Showing 3784 open source projects for "java open source"

View related business solutions
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place. Icon
    Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place.

    For healthcare Providers and Facilities

    Incredable streamlines and simplifies the complex process of medical credentialing for hospitals and medical facilities, helping you save valuable time, reduce costs, and minimize risks. With Incredable, you can effortlessly manage all your healthcare providers and their credentials within a single, unified platform. Our state-of-the-art technology ensures top-notch data security, giving you peace of mind.
    Learn More
  • 1

    jEncrypt

    jEncrypt is a command line file encryption archiver

    jEncrypt is a command line file encryption archiver designed to help you encrypt files and directories into a single file archive.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Livro sobre segurança da informação, cobrindo tópicos como: firewalls, IDSs, quebra de senhas, VPNs assim como técnicas para proteger as camadas de uma pilha TCP/IP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    FileEncoderDecoder

    File Encoder And Decoder

    Encoder.jar utility enrypts any file (containing text like .txt, .rtf, .html, .htm, .msg, .xml, etc.) and generates an encoded file. This encoded file may then be transferred via email or other medium from the source machine and can be decoded back to original on the target machine. The target machine should have Decoder.jar in order to reproduce it back to the original form. Decoder.jar decrypts an encoded file and regenerates the original file. Use : java -jar Encoder.jar java -jar Decoder.jar
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    w3af
    w3af, is a Web Application Attack and Audit Framework. The w3af core and it's plugins are fully written in python. The project has more than 130 plugins, which check for SQL injection, cross site scripting (xss), local and remote file inclusion and much more. This project has been migrated to github! See details in our project site: http://w3af.org/
    Downloads: 7 This Week
    Last Update:
    See Project
  • Cloud-based help desk software with ServoDesk Icon
    Cloud-based help desk software with ServoDesk

    Full access to Enterprise features. No credit card required.

    What if You Could Automate 90% of Your Repetitive Tasks in Under 30 Days? At ServoDesk, we help businesses like yours automate operations with AI, allowing you to cut service times in half and increase productivity by 25% - without hiring more staff.
    Try ServoDesk for free
  • 5
    Elemata CMS

    Elemata CMS

    Elemata is an open source content management system.

    Elemata is a free content management for personal use and commercial use at the moments. Elemata will provide you with the best CMS experience. Learn how to turn any html/css document into a theme at elematacms.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Cyberbit

    Cyberbit

    Visual Cryptography and Bit-Plane Complexity Segmentation in Python

    Hide secret messages in your pictures! Cyberbit lets you transmit a secret message to an intended person in a new manner. The secret message is an 1-bit deep black & white image. The message can contain written text, a drawing, a secret code etc. Using Visual Cryptography the application splits the secret message into two "shadow images" called <<shares>>. Any of the two shares will be embedded into a "normal" image file called by tradition <<vessel>>. You can use a method of hand to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Please note that the OVAL Test Content has been migrated to GitHub. You may now find the latest version of the OVAL Test Content at https://github.com/OVALProject/Test-Content. The OVAL Test Content is a set of OVAL Definitions that provides a simple way to test the capability of OVAL Definition Evaluators. After running the OVAL Test Content through an OVAL Definition Evaluator, the OVAL Results will show the user which tests are properly supported by that tool. This allows users to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    pup2p is a remaster of the Puppy Linux livecd distro and is aimed at use with the anonymous network I2P. It includes I2P as well as a number of I2P related apps. NOTE: The ISO is currently VERY out of date! Sorry for my absence. I may try to update the project soon. The SFS file IS up to date as of this change. 03/2013
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9

    Small Usb History Viewer

    This program allows you to explore the history of connecting usb drive

    This program allows you to explore the history of connecting usb drives after installing the system. Small size(19 kb with Gui). Very simple GUI. Export information to *.csv file. Enjoy!
    Leader badge
    Downloads: 4 This Week
    Last Update:
    See Project
  • Dun and Bradstreet Risk Analytics - Supplier Intelligence Icon
    Dun and Bradstreet Risk Analytics - Supplier Intelligence

    Use an AI-powered solution for supply and compliance teams who want to mitigate costly supplier risks intelligently.

    Risk, procurement, and compliance teams across the globe are under pressure to deal with geopolitical and business risks. Third-party risk exposure is impacted by rapidly scaling complexity in domestic and cross-border businesses, along with complicated and diverse regulations. It is extremely important for companies to proactively manage their third-party relationships. An AI-powered solution to mitigate and monitor counterparty risks on a continuous basis, this cutting-edge platform is powered by D&B’s Data Cloud with 520M+ Global Business Records and 2B+ yearly updates for third-party risk insights. With high-risk procurement alerts and multibillion match points, D&B Risk Analytics leverages best-in-class risk data to help drive informed decisions. Perform quick and comprehensive screening, using intelligent workflows. Receive ongoing alerts of key business indicators and disruptions.
    Learn More
  • 10
    PortableSigner
    PortableSigner is a tool for digital signing (with X.509 certificates) of PDF files
    Downloads: 24 This Week
    Last Update:
    See Project
  • 11
    An ncurses based password database client that is compatible with KeePass 1.x format databases.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 12

    The ASN.1 Compiler

    Go to github.com/vlm/asn1c for the latest version.

