Showing 133 open source projects for "can="

View related business solutions
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 1
    authentik

    authentik

    The authentication glue you need

    ...You can adopt authentik to your environment, regardless of your requirements. Need an Active-Directory integrated SSO Provider? Do you want to implement a custom enrollment process for your customers? Are you developing an application and don't want to deal with User verification and recovery? authentik can do all of that, and more.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 2
    truffleHog

    truffleHog

    Searches through git repositories for high entropy strings and secrets

    truffleHog searches through git repositories for high entropy strings and secrets, digging deep into commit history. TruffleHog runs behind the scenes to scan your environment for secrets like private keys and credentials, so you can protect your data before a breach occurs. Secrets can be found anywhere, so TruffleHog scans more than just code repositories, including SaaS and internally hosted software. With support for custom integrations and new integrations added all the time, you can secure your secrets across your entire environment. TruffleHog is developed by a team entirely comprised of career security experts. ...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 3
    Gobuster

    Gobuster

    Directory/File, DNS and VHost busting tool written in Go

    ...Provides several modes, like the classic directory brute-forcing mode, DNS subdomain brute-forcing mode, the mode that enumerates open S3 buckets and looks for existence and bucket listings, and the virtual host brute-forcing mode (not the same as DNS!). Since this tool is written in Go you need to install the Go language/compiler/etc. Full details of installation and set up can be found on the Go language website. Once installed you have two options. You need at least go 1.16.0 to compile gobuster.
    Downloads: 42 This Week
    Last Update:
    See Project
  • 4
    Guardian

    Guardian

    Elixir Authentication

    ...You can use Guardian tokens to authenticate web endpoints (Plug/Phoenix/X), channels/Sockets (Phoenix - optional), and any other system you can imagine. If you can attach an authentication token you can authenticate it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 5
    Pow

    Pow

    Robust, modular, and extendable user authentication system

    ...The easiest way to use Pow with Phoenix is to use a :otp_app in function calls and set the app environment configuration. It will keep a persistent fallback configuration that you configure in one place. Pow ships with a session plug module. You can easily switch it out with a different one. Pow is extremely modular and fully customizable. As your platform scales, each moving part can be modified or replaced ad-hoc. Several extensions are included in Pow so you with no effort can add secure features to your app.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Casdoor

    Casdoor

    An open-source Identity and Access Management (IAM)

    ...Access to Casdoor is very convenient, please visit How to Connect to Casdoor for details. Casdoor also support sign up directly. By filling your Username, Display name, Password and Email, after your receive your Email code, you can sign up in Casdoor.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    Authenticator Pro

    Authenticator Pro

    Two-Factor Authentication (2FA) client for Android + Wear OS

    ...Unlike alternative user-hostile applications, Authenticator Pro does not lock-in your data or communicate with distant servers. Everything is safely protected in the app and can be exported at any time.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 8
    Apache APISIX

    Apache APISIX

    The cloud-native API gateway

    ...Compared with traditional API gateways, APISIX has dynamic routing and plug-in hot loading, which is especially suitable for API management under micro-service system. You can use Apache APISIX as a traffic entrance to process all business data, including dynamic routing, dynamic upstream, dynamic certificates, A/B testing, canary release, blue-green deployment, limit rate, defense against malicious attacks, metrics, monitoring alarms, service observability, service governance, etc.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    hello.js

    hello.js

    API library for connecting with OAuth2 services

    ...HelloJS standardizes paths and responses to common APIs like Google Data Services, Facebook Graph and Windows Live Connect. It’s modular, so that list is growing. No more spaghetti code! Compiled source, which combines all of the modules, can be obtained from GitHub, and source files can be found in Source. The Bower package shall install the aforementioned "/src" and "/dist" directories. The "/src" directory provides individual modules which can be packaged as desired. If a network string is provided: A consent window to authenticate with that network will be initiated. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • 10
    serve

    serve

    Static file serving and directory listing

    ...In general, serve also provides a neat interface for listing the directory's contents. The quickest way to get started is to just run npx serve in your project's directory. If you prefer, you can also install the package globally using Yarn (you'll need at least Node.js LTS). The core of serve is serve-handler, which can be used as middleware in existing HTTP servers. In order to customize the default behaviour, you can also pass custom routing rules, provide your own methods for interacting with the file system and much more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    CloudFoundry UAA

