Showing 461 open source projects for "cynetsvm-java"

View related business solutions
  • Searching for a better way to ship ecommerce? We can help Icon
    Searching for a better way to ship ecommerce? We can help

    ShipHero gives you the tools that give you ecommerce fulfillment super powers.

    ShipHero is built for multi-channel commerce. With a few clicks, you can connect your stores. ShipHero will download new products, as well as sync existing ones. When changes are made to your inventory all connected stores will be updated.
    Learn More
  • The #1 AI-Powered eLearning Platform Icon
    The #1 AI-Powered eLearning Platform

    For users seeking a platform to generate online courses using AI

    Transform your content into engaging eLearning experiences with Coursebox, the #1 AI-powered eLearning authoring tool. Our platform automates the course creation process, allowing you to design a structured course in seconds. Simply make edits, add any missing elements, and your course is ready to go. Whether you want to publish privately, share publicly, sell your course, or export it to your LMS, Coursebox has you covered.
    Learn More
  • 1
    CryptoDock

    CryptoDock

    CryptoDock is a tool that hosts various crypto. algorithms.

    Java is free and can be downloaded from - http://www.java.com/
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Is My Download Broken?

    Is My Download Broken?

    a powerful multipurpose checksum utility

    ...Also generated results can be validated within the application. Results can be saved to a text file format. It can batch process folders as well. This tool requires Java Run-time Environment 7 or higher to use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    CryptoX

    AES Encryption Program

    v2.0.0 (Latest) ---CHANGE LOG--- v1.0.0 - Original Release v1.0.1 - Source Code Cleanup v2.0.0 - Now Features File Encryption Protect your privacy! Encrypt your messages and files with a cryptographic strength of up to 256 bits before sending them to others!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Scramble!
    “Scramble your social network data!” - With Scramble you can selective enforce you access control preferences for your content on social networks like Facebook or Twitter ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Electronic Lab Notebook (ELN) Software Icon
    Electronic Lab Notebook (ELN) Software

    Ideal for any lab. Whether you’re just starting up, a small or large academic institution, or a globally operating company.

    eLabJournal is an all-in-one Electronic Lab Notebook (ELN) software that includes sample tracking and protocol management modules.
    Learn More
  • 5
    SecuXabber

    SecuXabber

    A secure Jabber-client for Android using strong encryption

    SecuXabber is a secure Jabber-client for Android that bases on Xabber and uses a strong, asymmetric enryption that works on top of the XMPP protocol. A key pair is generated on application start-up. Users can send their public key to other SecuXabber users via Bluetooth. This ensures the origin of the public key because people do a face-to-face check during key exchange. After the keys are imported by both users, all communication between them is done fully encrpyted using a strong 4096 bit...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    AESTextCrypt

    AESTextCrypt

    Encrypt and decrypt text using AES 256 bit encryption

    ...It also employs bcrypt, which implements key-stretching and an adaptive key setup phase, the complexity (number of rounds) of which is automatically set to match the processing power of the encrypting computer. This makes it highly resistant to dictionary attack. AESTextCrypt is written in Java, so can be run on all desktop platforms - Windows, Mac and Linux.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    U-Tranz

    U-Tranz

    UDP based secure file transfer application written in JAVA.

    ...Along with the tremendous increase in file size, certain features like implementation of Government Standard Security Algorithms (AES-256*/RSA-2048 and SHA-512) have been added to this application for secure sharing of huge files across different workstations.This tool programmed in JAVA and requires Java Runtime Environment to use this tool. *Unlimited Strength Java Cryptography Extension Policy Files for the Java SE Runtime Environment 7 required to use this feature.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    innocence-java

    Replace text with POS equivalent text, in a reversible fashion.

    Program takes (currently) english text sentences, and replaces each word in a given sentence with another word having the same Part of Speach (POS) tag. This creates a new sentence containing none of the original words. This new sentence can then be transmitted to a remote user, and using the same software, "de-crypted" into yielding the original sentence. The software relies on having a known "seed" value for the random number generator, which is known only by the sender and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    This package provides the following pure Java extensions to the Bouncy Castle framework www.bouncycastle.org and was made freely available by www.novosec.com: 1. OCSP (RFC 2560) server and client / 2. CMP (RFC 2510, RFC 2511) generator and parser
    Downloads: 0 This Week
    Last Update:
    See Project
  • The top-rated AI recruiting platform for faster, smarter hiring. Icon
    The top-rated AI recruiting platform for faster, smarter hiring.

    Humanly is an AI recruiting platform that automates candidate conversations, screening, and scheduling.

    Humanly is an AI-first recruiting platform that helps talent teams hire in days, not months—without adding headcount. Our intuitive CRM pairs with powerful agentic AI to engage and screen every candidate instantly, surfacing top talent fast. Built on insights from over 4 million candidate interactions, Humanly delivers speed, structure, and consistency at scale—engaging 100% of interested candidates and driving pipeline growth through targeted outreach and smart re-engagement. We integrate seamlessly with all major ATSs to reduce manual work, improve data flow, and enhance recruiter efficiency and candidate experience. Independent audits ensure our AI remains fair and bias-free, so you can hire confidently.
    Learn More
  • 10
    Fileprivacy

    Fileprivacy

    Fileprivacy easily encrypts your files

    ...It has to be restarted for further use. Because there are no start scripts, yet, you have to start Fileprivacy from console by typing: java -jar Fileprivacy-1.0_<version>.jar ####### ALSO NOTE ####### The author of this software is not responsible for the safety of your data. There is no guarantee that one or more of the implemented algorithms cannot be compromised.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    JCryptor

    JCryptor is an encrypting tool based on the Caesar-cipher.

    JCryptor uses the Caesar-cipher to encrypt keystrokes on-the-fly. It can also be used to decrypt an encrypted text easily. Caesar-cipher is a simple encryption algorithm, developed by Julius Caesar, to encrypt his correspondence with Cicero in the ancient world. Therefore it uses a simple character substitution method to replace a given character by another. A keyshift of thirteen is called ROT13. ROT13 can be decrypted by encrypting it again with ROT13. Even today this simple method is used...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The aim of this android application is to provide a secure storage for files on the phone. By using asymmetric cryptography the application allow the user and other apps to encrypt the files using a public key so without the need of a encryption password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    Digital signing using a Smart Card

    Java code that enables you to sign documents using a smart card.

    With this library, you'll be able to access a smart card and extract its information. If the smart card contains a key store, you can use it to create digital signatures. This library currently implements signing of PDF documents using the Belgian eID.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    fiskalizacija

    Java code for signing and handling Croatian fiscal service requests

    Java code for signing and handling requests for Croatian fiscal service. Includes unsigned and signed xml samples. For completeness of project my personal testing key is included. Units tests with sample data are available for the ease of use. Whole Eclipse project is committed to source forge Git. Commercial support for implementation into different java application is available upon request.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Hide & Reveal
    Composed of a Java steganographic library and GUI to use steganography. Primarily intended for research communities on security and steganography to implement new dissimulation and steganalysis algorithms. More information at www.hidereveal.org
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    Codegroup

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    ...This project's initial sourcecode is related to : http://www.fourmilab.ch/codegroup/ http://winmorse.com/ https://bitbucket.org/bgneal/cpp-enigma http://www.whence.com/minimodem/ For the User Interface http://www.oracle.com/technetwork/java/javafx/tools/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Simplest Text Encrypter

    A simple example of polyalphabetic cipher in Java.

    Cryptography fascinates everyone. A variety of encryption techniques and ciphers are used to code important data. A polyalphabetic cipher is one of the simplest cipher one can make. This is a Java program to implement polyalphabetic cipher. [How the cipher encodes?] Input Data: helloaf Key: love l - 12th letter in Alphabet o - 15th letter in Alphabet v - 22nd letter in Alphabet e - 5th letter in Alphabet Now: h(l) e(o) l(v) l(e) o(l) a(o) f(v) Further: h(+12) e(+15) l(+22) l(+5) o(+12) a(+15) f(+22) where +(number) meaning shifting the character forward by the respective number of places. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    MySafenote

    MySafenote

    Manage your website and any other passwords.Safely Encrypted

    MySafenote is designed to help you keep your login credentials safe. The application creates a secure password database that can be encrypted in order to prevent unwanted access to this type of sensitive information. MySafenote protects the created database with a user-defined master password. You can then decrypt the password file with a single click.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    JaStaCry

    Java Stacked Crypto

    Java Stacked Crypto merges different hiding, merging and crypto stacks to secure files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    ImageLock
    ImageLock ist ein Programm mit dem man Dateien und Ordner hinter jpg-Bildern verstecken und verschlüsseln kann.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    Java Encryption Library

    Simple Java Encryption Library

    I have packaged the Java encryption library with a wrapper used to make saving and loading files in Java easier. I have also included the source for a command line application to encrypt a String and save it to a text file. The source for AESEncryption was actually written by "erickson" from Stack Overflow. The original post can be found here: http://stackoverflow.com/questions/992019/java-256-bit-aes-password-based-encryption/992413#992413
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    chaOS41

    A cryptocurrency like Bitcoin improved upon with reality binding.

    There is a reason this project holds no code. chaOS41 is a cryptocurrency with reality binding. A given value of money was paid for a surface area the size of a flower pot. It was out of proportion. The chaoOS41 currency corrects that. It binds its value to reality. Its unit value is a ratio between money and land area.. When that ratio normalizes, the currency becomes available to the public. 1 more developer is wanted. For that you need inside access, which means...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Maroniecoder

    Maroniecoder

    Encrypt a text through a list of encryption methods

    I came to the conclusion that this program is not worth the time for further development. Use different Encryption methods with parameters to en- or decrypted a text through the list With downloadable source-code since 1.3 You need to have Java installed http://www.oracle.com/technetwork/java/javase/downloads/index.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    A pure java library to operate on OpenPGP cards directly using javax.smartcard apis with no need of external dlls/frameworks (such as pkcs11 or opensc-java). Includes sample OpenPGP card edit application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    JSSLTrace - a SSL/TLS Interceptor

    A java-based interceptor for SSL/TLS protocol

    Jssltrace is a java-based tool, which enables it's user to intercept ssl based communication between two programs. Jssltrace works essentiallly in the same manner as tcptrace (http://www.pocketsoap.com/tcptrace), which is the main inspiration for it.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB