Showing 25 open source projects for "security"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 1
    Azure CLI MCP

    Azure CLI MCP

    Talk with Azure using MCP

    An MCP server that enables AI assistants to interact with Microsoft Azure via the Azure CLI, allowing tasks such as listing resources, checking configurations, fixing issues, and creating new resources through conversational commands. ​
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    Wren Engine

    Wren Engine

    The Semantic Engine for Model Context Protocol(MCP)

    Wren Engine is a semantic engine designed to empower Model Context Protocol (MCP) clients and AI agents by providing accurate, contextual, and governed access to business data. It serves as a bridge between large language models (LLMs) and enterprise systems, facilitating seamless integration and interaction. ​
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    elevenlabs-api

    elevenlabs-api

    elevenlabs-api is an open source Java wrapper around the ElevenLabs

    ...To access your ElevenLabs API key, head to the official website, you can view your xi-API-key using the 'Profile' tab on the website. To set up your ElevenLabs API key, you must register it with the ElevenLabsAPI Java API. For any public repository security, you should store your API key in an environment variable, or external from your source code. The most realistic and versatile AI speech software, ever. Eleven brings the most compelling, rich and lifelike voices to creators and publishers seeking the ultimate tools for storytelling. Generate top-quality spoken audio in any voice and style with the most advanced and multipurpose AI speech tool out there. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    ProjectLibre - Project Management

    ProjectLibre - Project Management

    #1 alternative to Microsoft Project : Project Management & Gantt Chart

    ...Cloud supports multi-project management w/ role-based access, central resource pool, Dashboard, Portfolio View 💡 The AI Cloud version can generate full project plans (tasks, durations, dependencies) from a natural language prompt — in any language. 🌐 Try the Cloud: http://www.projectlibre.com/register/trial 💻 Mac tip: If blocked, go to System Preferences → Security → Allow install 🏆 InfoWorld “Best of Open Source” • Used at 1,700+ universities • 250K+ community 🙏 Support us: http://www.gofundme.com/f/projectlibre-free-open-source-development
    Leader badge
    Downloads: 14,794 This Week
    Last Update:
    See Project
  • Collect! is a highly configurable debt collection software Icon
    Collect! is a highly configurable debt collection software

    Everything that matters to debt collection, all in one solution.

    The flexible & scalable debt collection software built to automate your workflow. From startup to enterprise, we have the solution for you.
    Learn More
  • 5
    PC_Workman_HCK

    PC_Workman_HCK

    AI-powered PC monitoring that explains. Not shows numbers/spikes.

    PC_Workman is what 680 hours of coding after warehouse shifts looks like. Built on a laptop hitting 94°C, this AI-powered monitoring tool does what Task Manager can't: it understands your system, not just measures it. Features: - Time travel monitoring - debug issues from hours ago - AI diagnostics with HCK_GPT - Custom fan curves with profiles - Floating always-on-top widget - 2D system map - Cross-GPU support (NVIDIA/AMD/Intel) Four complete rebuilds. 29 features killed....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Visual Figaro

    System safety, dependability and security analysis

    Visual Figaro is an integrated environment to develop component libraries for the dependability modeling tool KB3 used by EDF (http://www.edf.fr/recherche/codes-de-calcul/kb3). KB3 is based on the FIGARO reliability modeling language, suitable for describing CTMC (continuous time Markov chains), DES (discrete event simulation) models, and for automatic generation of fault trees. FIGARO is objet oriented, close to natural language and enables building libraries of reusable components...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 7
    DeepCode

    DeepCode

    DeepCode extension for Visual Studio Code

    DeepCode AI has always been the backbone of Snyk code, which is why it's the fastest, most accurate SAST on the market. DeepCode AI, powering the Snyk platform, utilizes multiple AI models, is trained on security-specific data, and is all curated by top security researchers to give you all the power of AI without any of the drawbacks. With 11 supported languages, and multiple AI models, Snyk's DeepCode AI was designed to find and fix vulnerabilities and manage tech debt. DeepCode AI powers Snyk's one-click security fixes and comprehensive app coverage, letting developers build fast while staying secure. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 8
    FaceAccess Facial Recognition System

    FaceAccess Facial Recognition System

    FaceAccess is an Access Control System based on Facial Recognition

    With the growing need to exchange information and share resources, information security has become more important than ever in both the public and private sectors. Although many technologies have been developed to control access to files or resources, to enforce security policies, and to audit network usages, there does not exist a technology that can verify that the user who is using the system is the same person who logged in.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Immutable Sparse Wave Trees (WaveTree)

    Realtime bigdata tool for bit strings up to 2^63 based on AVL forest

    Realtime bigdata tool at the bit level based on immutable AVL forest which can be run in memory or, in future versions, as a merkle forest like a blockchain. Main object is a sparse bit string (Bits) that efficiently scales up to 2^63 bits normally compressed as forest has duplicated substrings. Bits objects support reading bit, byte, short, int, or long (Java primitives) at any bit index in 64 bit range. Example: instead of building a class to hold a header and then data, represent all of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • All-in-one security tool helps you prevent ransomware and breaches. Icon
    All-in-one security tool helps you prevent ransomware and breaches.

    SIEM + Detection and Response for IT Teams

    Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.
    Learn More
  • 10

    ANNFiD

    A forensic file identification tool using neural networks

    Just carved a bunch of bytes and have no idea what they could be? Maybe ANNFiD can help. ANNFiD uses neural network to identify byte patterns. It can be trained and has a GUI to help in the process. The tool is still on a very early stage, but could improve exponentially with the help of the developer community
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Reactor Breeder

    A Genetic Algorithm for Reactors in StarMade

    This software uses a genetic algorithm to "evolve" reactor designs for Schema's space-simulation game, Star-Made (http://star-made.org/). One of the more unique aspects of the game is that ship power management is not as simple as filling a cube with power generation blocks. This mechanism leads to difficulties in getting maximal power generation out of such reactors. This program rectifies this issue by using a self-organizing variant of brute force search. Much of the search space is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    iAccess is a trust negotiation-based authorization service. It provides entities with the right to protect their own credentials and negotiate with remote (unknown) servers access to resources. iAccess works with X.509 and SAML standards.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    This project provides a java implementation of the Captcha project ( see http://www.captcha.net ). A CAPTCHA is a program that can generate and grade tests that: -Most humans can pass. -Current computer programs can't pass.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    The Secure Mobile Agents (SeMoA) platform constitutes a secure runtime environment for Java-based mobile software agents.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    ANts P2P
    ANts P2P realizes a third generation P2P net. It protects your privacy while you are connected and makes you not trackable, hiding your identity (ip) and crypting everything you are sending/receiving from others.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 16
    ContraCaptcha is a Java-based libary for solving (image-based) captchas. It provides classes for image processing and character recognition. It also includes solvers for some of the popular captcha-systems in use DISCLAIMER: only for learning purpose (;
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Security is a subject of major concern in mobile agents. This project provides a security framework that allows the protection of mobile agents from third parties. A self-protected approach, where the agents themselves manage the process, is used.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    TACS (Trust Ant Colony System) is a Trust model for P2P, Ad-hoc and Wireless Sensor networks (also valid for multi-agent systems) based on the bio-inspired algorithm ACS (Ant Colony System).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    GridBlocks builds a grid application framework via easy-to-use building blocks in distributed environment. The framework offers components for Grid security, distributed storage, computing, and Portlet web interfaces.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Java implementation of Sudoku. Visually attractive, interactive version with intelligent and brute force solving strategies.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    InSecT - Invincible Security Technology - an intelligent firewall and intrusion detection system
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    It moves by itself inside networks like virus infection & plagues, it is being written to solve computer virus problem drastically and responsibly. It is legal, free and open for public domain to improve W3 ICT Security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    A.I. security app. Development ceased.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    The purpose of SNX is to have a modular series of components that report back to a central repository and 'AI' for pattern recognition and anomoly detection. This is to help with IDS systems, and to move to the next generation of security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    mBuddy is a project with the initial goal of allowing users of mobile devices (Java, J2ME) the option to find others based on interests, diet & other factors. Objectives are to allow intelligent, conditional, secure exchange of contact info, A/V & more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next