Showing 8 open source projects for "security linux"

View related business solutions
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 1
    ByteHook

    ByteHook

    ByteHook is an Android PLT hook library

    ByteHook is a ByteDance-hosted project whose name suggests a hooking or instrumentation library, likely used for hooking system calls or API calls for monitoring, sandboxing or instrumentation. The repository appears to aim at low-level hooking/injection capabilities, perhaps to support runtime introspection, behavioral monitoring, or hooking-based instrumentation (e.g. for security, tracing, sandboxing, or debugging). Because hooking is a common technique for intercepting library or system...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Amoeba

    Amoeba

    Linux Command Line Learning Program

    Amoeba is a Linux command-line learning program that observes and adapts to the Linux command line storing learned strings and their usage data. It enhances command-line proficiency by capturing command outputs, adapting string lengths, and periodically saving knowledge. Sandboxing is essential for security, and optionally a virtual machine would further isolates it from the host system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Raiden block cipher: An extremely lightweight and fast block cipher, developed using genetic programming, with the intention to be an alternative to TEA. This cipher is as fast as TEA, and without many of its known weaknesses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    A packet dissector driven by machine learning algorithms. You train it to recognize specific types of packets by showing it examples and counterexamples of some packet type, and it will figure out which bits in the packet define it as the type you seek.
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    Anticeptron is an attempt to do what people expect from every captcha: a strong system with the ability to prevent bots from doing unauthorized access.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    EverCrack cryptanalysis engine. The goal is cryptanalysis of any class of cipher. The focus now is the kernel - cryptanalysis of unilateral monalpha substitution ciphers extremely quickly, and later, cryptanalysis of complex ciphers for the kernel.
    Leader badge
    Downloads: 19 This Week
    Last Update:
    See Project
  • 7
    M-ICE is a modular hostbased intrusion detection framework. It is used as middleware to close the gap between IDS research and IDS development. M-ICE consists of various parts that can be connected together by using network-or interprocess-communication
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    The development of a biometric system and applications e.g. Access Control based on the system to recognize and verify people. The primary goal is face recognition, but other human attributes might get used too in the future.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB