Results for: java project with source code - Page 5

Suggested Categories:

Source Code Management Software
Source code management (SCM) software is a type of software to help developers track, manage, and version control their source code throughout the software development lifecycle. These tools allow multiple developers to collaborate on the same project by maintaining a centralized repository where code changes are stored and tracked. SCM software typically includes features like version control, branching, merging, and conflict resolution to ensure that code changes are properly managed and integrated. It also provides tools for tracking issues, auditing changes, and ensuring that all team members are working with the latest codebase. SCM software is essential for maintaining code integrity, improving collaboration, and enhancing productivity in development teams.
No-Code Development Platforms
No-code development platforms provide a way for users to design, build, and develop software applications without the need for traditional coding. They are built in such a way that users can rely on simple visual interfaces with drag and drop type tools, allowing them to rapidly develop applications with minimal technical knowledge. This makes no-code development platforms ideal for any user regardless of programming experience, from hobbyists to entrepreneurs. Furthermore, modern no-code platforms allow complex mobile apps or web projects to be created more quickly than ever before.
QR Code Generators
QR code generators are tools that allow users to create quick response (QR) codes, which are machine-readable barcodes that store information such as URLs, text, contact details, or Wi-Fi credentials. These tools typically allow users to customize QR codes by changing their size, color, and design while ensuring the code remains scannable. QR code generators are commonly used for marketing, event registration, payments, product packaging, and contactless interactions. They help businesses and individuals provide an easy way for users to access digital content or services through their smartphones or other scanning devices.
Code Review Tools
Code review tools are software tools designed to examine and analyze source code for errors, bugs, and vulnerabilities. They provide developers with detailed feedback on their code, highlighting areas that need improvement or optimization. These tools use a variety of techniques such as static analysis, unit testing, and peer review to ensure the quality and functionality of the code. In addition to identifying coding issues, they also help improve code security by detecting potential vulnerabilities or weaknesses in the code. Code review tools are an essential part of the development process for any software project.
Code Collaboration Tools
Code collaboration tools are platforms that enable developers to work together on software projects by facilitating real-time collaboration, version control, and code sharing. These tools allow multiple developers to edit and review code simultaneously, track changes, and manage different versions of code through branches and commits. Key features typically include code reviews, pull requests, conflict resolution, issue tracking, and integration with version control systems like Git. Code collaboration tools are essential for team-based development environments, ensuring smooth coordination and improving productivity in software projects.
Code Editors
Code editors are software tools that allow developers to write, edit, and debug source code for programming and web development. These editors provide essential features like syntax highlighting, code completion, auto-indentation, and error detection to enhance productivity and reduce coding errors. Many code editors also offer integrations with version control systems (like Git), debuggers, and build tools, allowing developers to manage their code and workflows efficiently. While some code editors are lightweight and focused solely on text editing, others offer extensive features and customization options through plugins and extensions. By providing a streamlined environment for coding, code editors are essential for software development, web development, and scripting tasks.
Coding Challenge Platforms
Coding challenge platforms, also known as code assessment and technical skills testing platforms, enable developers and organizations to test their coding skills to see what skills need to be improved, or to determine the coding skills of a potential hire. Many coding challenge platforms also offer features like coding competitions, mock interviews, and collaboration opportunities for learning with others. These platforms are popular among job seekers, developers, and coding enthusiasts looking to enhance their problem-solving abilities.
Project Management Software
Project management software helps teams plan, organize, and track the progress of projects from initiation to completion. These tools provide features such as task management, resource allocation, timeline scheduling, and collaboration tools, all of which enable project managers to keep projects on track and within scope. Project management software also often includes reporting and analytics features to monitor key performance indicators (KPIs) and ensure deadlines and budgets are met. Many solutions support team communication through integrated messaging, file sharing, and document management. Whether for small teams or large enterprises, these tools help improve productivity and ensure project goals are achieved efficiently.
Project Tracking Software
Project tracking software provides teams with the tools to optimize project collaboration through the management of tasks, schedules, budget, and resources.
IT Project Management Software
IT project management software is designed to help IT and development teams manage their complex projects efficiently. It allows users to create tasks, assign resources, track progress, and allocate budgets with greater visibility and control over the entire project lifespan. This software can also be used to generate reports that provide a comprehensive view of the status, health and impact of the project. Ultimately, it helps stakeholders make informed decisions on how best to move forward with their initiatives.
Project Accounting Software
Project accounting software is built to help businesses manage the financial aspects of individual projects, ensuring that budgets, costs, and revenues are tracked accurately throughout the project lifecycle. These platforms provide tools for budgeting, forecasting, cost allocation, and invoicing, offering insights into a project's financial health and profitability. Project accounting software often integrates with other financial systems, enabling real-time reporting and monitoring of project expenses, time tracking, and resource utilization. By using this software, organizations can ensure financial control over projects, minimize cost overruns, and improve decision-making with detailed financial data for each project.
Project Planning Software
Project planning software helps teams and organizations outline, schedule, and manage projects from start to finish. These tools enable users to define project scope, set deadlines, assign tasks, and allocate resources, ensuring that every aspect of a project is organized and aligned with objectives. Many project planning solutions feature Gantt charts, Kanban boards, and task lists to visually represent project timelines and progress. The software often includes collaboration features, such as file sharing, real-time updates, and team communication tools, making it easier for team members to stay on track. This software is essential for managing complex projects, ensuring that deadlines are met, and resources are used efficiently.
Code Search Engines
Code search engines are specialized search tools that allow developers to search through codebases, repositories, or libraries to find specific functions, variables, classes, or code snippets. These tools are designed to help developers quickly locate relevant parts of code, analyze code quality, and identify reusable components. Code search engines often support various programming languages, providing search capabilities like syntax highlighting, filtering by file types or attributes, and even advanced search options using regular expressions. They are particularly useful for navigating large codebases, enhancing code reuse, and improving overall productivity in software development projects.
Sourcing Software
Sourcing software enables the optimization of procurement processes through the use of reports, supplier management features, and RFP creation tools.
Infrastructure as Code Software
Infrastructure as Code (IaC) tools are software solutions that enable developers and IT teams to automate the provisioning, configuration, and management of infrastructure using code. These tools allow users to define and manage infrastructure components like servers, databases, and networking resources through configuration files, ensuring consistency and repeatability in infrastructure setups. IaC tools typically support version control, enabling teams to track changes and collaborate on infrastructure management.
Visual Project Management Software
Visual project management software enables teams and project managers to visually plan and track progress of projects.
Project Portfolio Management Software
Project portfolio management software is used by project teams and managers to propose goals and investments, manage resources, and analyze potential project outcomes.
Code Enforcement Software
Code enforcement software is software that helps local government agencies and municipalities manage and enforce building codes, zoning laws, and other regulatory compliance requirements. These platforms typically provide features for tracking violations, issuing citations, managing inspections, and automating the code enforcement process. Code enforcement software can also include tools for scheduling inspections, documenting findings, generating reports, and managing case histories. It helps ensure that properties comply with local laws and ordinances, improving efficiency and accountability in enforcement processes. Additionally, it allows for better communication between enforcement officers, residents, and other stakeholders.
Agile Project Management Tools
Agile project management tools are designed to help teams implement and manage agile methodologies, which prioritize flexibility, collaboration, and continuous delivery of value. These tools assist in planning, tracking, and managing tasks, user stories, sprints, and backlogs, while fostering communication and transparency among team members. Common features include Kanban boards, Gantt charts, sprint planning, task assignments, progress tracking, and collaboration tools. Agile project management software helps teams stay aligned, adapt quickly to changes, and continuously improve the process through iterative cycles and feedback.
DeFi Projects
DeFi projects are DeFi (decentralized finance) platforms built on the blockchain that are being actively developed. DeFi projects and DeFi platforms can serve a multitude of purposes, with the aim of making it easy for cryptocurrency investors and DeFi traders to trade, stake, earn, lend, and borrow using DeFi apps on the blockchain.
View more categories (20) for "java project with source code"

1099 Products for "java project with source code" with 2 filters applied:

  • 1
    Fugue

    Fugue

    Fugue

    The Fugue Platform empowers teams with the tools to build, deploy and maintain cloud security at every stage of the development lifecycle. We're so confident that you'll get immediate value with Fugue that we guarantee it. Fugue leverages the open source Open Policy Agent (OPA) standard for IaC and cloud infrastructure policy as code. Build IaC checks into git workflows and CI/CD pipelines with Regula—an open-source tool powered by OPA. Develop custom rules—including multi-resource checks...
  • 2
    Orna

    Orna

    Orna

    The most intuitive cyber incident response and case management platform with on-call SME and 200+ integrations. Orna detects attacks and anomalies across the entire infrastructure 24/7/365, groups them by source, incident relevance, and criticality, and enriches them with threat intelligence data from 28 public and private sources. ORNA's AI analyzes the threat and estimates the severity of the resulting incident, not just the alert, as well as the affected assets. Clear, color-coded dashboards...
    Starting Price: $833 per month
  • 3
    Kloudfuse

    Kloudfuse

    Kloudfuse

    Kloudfuse is an AI‑powered unified observability platform that scales cost‑effectively, combining metrics, logs, traces, events, and digital experience monitoring into a single observability data lake. It integrates with over 700 sources, agent‑based or open source, without re‑instrumentation, and supports open query languages like PromQL, LogQL, TraceQL, GraphQL, and SQL while enabling custom workflows through webhooks and notifications. Organizations can deploy Kloudfuse within their VPC...
  • 4
    ArmorCode

    ArmorCode

    ArmorCode

    Centralize all AppSec findings (SAST, DAST, SCA, etc) and correlate with infrastructure and cloud security vulnerabilities to get a 360o view of you application security posture. Normalize, de-dup and correlate findings to improve risk mitigation efficiency and prioritize the findings that impact the business. A single source of truth for findings and remediations from across tools, teams and applications. AppSecOps is the process of identifying, prioritizing, remediating and preventing...
  • 5
    Xygeni

    Xygeni

    Xygeni Security

    ... coverage spanning the entire Software Supply Chain—including Open Source components, CI/CD processes and infrastructure, Anomaly detection, Secret leakage, Infrastructure as Code (IaC), and Container security—Xygeni ensures robust protection for your software applications. Trust Xygeni Security to protect your operations and empower your team to build and deliver with integrity and security.
  • 6
    Doppler

    Doppler

    Doppler

    Stop struggling with scattered API keys, hacking together home-brewed configuration tools, and avoiding access controls. Give your team a single source of truth with Doppler. The best developers automate the pain away. Create references to frequently used secrets in Doppler. Then when they need to change, you only need to update them once. Your team's single source of truth. Organize your variables across projects and environments. The scary days of sharing secrets over Slack, email, git, zip...
    Starting Price: $6 per seat per month
  • 7
    Trickest

    Trickest

    Trickest

    Join us in our mission to democratize offensive security with tailored best-in-class solutions that address the unique needs of professionals and organizations. Evolve from the terminal to a specialized IDE for offensive security. Use Trickest’s library of tool nodes, import your own scripts, or drop in your favorite open-source tools all in one place. Choose from template workflows for common tasks and a growing list of 300+ open source tools the security community loves. Run your workflows...
  • 8
    KrakenD

    KrakenD

    KrakenD

    ... responses into one, streamlining client-side operations. Security-wise, KrakenD aligns with OWASP standards and doesn't store data, making compliance simpler. It offers a declarative configuration and integrates with third-party logging and metrics tools. With transparent pricing and an open-source option, KrakenD is a comprehensive API Gateway solution for organizations prioritizing performance and scalability.
  • 9
    Chainguard

    Chainguard

    Chainguard

    ... containers entirely from source in hardened build infrastructure. Aimed at engineering organizations and security teams alike, "Chainguard Containers reduce costly engineering toil around vulnerability management, enhance the security posture of applications by eliminating attack surface, and unlock revenue by simplifying compliance with key frameworks and customer requirements.
  • 10
    LifeRaft Navigator
    ... high-risk threats to your people, assets, and operations from diversified sources. Finding the needle in the haystack is a growing challenge for security operations teams. Navigator provides advanced filtering tools to capture the breadth of the online threat landscape. Uncover, explore, and use a variety of sources to validate intelligence related to threat actors, events, and special interest projects or security issues.
  • 11
    Security Compass SSP

