Showing 29 open source projects for "se-jcr-0.9.pom"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    AWS Secrets Manager Java caching client

    AWS Secrets Manager Java caching client

    Enables in-process caching of secrets for Java applications

    The AWS Secrets Manager Java caching client enables in-process caching of secrets for Java applications. To use this client you must have a Java 8 development environment. If you do not have one, go to Java SE Downloads on the Oracle website, then download and install the Java SE Development Kit (JDK). Java 8 or higher is recommended. An Amazon Web Services (AWS) account to access secrets stored in AWS Secrets Manager and use AWS SDK for Java. To create an AWS account, go to Sign In or Create an AWS Account and then choose I am a new user. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    EmLogs (NoCheating)

    EmLogs (NoCheating)

    A maneira mais prática de verificar se alguém está usando cheats.

    por: Desenvolvido para auxiliar na detecção de programas ilegais utilizados em jogos. eng: Developed to assist in the detection of illegal programs used in games.
    Leader badge
    Downloads: 52 This Week
    Last Update:
    See Project
  • 3

    DNISeguro

    Protege tu DNI eliminando datos innecesarios y evita estafas

    DNISeguro es una herramienta para windows que permite ocultar datos sensibles del DNI antes de compartirlo, reduciendo el riesgo de fraudes y falsificaciones. Además, puedes añadir un mensaje personalizado al documento para identificar a quién se comparte. 🔹 Características principales: ✅ Elimina información innecesaria del DNI. ✅ Añade un texto personalizado para mayor seguridad. ✅ Evita falsificaciones y fraudes. ✅ Interfaz fácil de usar y rápida. 📥 ¡Descarga DNISeguro y comparte tu documento con mayor seguridad!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Hercules_free_version

    Hercules_free_version

    Almacenamiento seguro offline para semillas BIP39 con cifrado avanzado

    ...El software utiliza cifrado avanzado para garantizar que tu información permanezca protegida en todo momento. Su funcionamiento es sencillo e intuitivo, pensado tanto para usuarios técnicos como para inversores que buscan máxima seguridad sin complicaciones. HERCULES no se conecta a la red, no accede a tus fondos y no requiere datos personales, lo que garantiza privacidad total. “Software firmado digitalmente con certificado de firma de código de SSL.com.” File signed with certificate: Owner: Wladimir Marino Materan Velasquez SerialNumber: 107926026636172561193259228594730909048
    Downloads: 20 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 5
    Backup timer

    Backup timer

    software per effettuare backup temporizzati

    software per effettuare backup temporizzati in modo automatico. Ha la possibilità di gestire fino ad un massimo di 5 backup contemporaneamente, ogniuno indipendente dall'altro. Se viene abilitato almeno un backup, questo programma viene lanciato automaticamente ad ogni avvio del computer, così ogni giorno e nel modo stabilito, effettua il/i backup in modo automatico. Quando è ridotto ad icona nella taskbar può essere aperto il programma facendo doppio click sull'icona, o aprendo un semplice menù cliccando con il tasto destro del mouse sull'icona. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Enigma critta file

    Enigma critta file

    Software per crittare qualsiasi tipo di file con una chiave privata

    ...Per chiave pubblica si intende un modo per crittare un file senza conoscere la chiave. Una volta crittato un file con una chiave pubblica non sarà più possibile decrittarlo, solo chi ha generato la chiave pubblica sarà in grado di farlo. Pertanto se si desidera che una qualunche persona ci mandi un messaggio cifrato, basta distribuire la propria chiave pubblica. Sistemi operativi supportati : Windows™ x86 / 64bit
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    Hikari

    Hikari

    LLVM Obfuscator

    ...While every reasonable attempt has been made in Hikari to reduce such patterns from appearing, however, with overkill weapons like symbolic execution, binary obfuscation can still be defeated much easier, even so-called VM-based obfuscation. DOI 10.1145/2991079.2991114 explained this in great detail. I would implement a few anti-SE mechanisms in the future in an attempt to cause (even) more trouble to attackers, though.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Codex - Password Manager

    Codex - Password Manager

    Administrador de contraseñas para todas sus cuentas. Fácil y seguro.

    ...La idea principal es diseñar una forma fácil y segura de administrar sus cuentas web, con herramientas como ezLink y copiar / pegar doble clic hace que su fecha sea más segura de usar, ver y guardar. Está hecho en C ++ y se actualizará pronto para la gestión web y más.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    SilverTunnel-NG

    Java library for easy accessing Tor network.

    SilverTunnel-NG is a Java library that implements and encapsulates all the complex network protocol stuff needed for anonymous communication over the Tor anonymity network. SilverTunnel-NG Netlib can be easily integrated in almost every existing and new Java application. The library requires Java 1.6/Java SE 6 or a newer version. This is a fork of silvertunnel (https://silvertunnel.org) Version (0.0.4) is deployed to maven. Since Version 0.0.4 SilverTunnel-NG also runs on Android. YourKit is kindly supporting this open source project with its full-featured Java Profiler. YourKit, LLC is the creator of innovative and intelligent tools for profiling Java and .NET applications. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Let your crypto work for you

    Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 10

    ADSCAN

    Admin finder scaner

    #@Project : ADSCAN script #@Autor : Tasty #@Team : Rooting - Hackers #@PageTeam: fb.com/rootinghackers #@Contact : fb.com/rootinghackers #@Version : 2.0 BETA #@Extra : Great Rooting - Hackers and all members #@Release update: 9/02/2016 # + PoC # + The project aims to check if you are a possible admin panel , Subdomains, Directories.. # + Hits a scan unwrought form # + Script full # report if you find a possible bug, contact me. #@Release update: 09/02/2016 # [ACTUALIZACION] Se añadieron 2 opciones mas , bruteforce para subdominios y para directorios, tiene la opcion para utilizar tu propio wordList. * Nuevo parametro "-V" para mas detallado el escaneo. #[EN] [UPDATE] 2 more options, bruteforce for subdomains and directories have the option to use your own wordList * New parameter "-V" for more detailed scanning. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    ADSCAN

    finder scaner complet

    #@Project : ADSCAN script #@Autor : Tasty #@Team : Rooting - Hackers #@PageTeam: fb.com/rootinghackers #@Contact : fb.com/rootinghackers #@Version : 2.0 BETA #@Extra : Great Rooting - Hackers and all members #@Release update: 9/02/2016 # + PoC # + The project aims to check if you are a possible admin panel , Subdomains, Directories.. # + Hits a scan unwrought form # + Script full # report if you find a possible bug, contact me. #@Release update: 09/02/2016 # [ACTUALIZACION] Se añadieron 2 opciones mas , bruteforce para subdominios y para directorios, tiene la opcion para utilizar tu propio wordList. * Nuevo parametro "-V" para mas detallado el escaneo. #[EN] [UPDATE] 2 more options, bruteforce for subdomains and directories have the option to use your own wordList * New parameter "-V" for more detailed scanning. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    PasswordManager

    PasswordManager

    Gestionnaire de mot de passe réseau avec système d'autorisation.

    Gestionnaire de mot de passe en réseau, écrit en Java, basé sur une système d'autorisaton. Les échanges sont chiffrés avec des clefs hybrides(RSA/AES). Le système d'autorisation se repose sur l'appartenance à un ou plusieurs groupes, liés à des groupes LDAP. La connexion des utilsateurs utilise l'authentification LDAP. Les mots de passe stockés sont chiffrés à l'aide d'une clef symétrique (AES). Pour l'instant, l'application utilise PostgreSQL 9.2 et une connexion Active Directory (simple ou via Kerberos). ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The MOTET Cipher & SE Scrambler

    The MOTET Cipher & SE Scrambler

    A tiny, fast encryption tool in C

    MOTET is a tiny, fast super-encipherment application written in C, featuring the new CSPRNG/stream ciphers MOTE and BEDBUG in each of their three variants, as well as the "gold standard" among ciphers, ISAAC. MOTET brings multiple levels of encryption, including a ciphertext-hash, a Vigenere mixing function, a choice of Caesar MOD or Caesar MIX ciphering on the primary key-stream, plus a deeply scrambled "outer shell" as a final super-encryption stage. A unique nonce IV guarantees that...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    MOTE CSPRNG & Stream Cipher

    MOTE CSPRNG & Stream Cipher

    A family of small-state CSPRNGs and Stream Ciphers

    MOTE is a fast, small-state, cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. MOTE exhibits uniform distribution, mixes extremely rapidly, has no detected bias, and comes in three variants: MOTE8, with an internal state array of 8+4 32-bit words; MOTE16, with an internal state of 16+4 words; and MOTE32 with a 32+4-word state. The former permit seeding with a key of up to 256 or 512 bits, the latter with a 1024-bit key. Reduced to essentials, MOTE is only...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    BEDBUG CSPRNG & Stream Cipher

    BEDBUG CSPRNG & Stream Cipher

    A family of FLEA-inspired CSPRNGs and Stream Ciphers

    BEDBUG is a small, fast, cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It exhibits uniform distribution, mixes rapidly (with worst-case avalanche better than 16-bits), has no detected bias, and comes in three variants: BEDBUG128, with an internal state array of 128+3 32-bit words; BEDBUG256, with an internal state of 256+3 words; and BEDBUG512 with a 512+3-word state. The former permit seeding with a key of up to 4096 or 8192 bits, the latter with a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    FakeLogin password grabber

    Scansiona un fake login per trovare le password rubate.

