Showing 995 open source projects for "java class analysis"

View related business solutions
  • Run applications fast and securely in a fully managed environment Icon
    Run applications fast and securely in a fully managed environment

    Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.

    Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
    Try for free
  • The AI workplace management platform Icon
    The AI workplace management platform

    Plan smart spaces, connect teams, manage assets, and get insights with the leading AI-powered operating system for the built world.

    By combining AI workflows, predictive intelligence, and automated insights, OfficeSpace gives leaders a complete view of how their spaces are used and how people work. Facilities, IT, HR, and Real Estate teams use OfficeSpace to optimize space utilization, enhance employee experience, and reduce portfolio costs with precision.
    Learn More
  • 1
    This package is a suite of tools meant to allow for the low-level manipulation of Java classes and Java Archive (JAR) files in a hostile environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    DNA is an open, flexible and extensible deep network analyzer software server and software architecture for gathering and analyzing network packets, network sessions and applications protocols, passively off enterprise class networks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Web-based SiteMinder admin web application that works remotely from the Policy Server. Two versions available which is struts and dwr(ajax) based. Great for integration into other web admins.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Uberviewer is a java/swt log processor for Uberlogger (a kernel-based observatory). It allows real-time analysis of a remote OS, including process and I/O monitoring. This tool is intended to be helpful for security researchers and malware analysts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Get full visibility and control over your tasks and projects with Wrike. Icon
    Get full visibility and control over your tasks and projects with Wrike.

    A cloud-based collaboration, work management, and project management software

    Wrike offers world-class features that empower cross-functional, distributed, or growing teams take their projects from the initial request stage all the way to tracking work progress and reporting results.
    Learn More
  • 5
    Cryptographically secure your files with asymmetric and symmetric keys, as well as password based encryptions and file/text checksums. Use upto 6 different keys to encrypt/decrypt and get checksums using MD2, MD5, SHA1, CRC32, etc..
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A cryptographically secure instant messaging application. All packets sent by this program are encrypted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Quickly encrypt and decrypt your files with Petri. View encrypted text and image files containing your passwords or other sensitive information. Petri is written in Java and therefore runs on any operating system supporting the Java Runtime Environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    JSDSI is a Java implementation of the Simple Public Key Infrastructure / Simple Distributed Security Infrastructure (SPKI/SDSI). JSDSI implements a Java Cryptographic Provider for SPKI/SDSI certificates and certificate chain discovery algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Awesum2 is a graphical checksum verification utility written in Java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • The AI-powered unified PSA-RMM platform for modern MSPs. Icon
    The AI-powered unified PSA-RMM platform for modern MSPs.

    Trusted PSA-RMM partner of MSPs worldwide

    SuperOps.ai is the only PSA-RMM platform powered by intelligent automation and thoughtfully crafted for the new-age MSP. The platform also helps MSPs manage their projects, clients, and IT documents from a single place.
    Learn More
  • 10
    InsecureWebApp is a web app that includes common web application vulnerabilities including SQL&Html Injection- see owasp.org. It is a target for automated and manual penetration testing, source code analysis, vulnerability assessments and threat modeling.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    GUI written in java to make configuration files for ipsec (racoon and setkey) on linux. It is intended to be as simple and intuitive as possible, but with some advanced features.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Java Based Cryptographic P2P Messaging Client, is based on a client-server architecture. The Client is made in SWING. The server is text based. Server keeps tabs on presense and the users public keys. Presentation: http://varun.accosted.net/talks.php
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    A set of security extensions for JavaServer Faces to solve common access control problems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    WebScarab for Eclipse is an extensible framework for analyzing applications that communicate using the HTTP protocol. It includes an HTTP monitor and an HTTP proxy for recording all messages between your machine and remote servers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    CryptoServer is the daemon for handling Sign-Verify, Encryption-Dencryption, Envelop-Openenvelop based on OpenSSL including the SEED symmetric algorithm (Korean Standard Symmetric Algorithm). It's interface is just tcp/ip socket and very easy to handle
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    The MACA objective is to provide user authentication, session management and authorization services independently of platform. Authorization servive is based on a contextual role-based access control model that extends NIST RBAC
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Moria is a central http-based authentication service to be used by web services. Moria support both authentication and transfer of user attributes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Implementation of standard of security alerts IDMEF in platform J2EE with WebService, JMS and RMI
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    KayRa is a Web Application Security Auditing Tool designed to test the security of websites by analyzing web pages. Some of the tests include: SQL Injection, XSS, Form behaviour with bad data. All tests carried out will be based on the OWASP guide.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Provides plugin authentication API for Java WebServers - extending FORM authentication capabilities - with Tomcat, JBoss and Jetty implementations. Plugin multiple authenticators, key preparers (e.g. pass hashing/salting) and login keys (incl. file data).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Java security API based on JAAS
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    CryptoHelper is a Java program designed to aid in the decryption of classical ciphers, ie pre WWII ciphers. It brings together tools like frequency analysis, friedman tests, enciphering/deciphering for several clasical ciphers, and brute force algorithm
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    bddshell is a command line program for deductive database-based analysis. Its primary focus is software vulnerability detection. It acts as a front-end to a number of other programs, such as bddbddb and joeq.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    A java application that allows you to store files into a "data store". These files are encrypted by passphrases and padded with random garbage to provide plausible deniability (you cannot know if there are any more files in the store or not).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Pure-Java cryptographic calculator, featuring basic arithmetic operators, cryptographic operations, multiple key file formats and edition of ASN.1 object files.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB