Showing 1139 open source projects for "dr java windows"

View related business solutions
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 1
    Project37 is a model-driven software application that uses an XML schema to generate security services which can be used to alter GUI forms or XML data sets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    This library has a package of useful methods to help the development of automated tests for Java applications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    IceNotes ME for Mobile Devices is an extremly usefull ;-) JAVA ME (J2ME) application to store all your important (text)notes on your mobile phone using "Twofish" encryption. Your notes are organized by assigning your own custom tags to your notes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    A tool to monitor internet hosts` bandwidth usage in a Linux-NAT network. A daemon collects data and clients display them (currently a Java applet with a graph). It automatically detects new hosts and has a nice summary statistic.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5
    Jaxseed processes XCCDF documents used for SCAP (NIST Security Content Automation Protocol) checklists. It performs benchmark resolution, i.e., the 6 "Loading" steps. Given an XCCDF document, it returns a resolved benchmark in the form of a DOM.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    jHashCalc is a GPL implementation of the popular hashing utility "HashCalc" from SlavaSoft. jHashCalc is written in Java language, and uses the GNU Crypto API to perform the algorithms' computing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    With this application you can hide files in a picture. Now the data are hidden in the picture and can be extracted with WinZip or an another Zip-Programm. Browse all Packages for all Releases: .Net and Java
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    VNEC is a tool to perform automated network experiments in a virtual environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Safe all your passwords and encrypt them with a single password? Yawn. Synchronize your encrypted entries between different machines? Without compromising your security? Here comes SyncYourSecrets
    Downloads: 0 This Week
    Last Update:
    See Project
  • Dun and Bradstreet Risk Analytics - Supplier Intelligence Icon
    Dun and Bradstreet Risk Analytics - Supplier Intelligence

    Use an AI-powered solution for supply and compliance teams who want to mitigate costly supplier risks intelligently.

    Risk, procurement, and compliance teams across the globe are under pressure to deal with geopolitical and business risks. Third-party risk exposure is impacted by rapidly scaling complexity in domestic and cross-border businesses, along with complicated and diverse regulations. It is extremely important for companies to proactively manage their third-party relationships. An AI-powered solution to mitigate and monitor counterparty risks on a continuous basis, this cutting-edge platform is powered by D&B’s Data Cloud with 520M+ Global Business Records and 2B+ yearly updates for third-party risk insights. With high-risk procurement alerts and multibillion match points, D&B Risk Analytics leverages best-in-class risk data to help drive informed decisions. Perform quick and comprehensive screening, using intelligent workflows. Receive ongoing alerts of key business indicators and disruptions.
    Learn More
  • 10
    This project has moved. Please see http://projects.darkaslight.com/ SAM is a near real-rime Snort alert monitor. SAM provides many ways to indicate that you may be experiencing an intrusion attempt on your network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Nikto FrontEnd (Nikto UI) is what we just wrap GUI to the all-time famous nikto.pl by Sullo (CIRT Inc).It usually takes several minutes(even hours) for a complete scan. When it's done, firefox will open and show the result.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    Un programa para cambiar el orden de las palabras en una frase o las letras de una palabra u otros algoritmos. Su principal objetivo es cambiar las frases para hacerlas mas ilegibles o para aparentar ser más friki en tus conversaciones o por diversi
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Pfyshnet is a public anonymous peer to peer network and file-system. Security is its primary concern, and it provides security for all aspects of participating nodes. It is one of the few network designs that provides strong anonymous keyword search.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    WFuzz FrontEnd (WFuzz UI) is what we just wrap GUI to the all-time famous wfuzz.py by edge-security.com which got its fame thanks to its multi-threading and flexibility to show desired results based on HTTP response codes/no. of lines/words.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    The GOLEM (Global Object Learning Enterprise Mediator) is a multi-module system for identity management purposes in an inter- and intra-university context. It supports eLearning applications in a very broad sense, i.e. including wikis and other web tools
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    A graphical tool for creating and checking MD5 and SHA-1 checksums. Comes with a convenient batch mode. Works also from the command-line. Written in Java/Swing as a comfortable tool for your file checks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Encrypti is a multi platform, easy to use encrypting tool for keeping your files secure. This application offers portability of encrypted files between various platforms. Secure your files with Encrypti!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    obov stands for OATH Based OTP validator. It's a 100% pure Java library that provides simple to use methods to validate (and related utilities) one time passwords generated by OATH compliant devices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    An encryption/decryption engine which can encrypt any file(text, pdf , doc, rtf , gpg , mp3 , mp4 etc..) or any data on your PC such that only you with the valid password can decrypt it.Also it will compress the file while encrypting it.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 20
    The Security Annotation Framework (SAF) is an instance-level access control framework and field-level encryption framework driven by Java 5 annotations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    With this system, a person can ask a yes/no-question to group of people while their answer is kept completely anonymous. The project is based on the dining cryptographers protocol.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    ToolME provides J2ME mobile application developers with a set of API utilities (tools) that aim to solve many of the common problems a J2ME developer will face when developing mobile software.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    A Steganographic Tool that lets u hide any file into any file. It is based on Image, Audio, Video Steganography that hides any file or message into an image(BMP,JPG,GIF), Audio/Video(MPG, WAV, etc) or any other file format(PDF,EXE,CHM etc..)
    Leader badge
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    NetBeans, pure Java. The Cryppie can protect your files by encrypting its content, possibility to compress files before encryption. It's destination for keep information in safe on your flash drive or another storage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Penny Post
    Penny Post is a system to combat spam emails by making the sender "pay for email" by spending a few seconds of computing time. Outgoing mail is marked with postage stamps that convince the receiver that the sender is genuine.
    Downloads: 0 This Week
    Last Update:
    See Project