Showing 1266 open source projects for "java-orm"

View related business solutions
  • Deliver trusted data with dbt Icon
    Deliver trusted data with dbt

    dbt Labs empowers data teams to build reliable, governed data pipelines—accelerating analytics and AI initiatives with speed and confidence.

    Data teams use dbt to codify business logic and make it accessible to the entire organization—for use in reporting, ML modeling, and operational workflows.
    Learn More
  • SIEM | API Security | Log Management Software Icon
    SIEM | API Security | Log Management Software

    AI-Powered Security and IT Operations Without Compromise.

    Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can:
    Learn More
  • 1
    CivilAction lets you create a Choose Your Own Adventure type story that can be played on Java enabled cell phone. A desktop application lets you write story files. People run the story on their phone. Make a 'Tresure hunt' or 'Amaze Race' type game.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Java bridge (bindings, interface) to PAM. JAAS login module using PAM for authentication.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    RevolvingProxy is a cross platform HTTP Proxy application that is designed to be installed on a server that has been assigned multiple IP addresses. Each connecting client is assigned a different IP address for security testing or other purposes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    SIMRAN adds security to the famous AODV protocol. The project is based on SAODV draft and AODV RFC.Its basic functionality lies in securing the AODV protocol by authenticating the non-mutable fields of the routing message using digital signatures.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Professional Streaming and Video Hosting - GDPR Compliant - 3Q Icon
    Professional Streaming and Video Hosting - GDPR Compliant - 3Q

    Secure hosting, scalable streaming, and easy integration for internal and external communications

    3Q offers a multifunctional video platform for hosting, managing and distributing video and audio content on all channels. Live and on-demand.
    Learn More
  • 5
    deface-no-tnx is an anti-defacement system that monitors your Web files and notifies you about unallowed changes. It also replaces the defaced page with a standard "error" page,so that no offensive/joking content can be frauodolently added to your site
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A java application for creating, playing and solving SuDoku puzzles of various types. Features both a Swing GUI and command-line operation. The automatic solving of puzzles uses "smart" techniques rather than a brute force search of every possibility.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    SAFE Reports is a reporting/audit tool for SiteMinder® Policy Store, a popular Single Sign-On product. Find ease of generating reports from large policy data in seconds! Reports can be exported to major popular formats like HTML, word doc PDF and excel
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    The Java Nessus Client API is a Nessus Transfer Protocol 1.2 Implementation. The JNC-API includes: NTP 1.2 Specification (.en, .de), Java API Documentation (.en), JNC-API Binary / Source, Handbook (.de), GUI Nessus Client (Source Only, Prototype)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Java Crypt Framework (JCryptFX) is a java-based education project for de-/encrypting streams. It has a implementation of DES and TripleDES in it but the framework user can write own cryptography algorithms and stream types for it - includes a console app
    Downloads: 0 This Week
    Last Update:
    See Project
  • Easy management of simple and complex projects Icon
    Easy management of simple and complex projects

    We help different businesses become digital, manage projects, teams, communicate effectively and control tasks online.

    Plan more projects with Worksection. Use Gantt chart and Kanban boards to organize your projects, get your team onboard and assign tasks and due dates.
    Learn More
  • 10
    RADAR is a pluggable network monitoring platform that allows for reporting and searching at the application layer. Out of the box, RADAR lets you capture SMTP, AIM, YahooIM and YMail traffic. Find out more at: http://www.optaros.com/solutions_radar.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    The goal of the project is to develop Role Based Access Control software which can be used in any application. The software can be deployed as a server which can cater to multiple applications. Rules can be written for fine grained access control.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    An attempt to collect (read rewrite) a set of tools for Ultima Online game playing. Many tools are closed source or discontinued: no way to enhance them with no sources. Here there will be such tools and sources.
    Downloads: 21 This Week
    Last Update:
    See Project
  • 13
    A crossplatform key manager for GnuPG.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    OpenIdM project will develop scalable, full-featured, commercial-grade Identity Management solution, based on open standards, such as SAML, XACML, SPML, DSML and SOAP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    SwiftCrack is a wireless LAN (WLAN) tool which recovers encryption keys. SwiftCrack operates by proactively monitoring transmissions, injecting traffic with known key streams, computing the encryption key when enough packets have been gathered.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    aamFetch is a utility for fetching your anonymous esub nym messages from the alt.anonymous.messages newsgroup (or other newsgroups). It allows multiple encrypt-subjects to scan, multiple "destination files" to save messages to and random chaff downloads.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Authorization Component for Java based programs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Distributed rainbow table generating
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    NetworkTools has 2 components: A protocol analyzer which plays a TCP client or server or pipeline, which sits between a client and server and shows how they communicate. A port scanner can scan a range of IP addresses and ports. See screenshots.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    PRE4J (Partial RDF Encryption API for Jena) is a lightweight API for encrypting selected RDF graph elements. PRE4J provides cryptographic extensions to the Jena Semantic Web Framework.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    This package is a suite of tools meant to allow for the low-level manipulation of Java classes and Java Archive (JAR) files in a hostile environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Web-based SiteMinder admin web application that works remotely from the Policy Server. Two versions available which is struts and dwr(ajax) based. Great for integration into other web admins.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    DNA is an open, flexible and extensible deep network analyzer software server and software architecture for gathering and analyzing network packets, network sessions and applications protocols, passively off enterprise class networks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Cryptographically secure your files with asymmetric and symmetric keys, as well as password based encryptions and file/text checksums. Use upto 6 different keys to encrypt/decrypt and get checksums using MD2, MD5, SHA1, CRC32, etc..
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    A cryptographically secure instant messaging application. All packets sent by this program are encrypted.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB