10

8

6

4

2


7.3

9.6

9.2

9.6

9.1

9.6

8.2

9.5

7.4

9.2

7.2

8.6

17 Security libraries and projects

  • Bouncy Castle

    7.3 9.6 L2 Java
    All-purpose cryptographic library. JCA provider, wide range of functions from basic helpers to PGP/SMIME operations.
  • Spring Security

    9.2 9.6 L4 Java
    Spring Security
  • Keycloak

    9.1 9.6 L2 Java
    Integrated SSO and IDM for browser apps and RESTful web services.
  • Cryptomator

    8.2 9.5 L5 Java
    Multiplatform transparent client-side encryption of files in the cloud.
  • pac4j

    7.4 9.2 L4 Java
    Security engine.
  • Keywhiz

    7.2 8.6 Java
    System for distributing and managing secrets.
  • Themis by Cossack Labs

    5.7 8.4 L3 C
    Crypto library for storage and messaging for Swift, ObjC, Android, ะก++, JS, Python, Ruby, PHP, Go
  • Apache Shiro

    8.6 7.9 L3 Java
    Performs authentication, authorization, cryptography and session management.
  • jjwt

    8.5 7.1 L1 Java
    Java JWT: JSON Web Token for Java and Android.
  • Nbvcxz

    3.5 4.7 L3 Java
    Advanced password strength estimation.
  • jCasbin

    5.9 4.7 Java
    An authorization library that supports access control models like ACL, RBAC, ABAC in Java
  • Hdiv

    3.7 4.3 L2 Java
    Runtime application self-protection against OWASP Top 10 security risks such us Insecure Direct Object References, SQL injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF) and much more.
  • PicketLink

    3.7 0.0 L4 Java
    Umbrella project for security and identity management.
  • OACC Framework

    3.1 0.0 L1 Java
    OACC (Object ACcess Control) is an advanced Java Application Security Framework
  • Google Keyczar

    6.1 0.0 HTML
    Easy to use, yet safe encryption framework with key versioning.
  • Nimbus JOSE+JWT

    - -
    JWT, JWS, JWE, JWK
  • Vault

    - -
    Secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets. It handles leasing, key revocation, key rolling, and auditing. Through a unified API, users can access an encrypted Key/Value store and network encryption-as-a-service, or generate AWS IAM/STS credentials, SQL/NoSQL databases, X.509 certificates, SSH credentials, and more.

Popular Comparisons


99 Remote Jobs

Work from home. Anywhere in the world.
+ Post a job

Add another 'Security' Library