    Security Compass SSP

    Security Compass

    Improve your security posture with targeted training and earn ISC2 certification for your software security practitioners. Train your entire development team, including software developers, security champions, software architects, QA engineers, and project managers on fundamental elements of software security and language-specific secure coding practices. Once you’ve successfully completed all modules and passed the course exam, you’ll receive an industry-recognized certificate from Security...
  • 12
    Oomnitza

    Oomnitza

    Oomnitza

    Oomnitza offers a versatile Enterprise Technology Management solution for asset lifecycle management and IT process automation. Our agentless, SaaS platform transforms multi-source data from your existing IT, security and business systems into a comprehensive, accurate and actionable asset inventory for better technology data hygiene and audit readiness. We enable organizations to confidently automate their technology workflows using standardized applications and low-code workflows to reduce...
  • 13
    Polar Crypto Component
    Polar Crypto Component gives your Windows applications the functionality of unbreakable encryption. It enables you to build your own security systems instantly, or to easily integrate it into your existing systems, enhancing their security and performance. Polar Crypto features the latest encryption technology and includes full source code written in MS Visual C++ included. Polar Crypto is an ActiveX and DLL component which can be implemented whenever secure information, authenticity and data...
    Starting Price: $239.00/one-time/user
  • 14
    Parrot OS

    Parrot OS

    Parrot Security

    ... includes everything needed to develop your own software or keep your data secure. Always updated, frequently released with many hardening and sandboxing options available. Everything is under your complete control. Feel free to get the system, share with anyone, read the source code and change it as you want! this system is made to respect your freedom, and it ever will be.
  • 15
    VulnDB

    VulnDB

    VulnDB

    ... organizations to search and be alerted on the latest vulnerabilities, both in end-user software and the 3rd party libraries or dependencies. A subscription to VulnDB provides organizations with simple to understand ratings and metrics on their vendors and products, and how each contributes to the organization’s risk-profile and cost of ownership. Vulnerability source information, extensive references, links to proof of concept code, and solutions.
  • 16
    Karamba XGuard

    Karamba XGuard

    Karamba Security

    Karamba Security’s XGuard is an integrated solution of embedded software agents and a cloud-based backend. XGuard agents deterministically prevent malware and fileless attacks. The backend engine detects anomalous behavior and provides proactive alerts about suspicious devices. XGuard agents are integrated as part of the firmware build toolchain. No source code is required, development processes are untapped, and the agent is seamlessly integrated with the product binaries. Verification...
  • 17
    KyberSecurity

    KyberSecurity

    KyberSecurity

    KyberSecurity protects applications designed to operate on cloud, servers or IoT. Security engines are embedded directly into your application in automated fashion. There is no need to adapt the code source and the protection process requires no prior security knowledge. Once the security engines is inserted into the application, the protection goes wherever the application is deployed. Applications secured by KyberSecurity are self-defendable, the protection does not rely on external libraries...
  • 18
    Passit

    Passit

    Passit

    Using a password manager makes you more safe online, and our modern security features lock down your passwords without getting in your way. Our code is open source, so anyone can learn how Passit works. This makes us more trustworthy, and we think it helps create a more secure product overall. Easily take your passwords to any online device and share them with others. Read existing passwords when offline, just in case. Import and export CSV files with passwords to get data into and out...
    Starting Price: Free
  • 19
    Oso Cloud
    Customers want features that you can’t build without a refactor. Your code is hand-rolled, fragile and hard to debug. It’s spread throughout the codebase and relies on data from multiple sources. There’s no one place to see who has access to what, that authorization is working, or why requests are or are not authorized. Lay out who's allowed to do what in Workbench, our visual rules editor Start with primitives for common patterns like multi-tenancy and RBAC Extend your logic with custom rules...
    Starting Price: $149 per month
  • 20
    Foretrace

    Foretrace

    Foretrace

    Find exposed data before your adversaries do. Foretrace’s patent-pending Total Recon™ engine detects data exposure and alerts you before it results in costly breaches. Credentials can be exposed in data breaches, from leaks or publicly shared sources such as code repositories. Exposed account names and passwords are used by hackers to identify and target accounts. Exposed internal documents and collaboration suites can leak sensitive data. Adversaries can use this data to blackmail...
  • 21
    EaseFilter

    EaseFilter

    EaseFilter Technologies

    Track file change, control file access in real time, prevent your sensitive data from being accessed by unauthorized users or processes. Secure file sharing with digital rights management(DRM), share files with fully control, grant or revoke the file access at any time. Implement file audit, file access control, file protection and encryption Windows applications with C#,C++ demo source code.
    Starting Price: $1500
  • 22
    Black Duck

    Black Duck

    Black Duck

    Black Duck, part of the Synopsys Software Integrity Group, is a leading provider of application security testing (AST) solutions. Their comprehensive portfolio includes tools for static analysis, software composition analysis (SCA), dynamic analysis, and interactive analysis, enabling organizations to identify and mitigate security vulnerabilities throughout the software development life cycle. By automating the discovery and management of open-source software, Black Duck ensures compliance...
  • 23
    New Relic

    New Relic

    New Relic

    ... metrics, events, logs, and traces; powerful full-stack analysis tools; and simple, transparent usage-based pricing with only 2 key metrics. New Relic has also curated one of the industry’s largest ecosystems of open source integrations, making it easy for every engineer to get started with observability and use New Relic alongside their other favorite applications.
    Leader badge
    Starting Price: Free
  • 24
    Sucuri

    Sucuri

    Sucuri

    Our dedicated researchers monitor active malware campaigns. With a trained team of analysts, we aim to provide the best malware removal service around. Best in class tools and scripts scan your website for malware in real-time. Our security analysts examine the source code to detect any irregularities. No hack is too complex for our incident response team to detect and fix. If you need immediate assistance, we can accomodate. Choose a plan that fits your needs. Chat with us to learn about our...
    Starting Price: $9.99 per month
  • 25
    Logz.io

    Logz.io

    Logz.io

    We know engineers love open source. So we supercharged the best open source monitoring tools — including ELK, Prometheus, and Jaeger, and unified them on a scalable SaaS platform. Collect and analyze your logs, metrics, and traces on one unified platform for end-to-end monitoring. Visualize your data on easy-to-use and customizable monitoring dashboards. Logz.io’s human-coached AI/ML automatically uncovers errors and exceptions in your logs. Quickly respond to new events with alerting to Slack...
    Starting Price: $89 per month
  • 26
    ThreatWatch

    ThreatWatch

    ThreatWatch

    Stay informed on emerging threats using real-time, machine curated threat intelligence. Detect and prioritize threats up to 3 months earlier than leading scanning solutions without redundant scanning or agents. Use Attenu8, our AI platform to prioritize your threats. Secure your DevOps pipeline against open source vulnerabilities, malware, code secrets and configuration issues. Secure your infrastructure, network and IOT devices and any other assets by modeling them as virtual assets. Discover...
  • 27
    Lenses

    Lenses

    Lenses.io

    Enable everyone to discover and observe streaming data. Sharing, documenting and cataloging your data can increase productivity by up to 95%. Then from data, build apps for production use cases. Apply a data-centric security model to cover all the gaps of open source technology, and address data privacy. Provide secure and low-code data pipeline capabilities. Eliminate all darkness and offer unparalleled observability in data and apps. Unify your data mesh and data technologies and be confident...
    Starting Price: $49 per month
  • 28
    Padloc

    Padloc

    Padloc

    ... sensitive data within your family, business or any other kind of organization. We believe that transparency and openness are the best foundation for trust so we are building Padloc completely out in the open. Our source code is developed under an open-source license so anyone can review it, provide feedback, and even offer contributions at any time!
    Starting Price: $3.49 per month
  • 29
    iXGuard

    iXGuard

    Guardsquare

    ... and protects iOS applications and libraries. It enables you to fully protect your application or SDK without requiring you to share or alter the source code. iXGuard is easy to configure. It can be set up to protect entire applications or specific functions with a single configuration file. iXGuard offers built-in support for both native iOS (Objective-C, Swift) and cross-platform applications (Cordova, Ionic, React Native, Unity).
  • 30
    HashiCorp Vault
    Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. Secure applications and systems with machine identity and automate credential issuance, rotation, and more. Enable attestation of application and workload identity, using Vault as the trusted authority. Many organizations have credentials hard coded in source code, littered throughout configuration files and configuration...