Showing 99 open source projects for "collect files"

View related business solutions
  • SKUDONET Open Source Load Balancer Icon
    SKUDONET Open Source Load Balancer

    Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.

    SKUDONET ADC, operates at the application layer, efficiently distributing network load and application load across multiple servers. This not only enhances the performance of your application but also ensures that your web servers can handle more traffic seamlessly.
  • Finance Automation that puts you in charge Icon
    Finance Automation that puts you in charge

    Tipalti delivers smart payables that elevate modern business.

    Our robust pre-built connectors and our no-code, drag-and-drop interface makes it easy and fast to automatically sync vendors, invoices, and invoice payment data between Tipalti and your ERP or accounting software.
  • 1
    MySQLTuner

    MySQLTuner

    Script written in Perl to assist with MySQL configurations

    MySQLTuner is a script written in Perl that will assist you with your MySQL configuration and make recommendations for increased performance and stability. The current configuration variables and status data is retrieved and presented in a brief format along with some basic performance suggestions. MySQLTuner supports ~300 indicators for MySQL/MariaDB/Percona Server in this last version. MySQLTuner is maintained and indicator collect is increasing week after week supporting a lot...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 2
    Keel

    Keel

    Kubernetes Operator to automate Helm, DaemonSet, StatefulSet, etc

    kubectl is the new SSH. If you are using it to update production workloads, you are doing it wrong. See examples on how to automate application updates. A single command, no dependencies. No lock-in, no custom configuration files. Start using it now. Runs as a single container, with no database is required. Policies and trigger types are specified in your application deployment files or Helm charts. Use policies to define when you want your application to be updated. Providers can have...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    LinkAce

    LinkAce

    LinkAce is a self-hosted archive to collect links of your favorite web

    LinkAce is a self-hosted archive to collect links of your favorite websites. Save articles to read them later, tools to use in your next project, or historical content to archive it for the long term. LinkAce comes with a lot of features while keeping a clean and minimal interface. It provides a long-term archive to store links to websites, media files or anything else with a valid URL. The user is able to categorize the added links to be able to find them later, and share lists of links...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    jrnl

    jrnl

    Collect your thoughts and notes without leaving the command line

    Collect your thoughts and notes without leaving the command line. jrnl has a natural-language interface so you don't have to remember cryptic shortcuts when you're writing down your thoughts. Your journals are stored in plain-text files that will still be readable in 50 years when all your fancy iPad apps will have gone the way of the Dodo. Encrypt your journals with industry-strength AES encryption. The NSA won't be able to read your dirty secrets. Sync your journals with Dropbox and capture...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cybersecurity Management Software for MSPs Icon
    Cybersecurity Management Software for MSPs

    Secure your clients from cyber threats.

    Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
  • 5
    Loggie

    Loggie

    A lightweight, cloud-native data transfer agent and aggregator

    ... to collect logs, and send them to a Kafka topic without using client compression, with the Kafka topic partition configured as 3. With sufficient resources for the Agent specification, modify the number of files collected, the concurrency of the sending client (configure Filebeat worker and Loggie parallelism), and observe their respective CPU, memory, and pod network card transmission rates.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    PaaSTA

    PaaSTA

    An open, distributed platform as a service

    ... to run and then ensures that those services are deployed safely, efficiently, and in a manner that is easy for the teams to maintain. Rather than managing Kubernetes YAML files, PaaSTA provides a simplified schema to describe your service and in addition to configuring Kubernetes it can also configure other infrastructure tools to provide monitoring, logging, cost management etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Tandoor Recipes

    Tandoor Recipes

    Application for managing recipes, planning meals, building shopping

    ... on it and thus make improvements we otherwise couldn't. Powerful & customizable search with fulltext support and TrigramSimilarity. Create and search for tags, assign them in batch to all files matching certain filters. Import recipes from thousands of websites supporting ld+json or microdata. Easy setup with Docker and included examples for Kubernetes, Unraid and Synology.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Go Recipes

    Go Recipes

    Collection of handy tools for Go projects

    Visualize the distribution of code coverage in your project. This helps to identify code areas with high and low coverage. Useful when you have a large project with lots of files and packages. This 2D image-hash of your project should be more representative than a single number. For each module, the node representing the greatest version (i.e., the version chosen by Go's minimal version selection algorithm) is colored green. Other nodes, which aren't in the final build list, are colored grey...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    SPX

    SPX

    A simple & straight-to-the-point PHP profiling extension

    ... a dedicated browser extension or command line launcher. Multi metrics capable: 22 are currently supported (various time & memory metrics, included files, objects in use, I/O...). Able to collect data without losing context. For example Xhprof (and potentially its forks) aggregates data per caller / callee pairs, which implies the loss of the full call stack and forbids timeline or Flamegraph based analysis.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
  • 10
    Microsoft Azure CLI

    Microsoft Azure CLI

    Azure command-line interface

    A great cloud needs great tools; we're excited to introduce Azure CLI, our next-generation multi-platform command-line experience for Azure. Take a test run now from Azure Cloud Shell! We support tab completion for groups, commands, and some parameters. You can use the --query parameter and the JMESPath query syntax to customize your output. With the Azure CLI Tools Visual Studio Code extension, you can create .azcli files and use these features. IntelliSense for commands and their arguments...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    GRR

    GRR

    GRR Rapid Response, remote live forensics for incident response

    GRR Rapid Response is an incident response framework focused on remote live forensics. It consists of a python client (agent) that is installed on target systems, and python server infrastructure that can manage and talk to clients. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR client is deployed on systems that one might want to investigate. On every such system, once...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    wsjt-x_improved
    ═══════════ ▲▲▲ ══════════════════════════════════════════════ Find the various versions on the "Files" tab (https://sourceforge.net/projects/wsjt-x-improved/files/) wsjt-x_improved is an enhanced version of the excellent WSJT-X software by Joe Taylor K1JT, Steve Franke K9AN, Bill Somerville G4WJS and others (https://sourceforge.net/projects/wsjt/). Sometimes, however, even good things can be improved … Notes: wsjt-x_improved is experimental and is licensed under GNU GPL v3 (https...
    Leader badge
    Downloads: 1,371 This Week
    Last Update:
    See Project
  • 13
    Quiz/Survey/Test - QST

    Quiz/Survey/Test - QST

    A Free, complete, enterprise grade, open source exam management system

    QST, the worlds unparalleled open source online/lan assessment software. From a quick quiz on your phone to very large scale, high stakes, proctored desktop testing, we make it easy/secure/attainable. Our intuitive design contains features (Immediate detailed results, Create/Export/Import/Convert Questions, WYSIWYG/Math-Chemistry/Basic Editors, Question/Item Bank, Multiple Question Types, Multiple Delivery Styles, Multiple Delivery/Results Options, Adaptive/Branching Questions, Randomly...
    Leader badge
    Downloads: 86 This Week
    Last Update:
    See Project
  • 14

    JIEJIE.NET

    An open source tool to encrypt .NET assembly file

    Many .net developers are worry about their software has been cracked,copyright under infringed, so they use some tools to obfuscate IL code.such as PreEmptive dotfuscator.But some times ,it is not enought. <br/>So I write JIEJIE.NET can encrypt .NET assembly deeply,help people protect their copyright.and this tool is open source.
    Downloads: 18 This Week
    Last Update:
    See Project
  • 15
    WakeMeOnLan

    WakeMeOnLan

    Turn on computers remotely by sending Wake-on-LAN (WOL) packet

    This utility allows you to easily turn on one or more computers remotely by sending Wake-on-LAN (WOL) packet to the remote computers. When your computers are turned on, WakeMeOnLan allows you to scan your network, and collect the MAC addresses of all your computers, and save the computers list into a file. Later, when your computers are turned off or in standby mode, you can use the stored computers list to easily choose the computer you want to turn on, and then turn on all these computers...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 16
    WTE

    WTE

    Forensic Windows Triage Environment

    * Files are compressed and ENCRYPTED so are identified as "Malware" by Sourceforge. Criminal Investigators auxiliary in conducting investigations on computer systems. WTE is an easy to use, integrated forensic system that enables an investigator to safely image, preview and analyze internal hard drives (DeadBox), and also to conduct live forensics (LiveBox) or data recovery, using their tool(s) of choice. Safely and Easily Search and Triage with no need to disassemble computers or laptops...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 17
    Codex Terminal

    Codex Terminal

    A Custom Python Based Terminal

    A Custom Terminal Use Win Pe Or Recovrey Mode Cmd Is Not Wokting? No Problem! Codex Terminal Send a Your Command And Basic Browser! Open Text Files Windows OS Repair and %100 Not Collect Data Email: offical.codexproject@gmail.com Codex Terminal © 2024 by Efe Tokluman is licensed under Attribution-NonCommercial-NoDerivatives 4.0 International
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Token Airdrop

    Token Airdrop

    Create Your Token Airdrop and Collect Fees

    Create Your Token Airdrop and Collect Some Money, Increase your token holders by distributing small amount from your token to 1000's of holders, also you can collect fees. Follow this steps: 1- create airdrop contract: https://0xfactory.com/airdrop-contract 2- choose your preferred theme (dark or light) Dark demo: https://airdrop.0xfactory.com Light demo: https://airdrop-light.0xfactory.com 3- edit the file "data.json" using any text editor and save 4- upload all the files to your...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    PHOR

    PHOR

    Photo Organizer

    PHOR helps you organizing, analyzing and presenting your collections of photos, videos etc. PHOR is particularly useful for complementing geolocation. After scanning the file system for media files you can analyze, manipulate or add metadata (e.g. EXIF). Even bulk changes are possible using clipboard or find/replace. A relational database is used to collect information for the media files. The path of the files, their metadata and additional information are stored in the database. You can...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Copy AST
    CopiaAST is a program that makes low-level copies and changes to file names. Low-level copies are used if the classic method fails, while changing the file name can be useful when you want to hide the nature of the file, or collect under a single denominator, a series of image files or other. Itano CopiaAST è un programma che effettuata copie a basso livello e modifiche dei nomi dei file. Le copie a basso livello vengono utilizzate qualora il metodo classico non abbia buon fine, mentre la...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    logspout

    logspout

    Log routing for Docker container logs

    Logspout is a log router for Docker containers that runs inside Docker. It attaches to all containers on a host, then routes their logs wherever you want. It also has an extensible module system. It's a mostly stateless log appliance. It's not meant for managing log files or looking at history. It is just a means to get your logs out to live somewhere else, where they belong. For now it only captures stdout and stderr, but a module to collect container syslog is planned. Logspout is a very...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    mqottrace

    An mqtt client to subscribe to owntracks events

    For owntracks, see https://owntracks.org/ mqottrace collects location data from the mqtt server and writes it into an sqlite3 database. You can convert the data into gpx tracks with mqott2gpx.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Plupload

    Plupload

    JavaScript API for building file uploaders

    ... as much of HTML5 as possible, we are able (among other things) to provide access to raw file data, even in such environments that do not normally support it. One of the biggest benefits of this is that we can display the thumbnails instantly, right as you select the images in the dialog or drag&drop them from the desktop. We slice the files in chunks and send them out one by one. You can then safely collect them on the server and combine into original file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    django-summernote

    django-summernote

    Simply integrate Summernote editor with Django project

    Summernote is a simple WYSIWYG editor. Django-summernote allows you to embed Summernote into Django very handy. Support admin mixins and widgets. Although Post model has several TextField, only the content field will have SummernoteWidget. Apply summernote to all TextField in the model. Please mind, that the widget does not provide any escaping. If you expose the widget to external users without taking care of this, it could potentially lead to an injection vulnerability. Therefore you can...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    System Configuration Collector

    Collect much configuration data and record all changes in a logbook

    System Configuration Collector collects and classifies most of your UNIX/Linux/BSD configuration data in flat files called snapshots. This unique concept allows changes in snapshots of consecutive runs to be detected. These changes are added to a logbook that is helpful for administrators during troubleshooting and for auditors during audits. Snapshot and logbook are also available in HTML format. All data can be send to an SCC server where a web interface provides access to summaries...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next