Selected Tags

Click on a tag to remove it

More Tags

Click on a tag to add it and filter down

Security libraries

Showing projects tagged as Security

  • jjwt

    8.5 7.1 L1 Java
    Java JWT: JSON Web Token for Java and Android.
  • Bouncy Castle

    7.8 9.6 L2 Java
    All-purpose cryptographic library. JCA provider, wide range of functions from basic helpers to PGP/SMIME operations.
  • Cryptomator

    7.8 8.4 L5 Java
    Multiplatform transparent client-side encryption of files in the cloud.
  • Keywhiz

    7.2 7.2 Java
    System for distributing and managing secrets.
  • pac4j

    7.1 8.9 L4 Java
    Security engine.
  • jCasbin

    7.0 6.2 Java
    An authorization library that supports access control models like ACL, RBAC, ABAC in Java
  • Spring Security

    6.8 9.6 L4 Java
    Spring Security
  • Themis by Cossack Labs

    6.6 8.7 L3 C
    Crypto library for storage and messaging for Swift, ObjC, Android, С++, JS, Python, Ruby, PHP, Go
  • Keycloak

    5.8 9.5 L2 Java
    Integrated SSO and IDM for browser apps and RESTful web services.
  • Apache Shiro

    5.0 8.0 L3 Java
    Performs authentication, authorization, cryptography and session management.
  • Google Keyczar

    4.6 1.4 HTML
    Easy to use, yet safe encryption framework with key versioning.
  • Hdiv

    3.7 5.6 L2 Java
    Runtime application self-protection against OWASP Top 10 security risks such us Insecure Direct Object References, SQL injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF) and much more.
  • PicketLink

    3.7 1.5 L4 Java
    Umbrella project for security and identity management.
  • Nbvcxz

    3.2 5.2 L3 Java
    Advanced password strength estimation.
  • OACC Framework

    3.1 2.7 L1 Java
    OACC (Object ACcess Control) is an advanced Java Application Security Framework
  • Vault

    - -
    Secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets. It handles leasing, key revocation, key rolling, and auditing. Through a unified API, users can access an encrypted Key/Value store and network encryption-as-a-service, or generate AWS IAM/STS credentials, SQL/NoSQL databases, X.509 certificates, SSH credentials, and more.