Showing 3791 open source projects for "java open source"

View related business solutions
  • Vibes don’t ship, Retool does Icon
    Vibes don’t ship, Retool does

    Start from a prompt and build production-ready apps on your data—with security, permissions, and compliance built in.

    Vibe coding tools create cool demos, but Retool helps you build software your company can actually use. Generate internal apps that connect directly to your data—deployed in your cloud with enterprise security from day one. Build dashboards, admin panels, and workflows with granular permissions already in place. Stop prototyping and ship on a platform that actually passes security review.
    Build apps that ship
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 1
    A fork of WASTE 1.5.0.408 beta 3 starting form 1.5.1.412 beta 3
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Simple Machine Protect is portable antivirus software for your Windows Operating System, build to remove certain variant of virus, worm, trojan and spyware from your computer. SMP was designed to be a simple, open source antivirus.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Project Sypher is a Java program that is intended to take a document and cipher the text, output the result in a new document and delete the original file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    This package is a modest implementation of a non-alphanumeric encryption algorithm in java. But I'm kinda looking forward to creating a whole gui app implementing most well-known encryption tools, "the paranoid secret-coder special brainkiller"!
    Downloads: 0 This Week
    Last Update:
    See Project
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 5
    Encryption application using one time pad algoritm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    j!com is a secure instant messaging system, featuring a classical AIM-like interface, and providing AES encryption for conversations and login.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    Reaver is a network vulnerability scanner built on top of Nessus with an easy to use "web front-end" and reporting system. Reaver will aid administrators in identifying, cataloguing and remediation of security vulnerability...DEV -missing web interface
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    Secure downloads by checksum verification using several hash algorithms like md5 or sha1 to verify your downloaded packages using an independet third site.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    SJEA version 1.0 - Simple Java Encryption Algorithm. SJEA is a simple command-line binary encryption algorithm (symmetric block cipher) written in JAVA. It uses a password and a byte-vector array to scramble the input file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Total Network Visibility for Network Engineers and IT Managers Icon
    Total Network Visibility for Network Engineers and IT Managers

    Network monitoring and troubleshooting is hard. TotalView makes it easy.

    This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
    Learn More
  • 10
    A Remote Desktop (trojan-like) open-source Delphi application with a variety of features
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    CompLock will lock your computer COMPLETELY, only allowing access to the letters and numbers,for password. There is also a option that will lock all access to computer, and should stop remote access from controlling your computer.Beta 1/30/09 report bugs
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Isolated Execution is a software reference implementation of the security through isolation concept. It brings a contained environment where malware can run without affecting the whole system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    A pre configured virtual machine for automatically running DBAN with PXE.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Strong 2 way encryption class for PHP (Uses the mcrypt PHP extension)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    HMKrypt is a set of tools that aim to provide quick, easy to use and still somehow secure encryption. It's based on a hexadecimal table. You can get the table from either the source, or the HMKryption tool, and memorize it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    MDD is a physical memory acquisition tool for imaging Windows based computers created by the innovative minds at ManTech International Corporation. MDD is capable of acquiring memory images from Win2000, XP, Vista and Windows Server.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    With the Log Parser one can scan logs, whitelist out legitimate, non-corrupt entries (usually file paths), and apply a standard format to a log generated by any antivirus or malware-removal program. This makes for easier reading of the meat in any log.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    The goal of this project is to implement an utility capable of enforcing XACML policies on a IBM DB2 database. Talking in XACML terms this project will serve as a Policy Enforcement Point for DB2.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Simple multi tool for scouts. It contains: chat server chat client encryption tool simple www browser simple www editor e-mail client (for sending messagess) mass e-mail sender Written in VS2008
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Was a stream cipher attempt, but has been orphaned.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    This program can generate simple (easy to remember) passwords, harder passwords, very hard passwords and uuids. Unlike most password-utilities for Linux, it has a Graphical User Interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    PQStego is a C implementation of J. Fridrich algorithm for embedding secret messages in JPEG images as described in her paper "Perturbed quantization steganography with wet paper codes "
    Downloads: 5 This Week
    Last Update:
    See Project
  • 23
    A steganography tool. You can hide 2Gb file in multiple images, supported almost all graphic formats. Average capacity ~ 40%. Useful for publishing censored materials in the Internet. Details on the project's website (stegoshare.sf.net).
    Downloads: 6 This Week
    Last Update:
    See Project
  • 24
    Netstorm is a highly flexible, fast and plattform independent network security and reliability tester which allows you to setup real world low level flood attack scenarios (such as MITM, DoS and DDoS) within a local area network and on the internet.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    The main purpose of this project is to develop a Graphic policy definition editor implemented in Java language and based on the XACML standard which manages access control policies
    Downloads: 1 This Week
    Last Update:
    See Project