Showing 26 open source projects for "security"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Smart Business Texting that Generates Pipeline Icon
    Smart Business Texting that Generates Pipeline

    Create and convert pipeline at scale through industry leading SMS campaigns, automation, and conversation management.

    TextUs is the leading text messaging service provider for businesses that want to engage in real-time conversations with customers, leads, employees and candidates. Text messaging is one of the most engaging ways to communicate with customers, candidates, employees and leads. 1:1, two-way messaging encourages response and engagement. Text messages help teams get 10x the response rate over phone and email. Business text messaging has become a more viable form of communication than traditional mediums. The TextUs user experience is intentionally designed to resemble the familiar SMS inbox, allowing users to easily manage contacts, conversations, and campaigns. Work right from your desktop with the TextUs web app or use the Chrome extension alongside your ATS or CRM. Leverage the mobile app for on-the-go sending and responding.
    Learn More
  • 1

    Java-Enigma

    Enigma Encryption Simulator in Java

    This program is an offline and stand-alone Java application which simulates the Enigma encryption machine that was used during World War II.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2

    Visual Figaro

    System safety, dependability and security analysis

    Visual Figaro is an integrated environment to develop component libraries for the dependability modeling tool KB3 used by EDF (http://www.edf.fr/recherche/codes-de-calcul/kb3). KB3 is based on the FIGARO reliability modeling language, suitable for describing CTMC (continuous time Markov chains), DES (discrete event simulation) models, and for automatic generation of fault trees. FIGARO is objet oriented, close to natural language and enables building libraries of reusable components...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 3
    Virtual Controller

    Virtual Controller

    Program to control vJoy / vXbox Device via keyboard, mouse, joystick.

    ...Supported Virtual Input Devices: vJoy (Virtual Generic Joystick) vXbox (Virtual Xbox 360 Gamepad) vKeyboard (Simulated Keyboard) vMouse (Simulated Mouse) Supported Physic Input Devices: Keyboard Mouse Joystick System Requirements Operating system: Windows XP, Windows 7, Windows 8, Windows 10 Additional software: NET Framework 4 Notes: For Windows 7, for the virtual Xbox 360 Gamepad to work correctly, you need to install the following components: Microsoft Xbox 360 Accessories, Microsoft Security Advisory 3033929
    Leader badge
    Downloads: 1,497 This Week
    Last Update:
    See Project
  • 4

    ParamIT

    a Toolset for Molecular Mechanical Force Field Parameterization

    ParamIT is a toolkit aiding the development of molecular mechanical force field parameterization of small, drag like, molecules within CHARMM general force field (CGenFF) protocol. The developed toolkit helps the researchers in following ways: 1) automating the creation of multiple input files for quantum and molecular mechanics programs, 2) automating the output analysis and 3) substitute the use of full MM programs with a faster specialized one. The developed tools include: 1) generator of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Free and Open Source HR Software Icon
    Free and Open Source HR Software

    OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.

    Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
    Learn More
  • 5
    PF_HP

    PF_HP

    Prediction of proteinfolding in 2D HP model

    Even in the simplified two dimensional HP-model (hydrophob/polar) the prediction of proteinfolding is NP complete. We implement a brute force algorithm with serial and parallel execution to solve short inputs of HP sequences (0-1 bitstrings). Selbst im vereinfachten zweidimensionalen HP-Modell (hydrophob/polar) ist die Proteinfaltung bereits NP-vollständig. Hier implementieren wir einen brute-force Algorithmus zur Lösung kurzer Eingabesequenzen (0-1-Bitstrings) für die...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Ballistic Calculator

    Open Source Ballistic Calculator in C#

    !!! This project is currently CLOSED. There is a new version of API available under LGPL license at https://github.com/gehtsoft-usa/BallisticCalculator1 There is a new version of application in progress (ported to net framework 5.0) https://github.com/nikolaygekht/ballistic.calculator.app Ballisitic Calculator based on JBM's implementation 3-degree of freedom model, ported to C#, improved to support metric system and extended by some math from Litz's "Applied Ballistic"...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    facebrok
    Social engineering tool oriented to facebook. 2,782 Downloads in total.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    SCADA-SST

    SCADA Security Testbed

    A simulation environment intended to study and analyze SCADA systems security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    NOTICE: The current version of Schnek is hosted on GitHub https://github.com/holgerschmitz/Schnek This repository on Sourceforge is no longer maintained! For examples of the use of Schnek, please look at the documentation of Schnek http://www.notjustphysics.com/schnek/schnek-documentation/
    Downloads: 0 This Week
    Last Update:
    See Project
  • eProcurement Software Icon
    eProcurement Software

    Enterprises and companies seeking a solution to manage all their procurement operations and processes

    eBuyerAssist by Eyvo is a cloud-based procurement solution designed for businesses of all sizes and industries. Fully modular and scalable, it streamlines the entire procurement lifecycle—from requisition to fulfillment. The platform includes powerful tools for strategic sourcing, supplier management, warehouse operations, and contract oversight. Additional modules cover purchase orders, approval workflows, inventory and asset management, customer orders, budget control, cost accounting, invoice matching, vendor credit checks, and risk analysis. eBuyerAssist centralizes all procurement functions into a single, easy-to-use system—improving visibility, control, and efficiency across your organization. Whether you're aiming to reduce costs, enhance compliance, or align procurement with broader business goals, eBuyerAssist helps you get there faster, smarter, and with measurable results.
    Learn More
  • 10

    InfoSim

    A Java Framework for Simulating Information Theory Concepts

    This is a Java Framework which allows to design and simulate Channels, Cryptography algorithms, Coding algorithms, Noise analysis, Information sources and destinations, etc. It supports both Classical and Quantum Information Theory fields. It also allows to design a new Information Scheme from scratch. It has a big Math library which supports Abstract and Linear Algebra objects e.g Hilbert spaces.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Virtual Botmaster

    Simulate Botnet NetFlow traffic for research analysis

    Simulate Botnet NetFlow traffic for research analysis
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    NeSSi2

    NeSSi2

    Network security simulator

    At the moment NeSSi² is not actively maintained anymore since we are planning a successor project. NeSSi² is a network simulation tool suite addressing in particular network security aspects. Sample capabilities are profile-based attack generation, traffic analysis and support for attack/malware detection algorithm plugins.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    Network Emulator

    Distributed Network emulation tool for high rate packet

    I need your help: In order to make this framework easier and more useful, I need your contribution. The idea behind this framework is to develop a GUI like GNS3 and make this framework more stable. So if you are interested and have C/C++ programming skills, please contact me at zahid.med@gmail.com This framework allows to emulate a network by managing ethernet packets coming from two kind of interfaces: UDP and virtual network card. This tool is similare to dynamips (GNS3) but it can...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    Bitte neue Website des aktuellen sourceforge Projekts PF_HP beachten! Please see new Website of the current sourceforge project PF_HP! Selbst im vereinfachten zweidimensionalen HP-Modell (hydrophob/polar) ist die Proteinfaltung bereits NP-vollständig. Hier implementieren wir einen brute-force Algorithmus zur Lösung kurzer Eingabesequenzen (0-1-Bitstrings) für die Proteinfaltung. Spende einen Cappuccino: Bitcoin: 1HqrdnfQgi9B4LW8UEvLAwh7X5gXPCoQ5B Litecoin:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    TRMSim-WSN
    TRMSim-WSN (Trust and Reputation Models Simulator for Wireless Sensor Networks) is a Java-based simulator aimed to test Trust and Reputation models for WSNs. It provides several Trust and Reputation models and new ones can be easily added.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    The Digital Communication Systems Lib: This library contains digital communucations systems implementations, such as BSPK and MIMO - WOFDM. Various OpenSource Projects: 1. Password/Username/Domain Analyzer
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Security Constrained Unit Commitment. Simulation of Power Markets cleared through central commitment and dispatch (MISO/SPP, PJM, ISO NE, Cal ISO MRTU, ERCOT Nodal). Calculates nodal LMP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Hardware random number generator based on oscillator jitter
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    NIMSpro is a multiplayer simulator for emergency responder and homeland security training. NIMSpro enables fire, police, EMS, etc. to practice tactics, decision making, communication, and incident command (NIMS, ICS, Firescope). Instructor controls sims.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Statically integrated evaluation of the basic security (SIA method) based on the book of Wessolly and Erb, ISBN 3-87617-093-1
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Minarke Is Not A Real Kriegsmarine Enigma But it will allow you to communicate with one. Command line enigma machine emulator. Full M4 compatability, can be used to decode WWII U-boat messages, or send your own.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    A simulation of operating system functions to test a new type of operating system security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Ever wish you could make a virtual hard drive on your computer? What If I told you, you can! Masterdrive is one of the only Virtual hard Drive creators for Windows and you can get it totally free! Only With NTI's MasterDrive!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    A threat modeling tool based on FreeMind
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    The Network Security Response Framework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: Intrusion Detection Systems (sensors), Attacks, and Responses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next