Showing 68 open source projects for "java open source"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Dun and Bradstreet Connect simplifies the complex burden of data management Icon
    Dun and Bradstreet Connect simplifies the complex burden of data management

    Our self-service data management platform enables your organization to gain a complete and accurate view of your accounts and contacts.

    The amount, speed, and types of data created in today’s world can be overwhelming. With D&B Connect, you can instantly benchmark, enrich, and monitor your data against the Dun & Bradstreet Data Cloud to help ensure your systems of record have trusted data to fuel growth.
    Learn More
  • 1
    This software is a set of tools that hides C source code in txt files. Also the software is able to restore the txt files to C source code again. This work is based on the tool c2txt2c by Leevi Martilla. Csteg needs a book file in txt format to hide C so
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    What is a Protocol Debugger? Conditionally break based on BPF filters, modify protocol contents on the fly. Build custom actions that let you manipulate how you speak on the network. Or manually edit protocol fields and send the packets along.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    The CredentialCompiler suite compiles the site credentials in grid environments from several LDAP databases. It is possible to feed the credentials in both UNICORE- and Globus-based systems, based on site-specific rules.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    HoneyC is a low interaction client honeypot / honeyclient that allows identify rogue servers on the web.
    Downloads: 0 This Week
    Last Update:
    See Project
  • The Most Powerful Software Platform for EHSQ and ESG Management Icon
    The Most Powerful Software Platform for EHSQ and ESG Management

    Addresses the needs of small businesses and large global organizations with thousands of users in multiple locations.

    Choose from a complete set of software solutions across EHSQ that address all aspects of top performing Environmental, Health and Safety, and Quality management programs.
    Learn More
  • 5
    OAproject implements a plataform to allow applications to interact. Apps using the platform send/receive messages through a message oriented middleware. Main features are a Single Sign On (SSO), Identity Management System (IMS) and a provisioning system
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Open Identity Management (OIDM)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    RubyHtpasswd - Htpasswd apache files class writen in Ruby language Features: - Add Users - Change Password - Rename users - Delete users - Display errors messages - Get encrypted passwords from the file - Get an users list
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    xmlsig is a multi-language, multi-platform implementation of XML signatures.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    FatNS Analyzes and Tests Name Servers. It is a PCAP-based security tool intended to sniff and detect common attacks on the DNS system, and is designed to be easily expandable with additional attack detectors.
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-First Supply Chain Management Icon
    AI-First Supply Chain Management

    Supply chain managers, executives, and businesses seeking AI-powered solutions to optimize planning, operations, and decision-making across the supply

    Logility is a market-leading provider of AI-first supply chain management solutions engineered to help organizations build sustainable digital supply chains that improve people’s lives and the world we live in. The company’s approach is designed to reimagine supply chain planning by shifting away from traditional “what happened” processes to an AI-driven strategy that combines the power of humans and machines to predict and be ready for what’s coming. Logility’s fully integrated, end-to-end platform helps clients know faster, turn uncertainty into opportunity, and transform the supply chain from a cost center to an engine for growth.
    Learn More
  • 10
    Download code, Learn code, Share code. The Ongoing Object-oriented Perl Project. scripts, tutorials, modules, case studies, anything OOPerl --not excluding contributions of OO discipline in other programming languages.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Tattoo will provide a set of command-line scripts for analyzing raw tcpdump files or ASCII hexadecimal representations of network traffic to identify format, function, and communication model.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The purpose of SNX is to have a modular series of components that report back to a central repository and 'AI' for pattern recognition and anomoly detection. This is to help with IDS systems, and to move to the next generation of security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The Registry Server (jUDDI) offers a mechanism for humans or software applications to advertise and discover Web services. The Java Web Services Developer Pack (Java WSDP) Registry Server implements Version 2 of the Universal Description, Discovery and I
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    Security analysis tools produced by The Ohio State University Network Security Group.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    LinuxBSM-2 introduces auditing features in Linux kernel to achieve better security and keep an eye on system activities. Any kernel-derived data can be audited.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Terrier is a RBAC framework, business oriented and with focus on manageability and access control. Integrating all company tecnhnologies (java, ruby, delphi and others). The owner of a system can manage and delegate manageability to the systems, reducing
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Cryptopus
    Cryptopus is a ruby on rails web application for storing and sharing passwords and other sensitive data. All data is stored encrypted in a database, safe from third party access.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Unsploitable

    Automatically Patch Metasploitable Vulnerabilities

    Unsploitable is an emergency patcher, providing critical security patches and updates for commonly exploited vulnerabilities in common operating systems, services, and applications. Unsploitable specifically targets exploits provided by penetration testing frameworks such as Metasploit. Unsploitable is tool for the Metasploit Framework. Unsploitable should work with any MSF product (including: OpenSource, Express, or Pro).
    Downloads: 0 This Week
    Last Update:
    See Project