    This ASN.1 compiler turns ASN.1 specifications into C code. The asn1c is shipped together with conformant BER/DER/XER/PER codecs. The X.509, GSM TAP3, MEGACO, RRC and LDAP encoding and decoding examples are part of the source code distribution. NOTE: THE asn1c PROJECT HAS LARGELY MOVED TO GITHUB: http://github.com/vlm/asn1c
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    FroZenLight connects simple line art and mathematics. The source of light can be positioned so that either symmetric reflection patterns or secret messages (Cryptography) are created. Example light patterns and math exercises for education are provided.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    javawebutils

    web application utilities

    This library contains utility classes such as a converter from plain text to HTML (for safe inclusion of user-supplied text into web pages, avoiding XSS attacks, etc.), converters from binary to hex representation, and similar functions
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    OS Antivirus

    OS Antivirus

    La Protección En Tus Manos

    Over Security Antivirus es una herramienta de seguridad publicada bajo licencia GNU que permite eliminar software malicioso del ordenador (como virus, spyware o adware) y que cuenta con un sistema de actualizacion del cliente que mantienen al dia la ultima version del cliente. Además, permite la opción de integrarse con version de windows xp,vista7 de 32x 64x y 86x, con lo que controlarás la entrada de virus en tu ordenador vía Internet, una de las mayores formas de transmisión de...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    silvertunnel - Java lib+browser for TOR
    silvertunnel.org is a project that provides an end-user browser, a Java library and additional Java security tools to easily access anonymity networks such as the Tor (torproject.org) network. Secure and easy to use. Tor4Java and Tor Browser. Attention: see project status on page https://sourceforge.net/p/silvertunnel/discussion/962278/thread/83dc2d02/#
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Holynix
    Similar to the de-ice pentest CDs and pWnOS, Holynix is an Linux vmware image that was deliberately built to have security holes for the purposes of penetration testing. Visit http://pynstrom.com/forum/ for help setting up or completing the challenge.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    iAccess is a trust negotiation-based authorization service. It provides entities with the right to protect their own credentials and negotiate with remote (unknown) servers access to resources. iAccess works with X.509 and SAML standards.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Password generator Java CUI application

    Password generator Java CUI application

    Password generator Java CUI application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    OAST - New OpenVPN GUI
    OAST is a cross-platform front-end (GUI) for OpenVPN-client, allowing to manage multiple. It's quite simple in use and provides base functionality such as monitoring connection status. Application is written in Java so it works on both Windows and Linux
    Downloads: 2 This Week
    Last Update:
    See Project
  • 21

    WAH Admin Finder+

    Admin Page Finder Perl script.

    A revision of an Admin page Finder perl script found online. We have added a new list of admin pages to search for and we also added hits logging to an external file to the script. This script is good for Penetration testers who wish to see if an Admin page is visible or easily found by intruders. Original Script found here: -------------------------------------- http://www.hackforsecurity.net/2012/01/admin-finder-perl-script.html
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22

    Dynamic Proxy

    Fetches proxies from hidemyass and changes system proxy in real time.

    Programmer name : Daryl Varghese and Kishan Patel Dynamic Proxy/Madleets Proxy v1.0 is a dynamic proxy made for madleets.com. The proxy application fetches the best proxies from hidemyass.com and changes the system proxy configuration in realtime. Features: 1.It work on all windows systems(both32bit and 64bit) 2.It has no dependencies 3. Uses the wininet Api to change system proxy 4. It is less than 700kb 5. Proxy can be changed by either hotkey or userdefined time...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    nsrlquery

    Provides tools to interface with NIST's NSRL RDS.

    The National Institutes of Science and Technology maintains the National Software Reference Library. As part of this, they keep track of SHA-1 hashes of millions of known pieces of software (the "Reference Data Set"). Unfortunately, there are very few tools to help users query the NSRL RDS. That's where nsrlquery comes in.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Skope Surveillance Suite [DEPRECATED]

    Skope Surveillance Suite [DEPRECATED]

    Monitor Activity on your Computer by Auto Screenshot Capture

    ...It is incomplete, but mostly functional. I am looking for developers to take over this project. Welcome to Skope. Skope is the intuitive, user friendly, and free open source monitoring solution from Gundersoft. Not just a keylogger, Skope is literally a "Skope" into your computer's usage. During the Skope setup, you are prompted to type in keywords. These words will trigger Skope to make a "SkopeShot" of the screen. A SkopeShot is a packaged number of images that were taken from the screen at a specified delay interval. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    KeeSkyDrive

    SkyDrive database synchronization plugin for KeePass

    KeeSkyDrive plugin allows you to synchronize your password database between multiple computers using SkyDrive for sharing. Each time password database is saved plugin updates database on SkyDrive. Each time database is opened, plugin checks for updates from SkyDrives. In a result, you always use the latest version of database. This plugin is not just backup plugin, like some other pluggins. It actually calls Synchronize function of KeePass to allow changes to be merged...
    Downloads: 0 This Week
    Last Update:
    See Project