Showing 13 open source projects for "tamper data"

View related business solutions
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Access competitive interest rates on your digital assets.

    Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • 1
    Chainlink

    Chainlink

    node of the decentralized oracle network

    Securely connect smart contracts with off-chain data and services. Chainlink decentralized oracle networks provide tamper-proof inputs, outputs, and computations to support advanced smart contracts on any blockchain. Start building your hybrid smart contract with Chainlink. Use decentralization, trusted nodes, premium data, and cryptographic proofs to connect highly accurate and available data/APIs to any smart contract.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    Nox

    Nox

    Rust implementation of the Fluence network peer

    Nox is a decentralized, serverless execution platform for running secure WebAssembly (Wasm) modules over the Fluence peer-to-peer network. It enables developers to build and deploy composable services without central servers, ensuring tamper-resistant logic and trustless computation. Nox is designed to support multi-peer coordination, decentralized app logic, and data privacy, using Fluence’s Aqua programming model. Ideal for Web3 developers, Nox provides the building blocks to run interoperable backends directly from the edge.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    syslog-ng

    syslog-ng

    Log management solution that improves the performance of SIEM

    ...Instead of deploying multiple agents on hosts, organizations can unify their log data collection and management. syslog-ng Store Box provides automated archiving, tamper-proof encrypted storage, granular access controls to protect log data. The largest appliance can store up to 10TB of raw logs.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 4
    immudb

    immudb

    Immutable database based on zero trust, SQL and Key-Value, tamperproof

    immudb is a database with built-in cryptographic proof and verification. It tracks changes in sensitive data and the integrity of the history will be protected by the clients, without the need to trust the database. It can operate both as a key-value store, and/or as a relational database (SQL). Traditional database transactions and logs are mutable, and therefore there is no way to know for sure if your data has been compromised. immudb is immutable. You can add new versions of existing...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 5
    Trillian

    Trillian

    A transparent, highly scalable and cryptographically verifiable data

    ...Common use cases include certificate transparency, package registries, and audit logs where public verifiability or tamper evidence is required. Trillian exposes both “log” and “map” primitives so developers can choose between append-only timelines or verifiable dictionaries depending on their data model. By making verification independent of trust in the operator, trillian helps build systems that are auditable by external parties.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    OpenArchiver

    OpenArchiver

    An open-source platform for legally compliant email archiving

    OpenArchiver is a comprehensive, self-hosted email archiving and compliance platform built to help organizations ingest, index, store, and search email communication data across diverse sources like Gmail, Microsoft 365, IMAP, PST, and more. It’s designed for scenarios where reliable, tamper-proof archiving and full-text search across both emails and attachments are essential for legal discovery, compliance, or long-term records retention. The platform combines a modern web UI with powerful backend services, including fast indexing, deduplication, encryption at rest, and asynchronous ingestion workflows, making it suitable for both small teams and enterprise deployments. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    PyScaffold

    PyScaffold

    Python project template generator with batteries included

    PyScaffold is a project generator for bootstrapping high-quality Python packages, ready to be shared on PyPI and installable via pip. It is easy to use and encourages the adoption of the best tools and practices of the Python ecosystem, helping you and your team to stay sane, happy and productive. The best part? It is stable and has been used by thousands of developers for over half a decade! Checkout out this demo project, which was set up using PyScaffold and if you are still not convinced...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    -PTRN--Petoron--token
    ...Contract Details: - Ethereum Mainnet - Contract: 0xCe675D637bB5E3aDAFDC4d1e475a35D75F6D95bc - Total supply: 20,000,000 PTRN - Treasury: 0x31187017dC243d4D46126bB5a160Bb98FFeef39b Petoron is an entire cryptography ecosystem developed to give people real tools for privacy and data protection: - 🔐 PTBC — Petoron Time Burn Cipher (time-based self-destructing encryption) - 📜 PSC — Petoron Seal Contracts (tamper-proof sealed data) - 📦 PCA — Petoron Crypto Archiver (secure archiving) - 🧹 PLD — Petoron Local Destroyer (irreversible deletion) - ⚛️ PQS — Petoron Quantum Standard (quantum-resistant encryption) - 💬 P2P Messenger — fully encrypted peer-to-peer communication https://github.com/01alekseev/-PTRN--Petoron--token
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    World Cup NFT Fantasy

    World Cup NFT Fantasy

    World Cup NFT Fantasy is a prediction-based game

    WC NFT Fantasy is a Prediction game where you can play a game to win a prize if you guessed the winning teams right. Extending the idea of CryptoFishx we have built an application that anyone can participate and win with the confidence that no one is going to tamper or cheat in the system. Having it on the on chain (on the blockchain) enables us to use smart contracts which are public (anyone can see and read) immutable (once deployed it cannot be changed) code that governs everyone's interactions with the game. Which means, no third party including us can tamper with the data once set. Anyone can confirm that game works as intended by reading the code and the final prize pool is handed over to the winner by code itself so anyone can confirm that is correct.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 10
    Tamper Dev

    Tamper Dev

    Extension that allows you to intercept and edit HTTP/HTTPS requests

    If you are a developer, you can use Tamper Dev to debug your websites, or if you are a pentester, you can use it to search for security vulnerabilities by inspecting the HTTP traffic from your browser. Unlike most other extensions, Tamper Dev allows you to intercept, inspect and modify the requests before they are sent to the server. This extension provides functionality similar to Burp Proxy, MITM Proxy, OWASP ZAP, Tamper Data, and Postman Proxy, but without the need of additional software, with full support of HTTPS connections, and trivial to set-up (just install).
    Downloads: 25 This Week
    Last Update:
    See Project
  • 11
    ciphermail

    ciphermail

    Ciphermail email encryption gateway (S/MIME, OpenPGP, PDF encryption)

    ...Ciphermail Email Encryption Gateway has a built-in CA which can be used to issue X.509 certificates for internal and external users. For additional security, keys can be securely generated and stored in a tamper proof Hardware Security Module (HSM). The built-in Data Leak Prevention (DLP) module can be used to prevent certain information to leave the organization via email. Ciphermail can be installed on most Linux and Unix based systems. Installation packages are available for Ubuntu, Debian, Red Hat/CentOS and OpenSUSE. A ready to run virtual appliance for VMware and Hyper-V is available.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Free Web Application Firewall

    Free Web Application Firewall

    Free Web Application Firewall

    The FreeWAF provides specialized, layered application threat protection. It protects your web-based applications and internet-facing data from attack and data loss. Using advanced techniques to provide bidirectional protection against sophisticated threats like SQL injection and cross-site scripting, it helps you prevent identity theft, financial fraud and corporate espionage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The Watermarks is a java library for images and text watermarking fingerprinting and tamper-proofing. The supported carrier formats for a watermark are JPEG and PDF. The project also aim to build a test environment to evaluate robustness of implemented a
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB