Showing 12 open source projects for "cyber control"

View related business solutions
  • Create and run cloud-based virtual machines. Icon
    Create and run cloud-based virtual machines.

    Secure and customizable compute service that lets you create and run virtual machines on Google’s infrastructure.

    Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
  • Speech-to-Text: Automatic Speech Recognition Icon
    Speech-to-Text: Automatic Speech Recognition

    Accurately convert voice to text in over 125 languages and variants by applying Google's powerful machine learning models with an easy-to-use API.

    New customers get $300 in free credits to spend on Speech-to-Text. All customers get 60 minutes for transcribing and analyzing audio free per month, not charged against your credits.
  • 1
    Exodia OS

    Exodia OS

    Exodia OS Releases

    Downloads: 11 This Week
    Last Update:
    See Project
  • 2
    Manticore

    Manticore

    Symbolic execution tool

    Manticore helps us quickly take advantage of symbolic execution, taint analysis, and instrumentation to analyze binaries. Parts of Manticore underpinned our symbolic execution capabilities in the Cyber Grand Challenge. As an open-source tool, we hope that others can take advantage of these capabilities in their own projects. We prioritized simplicity and usability while building Manticore. We used minimal external dependencies and our API should look familiar to anyone with exploitation...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Kubesploit

    Kubesploit

    Kubesploit is a cross-platform post-exploitation HTTP/2 Command

    Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments written in Golang and built on top of Merlin project by Russel Van Tuyl. While researching Docker and Kubernetes, we noticed that most of the tools available today are aimed at passive scanning for vulnerabilities in the cluster, and there is a lack of more complex attack vector coverage. They might allow you to see the problem but not exploit it. It is important...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Reorganizacion del codigo de hemisferio cyber buscando simplificarlo y hacer la aplicacion usable
    Downloads: 0 This Week
    Last Update:
    See Project
  • Fully managed relational database service for MySQL, PostgreSQL, and SQL Server Icon
    Fully managed relational database service for MySQL, PostgreSQL, and SQL Server

    Focus on your application, and leave the database to us

    Cloud SQL manages your databases so you don't have to, so your business can run without disruption. It automates all your backups, replication, patches, encryption, and storage capacity increases to give your applications the reliability, scalability, and security they need.
  • 5

    CleanTimer

    Open source Linux internet cafe management solution.

    CleanTimer is an open source internet cafe software solution for Linux. The CleanTimer distribution makes it easier for Linux internet cafe administrators to control time and costs. CleanTimer is based on Lubuntu.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    ScorePlus(Sensorweb Laboratory)
    ScorePlus is a cyber physical testbed for smart grid that addresses the intelligent control, communication, and interactions about the complex smart grid cyber physical system. By introducing virtual time to the emulation platform and implementing a global synchronization module, scoreplus is able to advance the system clock as fast as possible, while preserving the synchronization between an event driven based power simulator (GridLAB-D) and a real time based network emulator (CORE).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Rosie

    Rosie

    Cyber Cafe client/server that works with DRBL

    ROSIE is a basic cyber-cafe style application that uses DRBL (https://sourceforge.net/projects/drbl/). It's used in places like community based IT centres to control user sessions on the computers. ROSIE comes in two parts. The ROSIE client is the user interface to control the sessions and it can be installed on a computer or even a USB. It will run as long as Java is installed. The ROSIE server is installed on the DRBL server. It allows the client software to interact with DRBL...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Codigo Fuente de sistema cliente/servidor que proporciona Cyber Control desarrollado en VB 6.0 con el fin de brindar control en la administración de salas web o cybercafe donde se alquilan equipos para navegar por internet. Brindando seguridad.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Kontroller is a program for cyber-cafes management written with Python and PyQt3 module. Control the time for each user, also startup, shutdown, lock and unlock computes. Kontroller is based in SSH and LDAP to store information about users and computers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cloud data warehouse to power your data-driven innovation Icon
    Cloud data warehouse to power your data-driven innovation

    BigQuery is a serverless and cost-effective enterprise data warehouse that works across clouds and scales with your data.

    BigQuery Studio provides a single, unified interface for all data practitioners of various coding skills to simplify analytics workflows from data ingestion and preparation to data exploration and visualization to ML model creation and use. It also allows you to use simple SQL to access Vertex AI foundational models directly inside BigQuery for text processing tasks, such as sentiment analysis, entity extraction, and many more without having to deal with specialized models.
  • 10
    Cybera is an Internet cafe administration system. It works with prepaid cards or client accounts or in a post paid Self Service mode. Features include workstation control, user rights lockdown, accounting, stats and screen replication for CAI.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 11
    Development of a Java behaviour control engine and various other tools for humanoid robots control, in the context of the Roboka Cyber Robot Tournament (<a href="http://www.roboka.org">roboka.org</a>).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    ControlCyberT

    Control for Cyber cafe Linux

    Control for Cyber cafe Linux. mysql + java, Netbeans Cyber Cafe system designed for Linux. It works on the client-server model where one computer, the server controls a group of other computers: the client workstations. Easy to configure.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next