Showing 3784 open source projects for "java open source"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Cloud tools for web scraping and data extraction Icon
    Cloud tools for web scraping and data extraction

    Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.

    Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
    Explore 10,000+ tools
  • 1
    Secret Keeper allows you to store the user names and passwords to the many websites and applications that you need them for. This information is protected with a password that you choose. Includes a manual on how to use it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    InteliSpider
    Extendable and flexible e-Discovery tool designed to identify information on a file system, databases and within files (such as Zip, Jar, Outlook Personal Folders, Open Document and Office Open XML).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    egrsa

    egrsa

    rsa-elgamal comparison

    compare time of process between rsa and elgamal algorithm used to encryption and digital signature.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Sguil's (pronounced sgweel) main component is an intuitive GUI that receives realtime events from snort/barnyard. It includes other components which facilitate the practice of Network Security Monitoring (NSM) and event driven analysis of IDS alerts.
    Downloads: 4 This Week
    Last Update:
    See Project
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 5
    phpLDAPadmin
    phpLDAPadmin is a web-based LDAP administration tool for managing your LDAP server. With it you can browse your LDAP tree, view LDAP schema, perform searches, create, delete, copy and edit LDAP entries. You can even copy entries between servers.
    Downloads: 29 This Week
    Last Update:
    See Project
  • 6

    Trike

    Computer-aided threat modeling

    Trike is a platform-independent tool for systematic, computer-assisted threat modeling, from requirements through deployment. We are developing Trike v2 on GitHub (https://github.com/octotrike/trike). Our mailing lists are still here on SourceForge, and we're leaving the old code repository & releases up for archival purposes. Plus you probably want to use something while you're waiting for v2.
    Leader badge
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    User AES-128 bit encryption in counter mode of operation. supports interactive mode of operation and command line mode of operation.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8

    Computer antitheft B

    Recovery of lost or stolen computer

    Install antitheftB on your computer(s) and upload file monitoring_center.php to your web site. AnitheftB will regularly report computer location to your web site. In case computer is lost or stolen you will keep track of its location on web site so it can be recovered. If you install it on many computers you must enter different username on every installation. That will let you monitor all computers from one monitoring center.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    macls

    Perl ls-like command shows mtime, atime, ctime for Linux

    Pure Perl script that has the sole purpose of grabbing the atime, mtime, and ctime of a file or a bunch of files and outputting the results. M-A-C ls (macls)
    Downloads: 0 This Week
    Last Update:
    See Project
  • Axe Credit Portal - ACP- is axefinance’s future-proof AI-driven solution to digitalize the loan process from KYC to servicing, available as a locally hosted or cloud-based software. Icon
    Axe Credit Portal - ACP- is axefinance’s future-proof AI-driven solution to digitalize the loan process from KYC to servicing, available as a locally hosted or cloud-based software.

    Banks, lending institutions

    Founded in 2004, axefinance is a global market-leading software provider focused on credit risk automation for lenders looking to provide an efficient, competitive, and seamless omnichannel financing journey for all client segments (FI, Retail, Commercial, and Corporate.)
    Learn More
  • 10
    HTTP Anti Flood/DoS Security Module

    HTTP Anti Flood/DoS Security Module

    Detect Flooder IPs, Reduce Attack Surface against HTTP Flood Attacks

    This module provides attack surface reduction enhancements against the HTTP Flood Attacks at the web application level. Massive crawling/scanning tools, HTTP Flood tools can be detected and blocked by this module via htaccess, firewall or iptables, etc. (like mod_evasive) You can use this module by including "iosec.php" to any PHP file which wants to be protected. You can test module here: http://www.iosec.org/test.php (demo) Watch the Proof of Concept video:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    The Polybius Square Encipher/Decipher

    The Polybius Square Encipher/Decipher

    The Polybius Square Encipher/Decipher Square 5x5, Removed Letter: 'W'

    Python package that allow you to encipher a plaintext, decipher a ciphertext, using The Polybius Square cryptography.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Tsukuba-GAMA provides user and credential management, using the Grid Security Infrastructure (GSI) based on Public Key Infrastructure (PKI), X.509 certificate, proxy certificate, and the concept of Virtual Organization (VO).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    AnyHash

    A secure password solution for the modern, yet insecure world.

    A password manager that works without password file or cloud service. Just try it on the website.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    DAL4j

    Data Access Layer 4 Java

    Welcome to Data Access Layer for Java (DAL4j) a set of command line tools and framework used to reverse engineer a MySQL or SQLServer database schema into a set of JPA Entity Beans. DAL4j can be useful for scenarios where there is an existing database schema but a technology other that JPA is used to interact with the database. DAL4j can provide an easy way to migrate your code base from other technologies such as JDBC or Hibernate to JPA. The beans generated can be 1 or two types:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    chksm-chkfile

    chksm-chkfile

    Windows MD5/SHA-1/SHA-256 file hashes calculator.

    Calculate MD5, SHA-1, SHA-256 checksum hashes from a specific file, and compare these values with a given string. Accept one filename as parameter. Functionalities : - automatically retrieve text from Windows clipboard and compare it. - 32 & 64 bits windows platforms supported - Installation (Add to file context menu) - Uninstallation Requirements: - Microsfot .NET Framework 2.0 Files: chksm-chkfile.exe MD5: c0b7761deeb7d7dc45aa04726309d4ca SHA1:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Open Nod32 Keyfinder

    Open Nod32 Keyfinder

    Find licences for your ESET anti-virus fast and easy.

    Apply the KISS Rule. KEEP IT SIMPLE STUPID! Find your ESET Smart Security and ESET Nod 32 Anti-Virus Licences (Username and password). Just like that, you press a button and you see the list of usernames and passwords ready for you to copy them. This proyect was born as "Elemental Nod32 Keyfinder". It was my first time with Regular Expressions and it was a total success :D Now i have decided to release it with a gorgeous GPL v3 (or higher) so you can undersand how this works. Enjoy!
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17

    Spondulas

    Spondulas is browser emulator designed to retrieve web pages for hunti

    Spondulas is browser emulator and parser designed to retrieve web pages for hunting malware. It supports generation of browser user agents, GET/POST requests, and SOCKS5 proxy. It can be used to parse HTML files sent via e-mail. Monitor mode allows a website to be monitored at intervals to discover changes in DNS or content over time. Autolog mode creates an investigation file that documents redirection chains. The retrieved web pages are parsed for links and reported to an output file. More...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    WordList Generator

    Generate wordlists using different methods

    WordList Generator is used to generate word lists. Methods: -Web Crawler -Search Engine Crawler -Random -Brute Force
    Downloads: 3 This Week
    Last Update:
    See Project
  • 19
    Encryptron

    Encryptron

    An encryption software using C# 4.0

    First of all, let us understand the need for an encryption software. Just think of you sending a message of extreme confidentiality, someone else fetches it and goes through it. A breach in the security! We can’t allow that to happen. So, virtually every data send over a network is encrypted now-a-days. Let’s look at this now: Vdmbnld!`f`ho...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    SSVChecker
    SSVChecker is a static security vulnerability checker for Eclipse.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    SmartRouter Project
    SmartRouter Project A GNU/Linux Router, Firewall and Proxy Server
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Password Wallet

    Password Wallet

    Progetto "Password Wallet" (Università degli Studi di Padova)

    Progetto didattico "Password Wallet" per l'insegnamento di Ingegneria del Software (Anno Accademico 2011/2012) del Corso di Laurea in Informatica dell'Università degli Studi di Padova.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Quick Check

    Quick Check

    Quick Check is a small MD5 comparison program.

    Quick Check is a small MD5 comparison program, that uses a class provided by "IranianExperts". At this point in the project it just compares MD5 however in the future it might support SHA1 and others. When you first open the program you are greeted with a small form that contains two text boxes and one button. First you enter the hash of the file you got from where you downloaded, next click the button and browse to the downloaded file and the program will retrieve the MD5 hash and compare....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Quickly recover problems that was created by viruses/malwares: Registry editor has been disable, task manager has been disable. also, contains sort of 'task-manager-replacement'. The name is a bit pretentious, but I couldn't think of any better name :-)
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25

    AntiDef

    Anti defacement command line tool

    AntiDef is written in order to handle with defacement attacks. This tool written in Java in a fast-and-dirty manner; However is works. This tool is working straight forward. Server administrator should run the application with the following specific parameters: path to the copy of the web site (source), path to the application directory, path to log directory and few more optional parameters. This tool compares the source and the destination files, then copies the "defaced" files if any change occurs. ...
    Downloads: 0 This Week
    Last Update:
    See Project