    Vi hanno appena inviato un fake login spacciandolo per una nuovissima versione di facebook (es.), ma voi vi siete accorti che è un fake login e non avete messo la vostra password. Se volete punire il lamer che vi ha fatto uno scherzo simile, potreste rubargli le password che ha rubato e avvertire le vittime. Non sapete come rubare le password a un fake login? Pazienza, questo software fa tutto automaticamente. Vi avviso che non è del tutto legale, perché andrete a rubare delle password (anche se potreste farlo per un buon motivo, ovvero avvertire le vittime per fargli cambiare la password). ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    W8 Lock Screen +

    Ecran de verrouillage moderne, personnalisable et sécurisé.

    ...Caractéristiques : > Semblable à l'écran de verrouillage de Windows 8 > Très personnalisable : - Choix du moyen d'identification par défaut (mot de passe, code à 4 chiffres ou question personnelle) - Possibilité de limiter ou non le nombre de fois que l'utilisateur peut se tromper. - Possibilité de démarrer en même temps que Windows. - Modifier la langue d'affichage (Français et Anglais) - Personnaliser les couleurs de l'interface - Choisir une photo comme fond - Choisir l'emplacement de la zone de saisie (là où vous rentrez le mot de passe) - Afficher le nombre de notifications Skype - Afficher la météo de votre région
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    U-Tranz

    U-Tranz

    UDP based secure file transfer application written in JAVA.

    ...Along with the tremendous increase in file size, certain features like implementation of Government Standard Security Algorithms (AES-256*/RSA-2048 and SHA-512) have been added to this application for secure sharing of huge files across different workstations.This tool programmed in JAVA and requires Java Runtime Environment to use this tool. *Unlimited Strength Java Cryptography Extension Policy Files for the Java SE Runtime Environment 7 required to use this feature.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    SIPve

    SIPve

    Videovigilancia, Control de Acceso y Carnetización

    Sistema Integrado de Protección Venezolano con capacidades de Videovigilancia, Control de Acceso y Carnetización para el resguardo físico de instalaciones.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    Py Forensic

    Análisis forénsico, entorno unificado y extracción de datos

    Plataforma de recolección de información que se desarrolla mediante la programación de pequeños módulos independientes. Dichos scripts llevan a cabo las tareas forénsicas que habitualmente reservamos a otras aplicaciones. La instalación en Windows es muy sencilla (ver instrucciones en la descarga). En otras plataformas (Mac y GNU/Linux) se complica.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Adzok Open

    Adzok Open

    Administrador Remoto

    Herramienta de Administración Remota opensource escrito en Java. Nota: El creador de este herramienta no se hace responsable del mal uso que le puedan dar a esta herramienta.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Adsocks

    Adsocks

    Administrador Remoto

    Herramienta de Administración Remota opensource escrito en Java. Nota: El creador de este herramienta no se hace responsable del mal uso que le puedan dar a esta herramienta.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    USB DV

    Desvirusador de memorias USB y targetas SD

    Es un programa que se encarga de la limpieza de memorias de almacenamiento USB o tarjetas SD que ocasionalmente son infectadas/os por el virus "winlogo.exe" . Utilizando este programa cada vez que insertes una memoria USB o tarjeta SD a tu computadora, previenes la infección de tu sistema con dicho virus.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    JCKlean Lnk

    JCKlean Lnk

    Limpia los (*.lnk) que pueden ser maliciosos.

    ¿Te ha pasado que todas las carpetas que tenías en tu USB desaparecen y en su lugar aparecen accesos directos supuestamente apuntando hacia las carpetas reales? En la Internet está circulando un virus-troyano que al insertar un USB a una computadora infectada esta se copia al USB, ocultándote las carpetas y creando esos accesos directos (*.lnk) falsos, que realmente apuntan al troyano también copiado. Al hacer clic al acceso directo el troyano se activa dándole la posibilidad a su creador de espiar en tu computadora. Con esta pequeña aplicación creada en Bath podrás eliminar ese virus-troyano junto con sus accesos directos, devolviéndote también las carpetas originales (que nunca se eliminaros, solo los mantenía ocultos). ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    SELinux targeted policy module which extends kernel mandatory access control policies to the standalone git-daemon server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB