Showing 383 open source projects for "network usb detect"

View related business solutions
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    SysDVR

    SysDVR

    Stream switch games to your PC via USB or network

    This is a sysmodule that allows capturing the running game output to a pc via USB or network connection. Stream and switch games to your PC via USB or network. Cross-platform, can stream to Windows, Mac and Linux. Stream via USB or Wifi. Video quality is fixed to 720p @ 30fps with h264 compression, this is a hardware limit. Audio quality is fixed to 16bit PCM @ 48kHz stereo. Not compressed. Very low latency with an optimal setup, most games are playable.
    Downloads: 118 This Week
    Last Update:
    See Project
  • 2
    libwdi

    libwdi

    Windows Driver Installer library for USB devices

    ...It provides a clean API that includes functions to detect driverless USB devices, prepare driver packages, install drivers programmatically, and handle logging and error codes reliably. Projects integrate this library into custom installers, automated provisioning scripts, or hardware management solutions where users need seamless driver setup without manual steps.
    Downloads: 20 This Week
    Last Update:
    See Project
  • 3
    Connectivity

    Connectivity

    Makes Internet connectivity detection more robust by detecting Wi-FI

    Connectivity is a wrapper for Apple's Reachability providing a reliable measure of whether Internet connectivity is available where Reachability alone can only indicate whether an interface is available that might allow a connection. Connectivity's objective is to solve the captive portal problem whereby an iOS device is connected to a WiFi network lacking Internet connectivity. Such situations are commonplace and may occur for example when connecting to a public WiFi network which requires the user to register before use. Connectivity can detect such situations enabling you to react accordingly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    USB Raptor

    USB Raptor

    Lock and unlock your computer using USB flash drives as keys

    ...To release the system lock user must plug the USB with the file in any USB port. Alternative the user can enable (or disable) two additional ways to unlock the system such is network messaging or password. Features • Automated USB lock and unlock function • Lock file contents are encrypted • Password to override lock (can be enabled by user) • Network command to override lock (can enabled by user) • USB drive serial number check (can be enabled by user) • Unique key for each system (can be enabled by user) • Status report function
    Leader badge
    Downloads: 1,326 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 5
    OpenPrinting CUPS

    OpenPrinting CUPS

    OpenPrinting CUPS Sources

    OpenPrinting CUPS is the most current version of CUPS, a standards-based, open-source printing system for Linux® and other Unix®-like operating systems. CUPS supports printing to AirPrint™ and IPP Everywhere™ printers.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    Netdata

    Netdata

    Open-source systems performance monitor

    Netdata is a well-crafted real time performance monitor to detect anomalies in your system infrastructure. Visualize many types of data including disk activity, SQL queries, website visitors and more. This tool is useful to monitor linux servers.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 7
    Tor Browser

    Tor Browser

    Browser for using Tor on Windows, Mac OS X or Linux

    Tor Browser enables you to use Tor on Windows, Mac OS X, or Linux without needing to install any software. Tor is a software that bounces your communications around a distributed network of relays run by volunteers. This effectively prevents anyone watching your Internet connection from learning what sites you visit; it prevents the sites you visit from learning your physical location; and allows you access to sites which are blocked. Tor Browser can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained (portable).
    Downloads: 1,173 This Week
    Last Update:
    See Project
  • 8
    Face Alignment

    Face Alignment

    2D and 3D Face alignment library build using pytorch

    Detect facial landmarks from Python using the world's most accurate face alignment network, capable of detecting points in both 2D and 3D coordinates. Build using FAN's state-of-the-art deep learning-based face alignment method. For numerical evaluations, it is highly recommended to use the lua version which uses identical models with the ones evaluated in the paper.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 9
    Portmaster

    Portmaster

    Block Mass Surveillance

    Portmaster is a free and open-source application firewall that does the heavy lifting for you. Restore privacy and take back control over all your computer's network activity. Discover everything that is happening on your computer. Expose every connection your applications make and detect evil ones. Finally, get the power to act accordingly. Protect your whole computer, not just your browser. Block all advertisements and trackers for every application. Easily add your own rules and block individual domains. ...
    Downloads: 40 This Week
    Last Update:
    See Project
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 10
    Tribler

    Tribler

    Privacy enhanced BitTorrent client with P2P content discovery

    Tribler is a decentralized, privacy-enhanced BitTorrent client developed by researchers at Delft University of Technology. It introduces built-in anonymity using a Tor-like onion routing network and integrates its own blockchain for economic incentives and trust management. Tribler supports standard torrenting features along with distributed search, self-contained channels, and peer reputation. Its goal is to provide a fully autonomous file-sharing network without relying on external...
    Downloads: 47 This Week
    Last Update:
    See Project
  • 11
    GrimAC

    GrimAC

    Fully async, multithreaded, predictive, open source, 3.01 reach

    GrimAC is an open-source anticheat system designed to detect and prevent cheating on Minecraft multiplayer servers through predictive simulation and advanced movement analysis. The project uses a simulation-based detection engine that recreates player movement and physics in order to identify discrepancies between legitimate gameplay and modified client behavior. By analyzing how players move, interact with the world, and send network packets to the server, Grim can detect a variety of cheats such as reach hacks, speed hacks, and anti-knockback modifications. ...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 12
    BadUSB

    BadUSB

    Flipper Zero badusb payload library

    This project explores USB device emulation attacks—commonly called BadUSB—by demonstrating how commodity USB hardware can impersonate keyboards, network adapters, or storage devices to perform scripted actions on a host. It typically contains firmware examples, payloads, and explanations showing how a device presenting as a Human Interface Device (HID) can inject keystrokes, open shells, or orchestrate data exfiltration when plugged into a machine.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 13
    ShellCrash

    ShellCrash

    Run sing-box/mihomo as client in shell

    ShellCrash is a shell-based client runner for proxies like sing-box and mihomo, optimized for headless devices (e.g. OpenWrt routers). It provides scripted installation, automatic configuration reload, network port detection, and UI-less control via terminal. It simplifies running proxy services on embedded Linux devices.
    Downloads: 20 This Week
    Last Update:
    See Project
  • 14
    inux-router

    inux-router

    Set Linux as router in one command

    Set Linux as a router in one command. Able to provide Internet, or create WiFi hotspots. Support transparent proxy (redsocks). Also useful for routing VMs/containers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Elkeid

    Elkeid

    Open source solution that can meet the requirements of workloads

    ...It was born out of ByteDance’s internal security best practices, offering for community users a subset of its enterprise-grade capabilities. Elkeid combines kernel-level data collection, user-space agents, and runtime instrumentation (RASP) to detect malicious behavior, file anomalies, runtime exploits, and suspicious container activity. For container or cloud-native workloads, it also supports gathering audit logs from Kubernetes and correlating events across processes, network, and file activity to detect security threats. The platform packages data collection, event-streaming, and a rule/event engine (called “HUB”) — letting users define detection rules, alerts, baseline checks, and policy enforcement.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Kubernetes Goat

    Kubernetes Goat

    Kubernetes Goat is a "Vulnerable by Design" cluster environment

    Learn to attack or find security issues, misconfigurations, and real-world hacks within containers, Kubernetes, and cloud-native environments. Enumerate, exploit, and gain access to the workloads right from your browser. Understand how attackers think, work, and exploit security issues, and apply these learnings to detect and defend them. Also, learn best practices, defenses, and tools to mitigate, and detect in the real world. Learn the hacks, defenses, and tools. So that you can think like...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Network Security Toolkit (NST)

    Network Security Toolkit (NST)

    A network security analysis and monitoring toolkit Linux distribution.

    Network Security Toolkit (NST) is a bootable ISO image (Live USB Flash Drive) based on Fedora 42 providing easy access to best-of-breed Open Source Network Security Applications and should run on most x86_64 systems. The main intent of developing this toolkit was to provide the security professional and network administrator with a comprehensive set of Open Source Network Security Tools.
    Leader badge
    Downloads: 124 This Week
    Last Update:
    See Project
  • 18
    NeuralNote

    NeuralNote

    Audio Plugin for Audio to MIDI transcription using deep learning

    ...Its main purpose is to perform audio-to-MIDI transcription, allowing musicians to record a performance and automatically transform it into editable MIDI notes. NeuralNote supports polyphonic transcription, meaning it can detect multiple notes played simultaneously, making it useful for instruments such as piano or guitar. The system relies on neural network models to analyze audio signals and infer pitch, timing, and other musical attributes that can be represented as MIDI data. The resulting MIDI output can be edited, quantized, or exported to other instruments within a music production workflow.
    Downloads: 62 This Week
    Last Update:
    See Project
  • 19
    DebugSwift

    DebugSwift

    A toolkit to make debugging iOS applications easier

    DebugSwift is a comprehensive open-source toolkit aimed at iOS developers that streamlines and enhances the debugging experience for Swift-based applications by providing a rich set of interactive diagnostic tools. Designed to operate within the iOS environment (iOS 14+ and Swift 6+), it includes network and WebSocket inspectors for HTTP requests, detailed performance metrics (CPU, memory, FPS), and mechanisms to detect memory leaks and main thread violations in real time. The toolkit also provides developers with crash analysis features, console log monitoring, device and build information displays, and customizable debugging panels, all of which make it easier to troubleshoot edge cases and unexpected behavior. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 20
    Metabigor

    Metabigor

    Command-line OSINT and reconnaissance tool without API keys

    Metabigor is a command-line intelligence and OSINT tool designed to perform reconnaissance and security research tasks without requiring API keys. It focuses on simplifying access to public intelligence sources so that researchers, penetration testers, and bug bounty hunters can gather information efficiently from a single interface. It enables users to discover IP ranges, domains, and infrastructure details related to organizations, domains, or autonomous systems. Metabigor integrates...
    Downloads: 13 This Week
    Last Update:
    See Project
  • 21
    Tailsnitch

    Tailsnitch

    A security auditor for Tailscale configurations

    tailsnitch is a security auditing tool for Tailscale networks (tailnets) that scans configurations and device setups to detect risky or overly permissive settings, helping administrators maintain a secure mesh network. Written in Go and designed to be run either as a CLI or integrated into automated pipelines, tailsnitch performs dozens of checks against common access control policies, authentication key practices, network exposure issues, and device security settings. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Node Thermal Printer

    Node Thermal Printer

    Node.js module for thermal printers command line printing

    node-thermal-printer is a Node.js library that enables communication with thermal receipt printers using ESC/POS commands. It is designed for point-of-sale (POS) applications, allowing developers to generate receipts, barcodes, QR codes, and formatted text.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 23
    v2ray-rules-dat

    v2ray-rules-dat

    V2Ray routing rules file enhanced version, which can replace V2Ray

    v2ray-rules-dat is a repository that compiles and distributes enhanced rule data (domain lists, geo-IP/geo-domain data, block/proxy/detect lists) intended for use with tools like V2Ray, Xray-core, and similar network/proxy frameworks. The dataset serves as an alternative or supplement to official geoip/ geosite data files, often providing more up-to-date, community-curated entries — enabling better routing, blocking, or traffic management when using those proxy tools. ...
    Downloads: 16 This Week
    Last Update:
    See Project
  • 24
    Frigate NVR

    Frigate NVR

    NVR with realtime local object detection for IP cameras

    Frigate is a local network video recorder designed for real-time object detection on IP camera streams using machine learning. It runs entirely on local hardware and integrates closely with Home Assistant to provide smart surveillance without relying on cloud processing. The system uses OpenCV and TensorFlow to analyze video feeds and detect objects such as people, vehicles, and animals in real time.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 25
    XRAY

    XRAY

    XRay for recon, mapping and OSINT gathering from public networks

    XRAY is a modular security toolset that helps developers and security professionals analyze, fuzz, and test web applications, protocols, and network services for vulnerabilities. It provides a framework for writing and executing inspection modules that can parse structured data (JSON, XML, HTML), traverse graphs of endpoints, and perform intelligent probing guided by discovered surface area. XRay is typically used as a reconnaissance and vulnerability discovery engine in red-team or app-security workflows: it leverages extensible plugins to adapt to different protocols, inject payloads, and detect common bug classes such as injection flaws, misconfigurations, and unsafe endpoints. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB