. Metrics help identify who needs help and who is outperforming. A unified view of all conversations with a customer or prospect. Simplify the handoff from sales to success and never lose any context if a team member departs. Reduce time your team spends on data entry with automated post-call data sync with your favorite CRM.
    Learn More
  • 10
    BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts coming from a SNORT IDS system.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 11
    Darkjumper.py Developed by : mywisdom & gunslinger_ This tool will try to find every website that host at the same server at your target Then check for every vulnerability of each website that host at the same server
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    SisyphusScan is a wrapper to malware scanners that can be used for cyclic scanning of files (i.e. accross several executions). The scanning process is optimized with a cache. Currently supports the clamd daemon from the ClamAV tools suite.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Kojoney is an easy of use, secure, robust and powerfull Honeypot for the SSH Service written in Python. With the kojoney daemon are distributeds other tools such as kip2country (IP to Country) and kojreport, a tool to generate reports from the log fi
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Development of libwhisker (a full-featured Perl library used for HTTP-related functions, including vulnerability scanning and exploitation).
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project
  • 15
    Set of perl scripts to analyse and check expiration of user certificates in Microsoft Windows Certification Authority. Output is in HTML with list of expiration state of latest user certificates. Expirated are marked. List can be sent by e-mail.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Advanced Perl script for DES password cracking. Might be handy for password QA. Brut-force, load Unix passwd/shadow, multi hash crack, input/output file, save/resume cracking state.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    EasyBSD is a modular automation script designed to assist in the extensive post installation process that is required in FreeBSD. The following are modules that are included with EasyBSD, Checks, Update, Security, Networking, Firewall, and more...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    Randomized packet generation for source mac, source ip spoofing. Any byte in a packet can be spoofed one by one packet generation. And provide a DDoS testing framework.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Cross Site Scripting Anonymous Browser (XAB) leverages web sites and client browsers to build a network of drones. It is not to replace the current anonymous browsing applications, but provides an alternative that does not require willing participants.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 20
    PFL can either operate as a stand-alone firewall log parser or set up to run and configure ipfw. The major focus is parsing, compressing, and filtering *NIX (to include Mac OSX) firewall logs generated by IPFW for quick and easy admin review.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    PHANTUM - Punch-Hole Access for NAT Traversal of UDP in a Module; Built on top of Samy Kamkar's 'chownat' script, PHANTUM allows for pure client-agnostic TCP services to be tunneled over UDP and hosted behind NAT infrastructures.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    This is a tool that has per objective to audit a system Unix. In order to make this procedure, this tool has verifications of configurations and variables of the Operating system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Simple Intrusion Detection System which monitors failed access (SSH and Dovecot) attempts. If hack attempt is detected above the configurable threshold level then a number of actions are taken to block the IP and alert administrators of the attempts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    This perl script merges two keepassx databases into one.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Yokoso is a project geared toward fingerprinting infrastructure. Yokoso will determine what web interfaces are available on a specific network.
    Downloads: 0 This Week
    Last Update:
    See Project