    CloudFoundry UAA

    CloudFoundry User Account and Authentication (UAA) Server

    The UAA is a multi tenant identity management service, used in Cloud Foundry, but also available as a stand alone OAuth2 server. Its primary role is as an OAuth2 provider, issuing tokens for client applications to use when they act on behalf of Cloud Foundry users. It can also authenticate users with their Cloud Foundry credentials, and can act as an SSO service using those credentials (or others). It has endpoints for managing user accounts and for registering OAuth2 clients, as well as various other management functions.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    Doorkeeper

    Doorkeeper

    Doorkeeper is an OAuth 2 provider for Ruby on Rails / Grape

    ...Doorkeeper follows Rails maintenance policy and supports only supported versions of the framework. Currently, we support Ruby on Rails 5 and higher. Extensions that are not included by default and can be installed separately. These applications show how Doorkeeper works and how to integrate with it. Start with the oAuth2 server and use the clients to connect with the server. See list of tutorials in order to learn how to use the gem or integrate it with other solutions/gems.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    jwt-auth

    jwt-auth

    JSON web token authentication for Laravel and Lumen

    ...The most common way to create a token would be to authenticate the user via their login credentials, and if successful return a token corresponding to that user. You can also skip user authentication and just pass in a User object. Once a user has logged in with their credentials, then the next step would be to make a subsequent request, with the token, to retrieve the users' details, so you can show them as being logged in. To make authenticated requests via http using the built in methods, you will need to set an authorization header. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    2FAS Auth for iOS

    2FAS Auth for iOS

    Source code for 2FAS Auth iOS app

    ...Designed with native iOS conventions, it supports Face ID and Touch ID to quickly unlock the app while keeping authentication secrets encrypted locally on the device, so sensitive data never leaves the user’s control. The client is also structured to work offline, meaning you can generate codes without a network connection, and it integrates with companion browser extensions or other 2FAS sync tools so tokens can be backed up or restored across devices securely.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    Broot

    Broot

    A new way to see and navigate directory trees

    ...That's what makes it usable where the old tree command would produce pages of output. Hit alt/enter and you're back to the terminal in the desired location. This way, you can navigate to a directory with the minimum amount of keystrokes, even if you don't exactly remember where it is. Broot is fast and doesn't block (any keystroke interrupts the current search to start the next one). Never lose track of file hierarchy while you search. Broot tries to select the most relevant file. You can still go from one match to another one using tab or arrow keys. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    PHP OAuth 2.0 Server

    PHP OAuth 2.0 Server

    A spec compliant, secure by default

    league/oauth2-server is a standards compliant implementation of an OAuth 2.0 authorization server written in PHP which makes working with OAuth 2.0 trivial. You can easily configure an OAuth 2.0 server to protect your API with access tokens, or allow clients to request new access tokens and refresh them. The latest version of this package supports PHP 7.2, PHP 7.3, PHP 7.4, PHP 8.0. The openssl and json extensions are also required. All HTTP messages passed to the server should be PSR-7 compliant. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 17
    VoidAuth

    VoidAuth

    Single Sign-On for Your Self-Hosted Universe

    VoidAuth is a self-hosted, open-source Single Sign-On (SSO) authentication provider that simplifies managing user access and identity for a suite of private applications. Built around standards like OpenID Connect (OIDC), it serves as a central authentication authority so that users can log in once and gain secure access to multiple services without duplicating credentials. The platform offers a user and group management interface where administrators can invite users, enable self-registration, and configure policies like multi-factor authentication and password resets with email verification. Designed with flexibility in mind, VoidAuth supports features such as passkeys and customizable branding, making it adaptable to a wide range of deployment environments and aesthetic preferences.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Raivo OTP

    Raivo OTP

    A native, lightweight and secure one-time-password (OTP) client

    Raivo OTP’s iOS application is a native, secure, and user-friendly two-factor authentication (2FA) client that generates time-based (TOTP) and counter-based (HOTP) one-time passwords to protect accounts, all built specifically for iOS devices using modern Swift. It helps users replace or supplement traditional SMS or email 2FA by securely storing OTP secrets and displaying rotating codes that can be synced via iCloud across Apple devices, reducing the risk of losing access when switching devices. Users can easily add new accounts by scanning QR codes or entering secrets manually, assign custom icons for better visual organization, and quickly search through stored tokens to find the one they need. The app includes optional biometric unlocking with Face ID or Touch ID so access to sensitive OTPs remains both fast and secure. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    OpenAuth

    OpenAuth

    Universal, standards-based auth provider

    ...It emphasizes secure defaults, including robust token handling, CSRF protections, and clear session lifecycles, while leaving room for customization where apps need it. Developers can bring their own database or storage layer and wire it through adapters without rewriting core logic. The goal is to remove boilerplate around sign-up/sign-in, user profiles, and authorization checks so teams can ship features faster.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Authelia

    Authelia

    The Single Sign-On Multi-Factor portal for web apps

    ...Written in Go and React, authorization policies and many other backend tasks are completed in mere milliseconds and login portal loading times of 100 milliseconds makes it one of the fastest solutions available. Processors can use a lot of electricity, but when idle usage is basically so low that you can't measure it, and active usage in a small business environment being under 1% you can rest easy (with the exclusion of password hashing).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Proton Authenticator for iPhone

    Proton Authenticator for iPhone

    iOS client for Proton Authenticator

    ...Written in Swift with native iOS APIs, it supports scanning QR codes to add new authentication tokens, auto-sorting entries, and fast entry selection, all within a sleek, responsive iOS interface. The application encrypts secrets on the device and uses Proton’s encrypted sync service if enabled so that users can recover or replicate their authentication tokens across devices without compromising security. It integrates with iOS features like Face ID and Touch ID to protect access to the app and tokens, ensuring only authorized users can view or generate verification codes. The repository’s open-source nature helps security professionals and auditors inspect core logic related to cryptography and token workflow.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Uptrace

    Uptrace

    Open source APM: OpenTelemetry traces, metrics, and logs

    Uptrace is an open-source APM tool that supports distributed tracing, metrics, and logs. You can use it to monitor applications and set up automatic alerts to receive notifications via email, Slack, Telegram, and more. Uptrace is an open-source APM that supports OpenTelemetry tracing, metrics, and logs. You can use it to monitor applications and set up alerts to receive notifications via email, Slack, Telegram, and more. Uptrace collects and analyzes data from a variety of sources, including servers, databases, cloud providers, monitoring tools, and custom applications. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    ORY Oathkeeper

    ORY Oathkeeper

    A cloud native Identity & Access Proxy / API (IAP)

    ...An Identity & Access Proxy is typically deployed in front of (think API Gateway) web-facing applications and is capable of authenticating and optionally authorizing access requests. The Access Control Decision API can be deployed alongside an existing API Gateway or reverse proxy. Ory offers a support plan for Ory Network Hybrid, including Ory on private cloud deployments. If you have a self-hosted solution and would like help, consider a support plan! The team at Ory has years of experience in cloud computing. Ory's offering is the only official program for qualified support from the maintainers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    BoxyHQ Enterprise SaaS Starter Kit

    BoxyHQ Enterprise SaaS Starter Kit

    Kickstart your enterprise app development with the Next.js SaaS

    Enterprise-ready SaaS Starter Kit is a Next.js-based SaaS Starter Kit that can save hundreds of development hours while building enterprise-ready SaaS apps. Kickstart your enterprise app development with Next.js SaaS Starter Kit.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Comeonin

    Comeonin

    Password hashing specification for the Elixir programming language

    ...The library’s helpers make it straightforward to add registration and login flows that resist brute-force and side-channel attacks. Migration paths and checks are included so you can upgrade algorithms or work factors over time without breaking existing credentials. Its focus on practical ergonomics—clear APIs, sensible defaults, and good docs—has made it the de facto choice for password handling in Elixir. By centralizing hashing concerns, Comeonin helps teams avoid subtle security mistakes while keeping authentication code terse and testable.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB