Showing 1267 open source projects for "mchange-commons-java"

View related business solutions
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    PasswordGenerator

    PasswordGenerator

    A free Password Generator written in Java

    next version is 2.4.6
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    Safe Password Generator

    random + bigger password + more combinations = safe password

    Safe Password Generator is a program which generates safe password according to your needs. With Safe Password Generator you can- 1. Generate password from 1 to 25 length. 2. You can make any combination of upper case, lower case, numbers and special characters as per your need. 3. And most importantly- random + bigger password + more combinations = safe password
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Unlocker

    Unlocker

    use to crack the process "StudentMain.exe"

    use to crack the process "StudentMain.exe" so that the teacher can't control your PC
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    totp-me

    totp-me

    TOTP authenticator for Java ME

    Not only a Google authenticator for 2-step verification for Java ME enabled phones. This is MIDlet-1.0 implementation of RFC 6238 authenticator - TOTP: Time-Based One-Time Password Algorithm. It's quick, simple and it supports multiple profiles.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 5
    The OCIL Interpreter is a standalone Java GUI implementation that demonstrates how an OCIL document can be evaluated. It guides the end user in completing questionnaires (one question at a time), viewing and computing results.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    ImageLock
    ImageLock ist ein Programm mit dem man Dateien und Ordner hinter jpg-Bildern verstecken und verschlüsseln kann.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Swf Reader

    Swf Reader

    Adobe Flash SWF file reader, editor

    Adobe Flash SWF editor which can read and edit bytecode.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 8
    ScreenShotCapture

    ScreenShotCapture

    Takes a screenshot every set amount of time

    Can hide in background and take a screenshot of your desktop every so often. The time period is set by the user at the start and keeps capturing until the user stops the program. All captures will be saved in a directory on the users computer and easily accessible with the click of a button. *** Now has support for multi monitor displays ***
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    iGRA3

    Secure File Sharing

    Functional prototype for distributed secure file sharing based on standard cryptography, file operations and HTTP. Written in C# for .NET 4.5. Providers user interface and WebDAV access, client and server components.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    SerialVault

    SerialVault

    Store product serials in one easy to access place.

    SerialVault is a simple program which stores a product serial and an image of the serial for safety reasons. Ever needed to register a product or require a products serial number to claim on guarantee but find that you have lost the documentation meaning you couldn't. Well with SerialVault it stores them all one one place and can be accessed easily. This is also a good program to have if your devices get stolen, just show your serial and picture to the authorities and prove the device is yours!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Simplest Text Encrypter

    A simple example of polyalphabetic cipher in Java.

    Cryptography fascinates everyone. A variety of encryption techniques and ciphers are used to code important data. A polyalphabetic cipher is one of the simplest cipher one can make. This is a Java program to implement polyalphabetic cipher. [How the cipher encodes?] Input Data: helloaf Key: love l - 12th letter in Alphabet o - 15th letter in Alphabet v - 22nd letter in Alphabet e - 5th letter in Alphabet Now: h(l) e(o) l(v) l(e) o(l) a(o) f(v) Further: h(+12) e(+15) l(+22) l(+5) o(+12) a(+15) f(+22) where +(number) meaning shifting the character forward by the respective number of places. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    ICRON's Keyloger

    Version one of ICRON's Basic Keylogger

    This is just an extremely basic key-logger.The source code is up so have fun. This key-logger stores it's logs inside of a text file known as Logs.txt. Later versions will contain a couple perks. I will release them in the coming weeks. This is for educational purposes only. I do not condone any nefarious uses for said keylogger. DO NOT USE ON ANY SYSTEM THAT IS NOT YOUR OWN. Also you must inform all users of said computer (if their are multiple accounts) that you will be using said program....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Web Blocker

    Web Blocker

    Block Web Site

    Block Web site that you want to.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    MyPasswords

    MyPasswords

    Personal Password Manager

    What you need for managing your passwords, including the passwords of your online accounts, bank accounts and ... with the corresponding URLs. The passwords are encrypted by AES. Can be used on almost all operating systems including Windows & Linux.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A collection of pure Java payloads to be used for post-exploitation from pure Java exploits or from common misconfigurations (like not password protected Tomcat manager or debugger port).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    JaStaCry

    Java Stacked Crypto

    Java Stacked Crypto merges different hiding, merging and crypto stacks to secure files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Maroniecoder

    Maroniecoder

    Encrypt a text through a list of encryption methods

    I came to the conclusion that this program is not worth the time for further development. Use different Encryption methods with parameters to en- or decrypted a text through the list With downloadable source-code since 1.3 You need to have Java installed http://www.oracle.com/technetwork/java/javase/downloads/index.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    F-Talk P2P Encrypted Secure Voip

    F-Talk P2P Encrypted Secure Voip

    F-Talk cross-platform p2p encrypted secure voip software

    This project connect to two peers directly ( using without any central server, stun server ) together with 128bit encrypted secure voip communication. http://ftalk.armanasci.com/guide Spefications * Peer to peer direct connection without using any central dedicated server. ( First basic part of the security ) * 128bit AES Symmetric end-to-end encryption PCM datas. ( Second basic part of the security ) * 64bit Base64 Encoding transferred server side info. * Ipv4 and Ipv6...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    The Open Web Application Security Project (OWASP) software and documentation repository.
    Downloads: 52 This Week
    Last Update:
    See Project
  • 20
    INACTIVE STATUS: The Recommendation Tracker is not actively being developed. SUMMARY: The Recommendation Tracker facilitates consistent standardized (XCCDF, OVAL, CCE, CPE) guidance authoring through an established format for creating, developing, and tracking all information pertinent to security guide and benchmark generation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    chaOS41

    A cryptocurrency like Bitcoin improved upon with reality binding.

    There is a reason this project holds no code. chaOS41 is a cryptocurrency with reality binding. A given value of money was paid for a surface area the size of a flower pot. It was out of proportion. The chaoOS41 currency corrects that. It binds its value to reality. Its unit value is a ratio between money and land area.. When that ratio normalizes, the currency becomes available to the public. 1 more developer is wanted. For that you need inside access, which means...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Simple VB.Net Encryption software.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    PBM stealth

    Data hiding in bi-level pbm images

    Implementation of block parity for hiding data in bi-level pbm images in java. Increasing the security of stenography by using a random symmetric key for embedding and extraction of data from image. The project also has a PBM viewer in java and ascii viewer which shows the pbm images in ascii format.This project uses binary coded pbm images. Research paper : http://arxiv.org/abs/1304.1683 Key mechanism is not functional and program have bugs which are to be fixed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    BIG UPDATE RELEASED AT OUR NEW PAGE PROJECT: https://sourceforge.net/projects/tecknoguard/ AntiVirus ancora in fase sperimentale, la grafica è in stile Windows 8 molto bello con utility e una buona rilevazione con un ricco database di virus. Sito Ufficiale: http://adsoftwarepro.sitiwebs.com/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    eoss

    Role Based Access Control System

    Role Based Access Control System. ----------------- Developt Language: Java. ----------------- Framework Core: Spring3mvc,MySQL,jQuery,jQuery easyui,Mybatis. ----------------- Others: based on this project,for common web system,you do not need to developt access control system stand alone,you only need to developt your core business system.At last,create an user,create an role, create an permission, give the role the right permission, give the user the right role.That's all,an perfact web system done. ----------------- At last: any question,just contect me.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB