Showing 514 open source projects for "verify"

View related business solutions
  • Omnichannel contact center platform for enterprises. Icon
    Omnichannel contact center platform for enterprises.

    For Call centers or BPOs with a very high volume of calls

    Deliver a personalized customer experience with every interaction, across every channel, with uContact, net2phone’s cloud contact center solution.
  • Better time tracking for projects, billing, and payroll Icon
    Better time tracking for projects, billing, and payroll

    Journyx makes it easy to gather accurate time and expense data so you can make smarter, more informed business decisions.

    This product is especially great for project managers, COOs, finance professionals, accountants, or payroll admins in any industry.
  • 1
    Certbot

    Certbot

    Get free HTTPS certificates forever from Let's Encrypt

    Certbot is a fully-featured, easy-to-use, extensible client for the Let's Encrypt CA. It fetches a digital certificate from Let’s Encrypt, an open certificate authority launched by the EFF, Mozilla, and others. This certificate then lets browsers verify the identity of web servers and ensures secure communication over the Web. Obtaining and maintaining a certificate is usually such a hassle, but with Certbot and Let’s Encrypt it becomes automated and hassle-free. With just a few simple...
    Downloads: 432 This Week
    Last Update:
    See Project
  • 2
    shadPS4

    shadPS4

    PS4 emulator for Windows,Linux,MacOS

    shadPS4 is an early PlayStation 4 emulator for Windows, Linux, and macOS written in C++. If you encounter problems or have doubts, do not hesitate to look at the Quickstart. To verify that a game works, you can look at shadPS4 Game Compatibility. To discuss shadPS4 development or suggest ideas, join the Discord server. To get the latest news, go to our X (twitter) or our website.
    Downloads: 64 This Week
    Last Update:
    See Project
  • 3
    Umbrel

    Umbrel

    A beautiful personal server OS for Raspberry Pi or any Linux distro

    ... nothing to do with someone else’s computer. They’re a part of your private life, and now they can all be stored by you, in your home, on your Umbrel. The Bitcoin network is made up of thousands of nodes that verify every single transaction in the blockchain. Some of them mine Bitcoin too, but unlike a mining node, running a non-mining node doesn’t require expensive hardware. Achieve unparalleled privacy by connecting your wallet directly to the Bitcoin node on your Umbrel.
    Downloads: 24 This Week
    Last Update:
    See Project
  • 4
    CSV Lint

    CSV Lint

    CSV Lint plug-in for Notepad++ for syntax highlighting

    ... it's a quality control tool to examine, verify or polish up a dataset before further processing.
    Downloads: 22 This Week
    Last Update:
    See Project
  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
  • 5
    Java JWT

    Java JWT

    Java implementation of JSON Web Token (JWT)

    ... signing and verification operations. When using RSA or ECDSA algorithms and you just need to sign JWTs you can avoid specifying a Public Key by passing a null value. The same can be done with the Private Key when you just need to verify JWTs.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 6
    k6

    k6

    A modern load testing tool, using Go and JavaScript

    ... to the cloud using the same script for both environments. Verify that applications can handle the expected traffic. Adapt your testing: stress tests, peak tests, soak tests, etc. Mix browser and API testing—interact with real browsers and collect frontend metrics to get a holistic user view. Simulate real-world traffic in your chaos experiments. Inject system failures in your k6 tests.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 7
    Mockito

    Mockito

    Most popular Mocking framework for unit tests written in Java

    Mockito downloads and instructions for setting up Maven, Gradle and other build systems are available from the Central Repository and Bintray. Mockito 3.x requires Java 8, but otherwise doesn’t introduce any breaking changes compared to the 2.x series. Mockito 2.25.0 had an important feature added for anyone using mockito-inline. In particular anyone using Kotlin (which demands using mockito-inline) and PowerMock (which exacerbates the problem even more) will want to add this to all of their...
    Downloads: 14 This Week
    Last Update:
    See Project
  • 8
    Wire Desktop

    Wire Desktop

    Wire for desktop

    ... on GitHub for anyone to verify. If you compile the open source software that we make available from time to time to develop your own mobile, desktop or web application, and cause that application to connect to our servers for any purposes, we refer to that resulting application as an “Open Source App”.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 9
    Notesnook

    Notesnook

    A fully open source & end-to-end encrypted note taking alternative

    ... or personal diary with an extra layer of security. Your notes vault is a super secure way to store your passwords, credentials & other secrets. Free or Pro, you get the same level of privacy. Making privacy a paid feature means only the privileged few deserve it but privacy is your right. And rights don't have a price tag, or do they? To verify that your notes are actually encrypted (and we aren't just lying), you can use our open source tool, Vericrypt.
    Downloads: 11 This Week
    Last Update:
    See Project
  • Easy management of simple and complex projects Icon
    Easy management of simple and complex projects

    We help different businesses become digital, manage projects, teams, communicate effectively and control tasks online.

    Plan more projects with Worksection. Use Gantt chart and Kanban boards to organize your projects, get your team onboard and assign tasks and due dates.
  • 10
    OpenPGP.js

    OpenPGP.js

    OpenPGP implementation for JavaScript

    ... applications. It should allow you to sign, encrypt, decrypt, and verify any kind of text, in particular e-mails, as well as managing keys. Version 3.0.0 of the library introduces support for public-key cryptography using elliptic curves. We use native implementations on browsers and Node.js when available.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 11
    MedicalGPT

    MedicalGPT

    MedicalGPT: Training Your Own Medical GPT Model with ChatGPT Training

    MedicalGPT training medical GPT model with ChatGPT training pipeline, implementation of Pretraining, Supervised Finetuning, Reward Modeling and Reinforcement Learning. MedicalGPT trains large medical models, including secondary pre-training, supervised fine-tuning, reward modeling, and reinforcement learning training.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 12
    OctoBot

    OctoBot

    Cryptocurrency trading bot for TA, arbitrage and social trading

    OctoBot is a trading robot that is designed to be easy to use and infinitely customizable. OctoBot is built for people who don't have much time or do not easily trust crypto-world projects. Many trading automation tools exist but most of them are complicated to use, expensive, do not behave as intended, or are meant to be used by professional traders. Moreover, when a favorable trend is spotted, it can be difficult to maximize profit from it: trading takes a lot of time, and when it's done...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 13
    cpp-httplib

    cpp-httplib

    A C++ header-only HTTP/HTTPS server and client library

    ... be suppressed on a per-message basis, but there is no way to make the OpenSSL library do so for its internal communications. If your program needs to avoid being terminated on SIGPIPE, the only fully general way might be to set up a signal handler for SIGPIPE to handle or ignore it yourself. cpp-httplib officially supports only the latest Visual Studio. It might work with former versions of Visual Studio, but I can no longer verify it.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 14
    Mask Network

    Mask Network

    The portal to the new, open Internet

    Mask Network brings privacy and benefits from Web3 to social media like Facebook & Twitter - with an open-sourced browser extension. Use the Mask Extension to hide your content from prying eyes and allow only your target audience to see it. If you’re launching a new project on the Ethereum, BSC, Polygon, or Arbitrum networks, ITOs are a completely new way of launching decentralized assets fairly. With integrated widgets on social media platforms, you’ll be able to view the latest prices of...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 15
    PHP-JWT

    PHP-JWT

    PHP package for JWT

    A simple library to encode and decode JSON Web Tokens (JWT) in PHP, conforming to RFC 7519. Use composer to manage your dependencies and download PHP-JWT. Optionally, install the paragonie/sodium_compat package from composer if your php is < 7.2 or does not have libsodium installed. If your private key contains \n characters, be sure to wrap it in double quotes "" and not single quotes '' in order to properly interpret the escaped characters. You must specify supported algorithms for your...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 16
    Proxy_Pool

    Proxy_Pool

    Python crawler proxy IP pool (proxy pool)

    The main function of the crawler agent IP pool project is to regularly collect free agents published on the Internet for verification and storage, and to regularly verify and store agents to ensure the availability of agents, and to provide API and CLI. At the same time, you can also expand the proxy source to increase the quality and quantity of the proxy pool IP.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 17
    HiddenVM

    HiddenVM

    HiddenVM — Use any desktop OS without leaving a trace

    If at any time Tails pushes an unexpected update, and HiddenVM is not yet updated for it, and you are stuck with a new Tails and no working HiddenVM version, you can re-download and temporarily use an earlier version of Tails until HiddenVM is updated. There are archived direct HTTP download mirrors of Tails images, archived official torrents with PGP signatures, or third-party archives at linuxtracker.org or fosstorrents.com, etc. (Always verify third-party torrents with archived official PGP...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 18
    Pipy

    Pipy

    Pipy is a programmable proxy for the cloud, edge and IoT

    Pipy is a high performance programmable proxy for the cloud, edge and IoT. Its core is written in C++ with excellent cross-platform capability. It is both high performance and low resource. Pipy comes with a built-in JavaScript engine that allows easy custom logic implementation with the simple JS syntax, greatly reducing the complexity in high-performance network programming. It is suitable for a variety of hardware architectures including x86, ARM64, Loongson and RISC-V. It is also...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 19
    Argo Rollouts

    Argo Rollouts

    Progressive Delivery for Kubernetes

    Argo Rollouts is a Kubernetes controller and set of CRDs that provide advanced deployment capabilities such as blue-green, canary, canary analysis, experimentation, and progressive delivery features to Kubernetes. Argo Rollouts (optionally) integrates with ingress controllers and service meshes, leveraging their traffic shaping abilities to gradually shift traffic to the new version during an update. Additionally, Rollouts can query and interpret metrics from various providers to verify key...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 20
    SwiftyRSA

    SwiftyRSA

    RSA public/private key encryption in Swift

    Public key RSA encryption in Swift. SwiftyRSA is used in the Scoop iOS app to encrypt driver license numbers before submitting them to Checkr through our API. To enable using public/private RSA keys on iOS, SwiftyRSA uses a couple techniques like X.509 header stripping so that the keychain accepts them.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    Phan

    Phan

    Phan is a static analyzer for PHP

    Phan is a static analyzer for PHP. Phan prefers to avoid false positives and attempts to prove incorrectness rather than correctness. Phan looks for common issues and will verify type compatibility on various operations when type information is available or can be deduced. Phan has a good (but not comprehensive) understanding of flow control and can track values in a few use cases (e.g. arrays, integers, and strings). With Phan installed, you'll want to create a .phan/config.php file in your...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    data-diff

    data-diff

    Efficiently diff rows across two different databases

    We're excited to announce the launch of a new open-source product, data-diff that makes comparing datasets across databases fast at any scale. data-diff automates data quality checks for data replication and migration. In modern data platforms, data is constantly moving between systems, and at the modern data volume and complexity, systems go out of sync all the time. Until now, there has not been any tooling to ensure that when the data is correctly copied. Replicating data at scale, across...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 23
    AWS X-Ray Daemon

    AWS X-Ray Daemon

    The AWS X-Ray daemon listens for traffic on UDP port 2000

    The AWS X-Ray daemon listens for traffic on UDP port 2000, gathers raw segment data, and relays it to the AWS X-Ray API. The daemon works in conjunction with the AWS X-Ray SDKs and must be running so that data sent by the SDKs can reach the X-Ray service. The X-Ray SDK sends segment documents to the daemon to avoid making calls to AWS directly. You can send the segment/subsegment in JSON over UDP port 2000 to the X-Ray daemon, prepended by the daemon header. On AWS Lambda and AWS Elastic...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 24
    PSR Log

    PSR Log

    An interface that describes a logger

    .... The interfaces and classes described as well as relevant exception classes and a test suite to verify your implementation are provided as part of the psr/log package. Note that this is not a logger of its own. It is merely an interface that describes a logger. You can pick one of the implementations of the interface to get a logger. If you want to implement the interface, you can require this package and implement Psr\Log\LoggerInterface in your code.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25
    Covermyass

    Covermyass

    Post-exploitation tool to cover your tracks on a compromised machine

    Covermyass is a post-exploitation tool to cover your tracks on various operating systems. It was designed for penetration testing "covering tracks" phase, before exiting the compromised server. At any time, you can run the tool to find which log files exists on the system, then run again later to erase those files. The tool will tell you which file can be erased with the current user permissions. Files are overwritten repeatedly with random data, in order to make it harder for even very...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next