Showing 1267 open source projects for "mchange-commons-java"

View related business solutions
  • Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure Icon
    Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure

    Native application identity and user-based security for your Azure cloud

    Gain integrated visibility across all traffic in a single pass. Deploy Palo Alto Networks VM-Series to determine application identity and content while automating security policy updates via rich APIs.
    Get a free trial
  • Compliant and Reliable File Transfers Backed by Top Security Certifications Icon
    Compliant and Reliable File Transfers Backed by Top Security Certifications

    Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.

    Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
    Start Free Trial
  • 1
    Adzok Open

    Adzok Open

    Administrador Remoto

    Herramienta de Administración Remota opensource escrito en Java. Nota: El creador de este herramienta no se hace responsable del mal uso que le puedan dar a esta herramienta.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Hide my message

    Hide my message

    Hide your secret message into any type of files

    ...It was built using Java and Swing technology. It was published for educational use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Affliction X Cyber Shell Demo

    AFX Backdoor shell demonstration.

    Demo release of Affliction X webshell. Check us out on www.afflictionx.net
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    DENRIT

    DENRIT

    Perform anonymous and non-anonymous pentesting.

    DENRIT allows remote administration of anonymous networks (TOR, I2P and FreeNet). Also, contains a pentesting module to execute commands using a selected anonymous network, pentesting with TOR or TCP Follows a client/server model with well-defined communication interfaces. SSH is used to allow remote clients to access the machine and manage any anonymous network that is installed there, plus allows penetration testing anonymously (or non-anonymously) using tools such as Metasploit...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5

    FileEncoderDecoder

    File Encoder And Decoder

    ...The target machine should have Decoder.jar in order to reproduce it back to the original form. Decoder.jar decrypts an encoded file and regenerates the original file. Use : java -jar Encoder.jar java -jar Decoder.jar
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Zillya AVEngine SDK

    Zillya AVEngine SDK

    Antivirus engine that allows you to create your own anti-virus

    Antivirus engine with a set of virus databases and regular updates. Detects and cures all types of malware. Allows you to create your own anti-virus software without the creation of a personal virus lab, connect antivirus functionality to applications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    jEncrypt

    jEncrypt is a command line file encryption archiver

    jEncrypt is a command line file encryption archiver designed to help you encrypt files and directories into a single file archive.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    WAH Admin Finder+

    Admin Page Finder Perl script.

    A revision of an Admin page Finder perl script found online. We have added a new list of admin pages to search for and we also added hits logging to an external file to the script. This script is good for Penetration testers who wish to see if an Admin page is visible or easily found by intruders. Original Script found here: -------------------------------------- http://www.hackforsecurity.net/2012/01/admin-finder-perl-script.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Crypto

    Crypto

    Crypto - File encryption software

    Crypto is a new cryptographic software which uses common encryption algorithms among with a key word to protect your most valuable files! It now comes with a Console, which is the same as Crypto but with a more professional look.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 10

    Dynamic Proxy

    Fetches proxies from hidemyass and changes system proxy in real time.

    Programmer name : Daryl Varghese and Kishan Patel Dynamic Proxy/Madleets Proxy v1.0 is a dynamic proxy made for madleets.com. The proxy application fetches the best proxies from hidemyass.com and changes the system proxy configuration in realtime. Features: 1.It work on all windows systems(both32bit and 64bit) 2.It has no dependencies 3. Uses the wininet Api to change system proxy 4. It is less than 700kb 5. Proxy can be changed by either hotkey or userdefined time...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    CrackThis!

    CrackThis!

    Data Encrypton Software utilizing IMPACT

    We developed a classic solution that reflects the very nature of quantum mechanics in whole, ultimately demonstrating the raw power of numbers. We developed a truly irreversible one way algorithm which, when applied to information, both encrypts and decrypts it. That is to say that the algorithm which encrypts the information works in the same direction as the algorithm that decrypts it. This in itself is the very nature of quantum mechanics - "forward only". Through a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    ProcPewPew

    ProcPewPew

    Automatically Kills Processes

    ProcPewPew can be used to monitor the running processes on a system and kill unwanted processes automatically. Every 100 milliseconds, ProcPewPew takes a snapshot of the running process list and kills the processes that need to be shown who is the boss. CHANGELOG: v1.0 First release of ProcPewPew v1.1 Added newly created process logging
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    PortableSigner
    PortableSigner is a tool for digital signing (with X.509 certificates) of PDF files
    Downloads: 10 This Week
    Last Update:
    See Project
  • 14
    silvertunnel - Java lib+browser for TOR
    silvertunnel.org is a project that provides an end-user browser, a Java library and additional Java security tools to easily access anonymity networks such as the Tor (torproject.org) network. Secure and easy to use. Tor4Java and Tor Browser. Attention: see project status on page https://sourceforge.net/p/silvertunnel/discussion/962278/thread/83dc2d02/#
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    FroZenLight connects simple line art and mathematics. The source of light can be positioned so that either symmetric reflection patterns or secret messages (Cryptography) are created. Example light patterns and math exercises for education are provided.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    javawebutils

    web application utilities

    This library contains utility classes such as a converter from plain text to HTML (for safe inclusion of user-supplied text into web pages, avoiding XSS attacks, etc.), converters from binary to hex representation, and similar functions
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    MBMLog

    Log collector for FortiGate units (v4 MR3)

    MBM-Log allows to look deeply in collected logs (not only Top 10). All charts are generated on demand. You can easily filter data. MBM-Log can help you with FortiGate diagnostics via SSH (built in commands) Java GUI application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    AnnonCannon [Optimized Attack] Based Java [Loic]
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    FileEraser

    FileEraser

    Programm, um sicher Dateien zu löschen.

    Aktuelle Version 0.2.2013.111 Changelog: http://sourceforge.net/p/fravidofilekill/blog/ Ein Programm für das sicher Löschen von Dateien. Komplette Ordner mit/ohne Unterordner können gelöscht werden. License: Creative Commons (CC BY-ND 3.0) Namensnennung-Keine Bearbeitung 3.0 Unported (http://creativecommons.org/licenses/by-nd/3.0/deed.de)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    iAccess is a trust negotiation-based authorization service. It provides entities with the right to protect their own credentials and negotiate with remote (unknown) servers access to resources. iAccess works with X.509 and SAML standards.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    OAST - New OpenVPN GUI
    OAST is a cross-platform front-end (GUI) for OpenVPN-client, allowing to manage multiple. It's quite simple in use and provides base functionality such as monitoring connection status. Application is written in Java so it works on both Windows and Linux
    Downloads: 7 This Week
    Last Update:
    See Project
  • 22

    Password generator Java CUI application

    Password generator Java CUI application

    Password generator Java CUI application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Cryptex Box is an encryption software written in java for password storing. It's easy to use, very fast and small. Is cross platform (win, mac, linux) and does not require any installation process.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Secure user authentication system

    Secure user authentication system

    A really secure user authentication system in PHP and MySQL.

    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Turbo Shredder

    Turbo Shredder

    Turbo Shredder securely removes files.

    Do you want to delete some top secret files? DON'T do that by only pressing DELETE, because the data would still be on your drive! Use Turbo Shredder and remove files by securely wiping them out. Requires JRE 7 to run properly.
    Downloads: 7 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB