Business password and access manager solution for IT security teams
Simplify Access, Secure Your Business
European businesses use Uniqkey to simplify password management, reclaim IT control and reduce password-based cyber risk. All in one super easy-to-use tool.
Learn More
Entity Management Software
Filejet’s entity management software organizes & files all of your entity reports: every year, in every jurisdiction – with total visibility.
Automate everything: entity compliance, registered agent services, annual report and BOI filings, org charts, and DBA/fictitious name and business registration renewals, so you can focus on higher-value work.
ContraCaptcha is a Java-based libary for solving (image-based) captchas. It provides classes for image processing and character recognition. It also includes solvers for some of the popular captcha-systems in use DISCLAIMER: only for learning purpose (;
This tool will anonymize images by destroying the Photo Response Non Uniformity (PRNU) pattern. It can also remove or forge the PRNU patterns, without having a (negative) impact on the quality.
The Benchmark Editor enhances and simplifies the creation and editing of benchmark documents written in standard languages such as XCCDF and OVAL. NOT CURRENTLY MAINTAINED: please see the Recommendation Tracker for a similar, actively maintained tool
Cloud Based Contact Center Software that Drives Success
DialedIn is a modern call center software designed to transform customer interactions and streamline your operations, helping teams achieve more daily. By automating and optimizing key workflows across inbound, outbound, and blended environments, DialedIn helps you boost agent productivity and deliver better outcomes across every call.
LiveView is a forensics tool that creates a VMware virtual machine out of a raw (dd-style) disk image. This allows an examiner to "boot up" the image and gain an interactive, user-level perspective of the environment, all without modifying the imag
The main purpose of this project is to develop a Graphic policy definition editor implemented in Java language and based on the XACML standard which manages access control policies
A Steganographic Tool that lets u hide any file into any file. It is based on Image, Audio, Video Steganography that hides any file or message into an image(BMP,JPG,GIF), Audio/Video(MPG, WAV, etc) or any other file format(PDF,EXE,CHM etc..)
Thumbnail steganography creates a thumbnail from a source image and stores data in it by altering it's color channels. To decipher the data, a new thumbnail is made from the original image and the differences between the pixels are calculated.
jCryptPad stores text informationen hierarchical, e.g. passwords, important texts etc. The data is saved in a encrypted xml file. Encryption is done with the AES algorithm. Additionally a password generator and a text encryption editor is also included.
KeyStone is an editor program for Java keystore files, licensed under the GPL. KeyStone may help make your life easier if you're working with symmetric cryptography in Java.
Suite of services and tools for handling PKI requirements. The initial list of programs contains: 1) a viewer/encoding converter for X.509 certificates, 2) a viewer/editor/generator for PKCS#7 and 3) a viewer/editor/generator for various keystores types.
This project provides a simple Java-based steganography tool that can hide a message inside a 24-bit colour image so that knowing how it was embedded, or performing statistical analysis, does not make it any easier to find the concealed information.
An Iris Recognition system written in Java. Acquires an image, locates the iris and produces a unique 'iris profile' for it. Will be fully supported by its own GUI but potentially linked into other applications, such as xlock.
Quickly encrypt and decrypt your files with Petri. View encrypted text and image files containing your passwords or other sensitive information. Petri is written in Java and therefore runs on any operating system supporting the Java Runtime Environment.
Sanctum allows you to run virtual servers on your computer so you can test the security of software by actually breaking into it. Developers just create a virtual server image and let hackers download it and try their hardest to find exploits.
This project will be used for the identification of the thumb impression. We will be having a image of thumb in our database and will use another image for matching purpose. We can also match the images which are not in the data base.