Showing 108 open source projects for "you"

View related business solutions
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    Gobuster

    Gobuster

    Directory/File, DNS and VHost busting tool written in Go

    ...Provides several modes, like the classic directory brute-forcing mode, DNS subdomain brute-forcing mode, the mode that enumerates open S3 buckets and looks for existence and bucket listings, and the virtual host brute-forcing mode (not the same as DNS!). Since this tool is written in Go you need to install the Go language/compiler/etc. Full details of installation and set up can be found on the Go language website. Once installed you have two options. You need at least go 1.16.0 to compile gobuster.
    Downloads: 43 This Week
    Last Update:
    See Project
  • 2
    Broot

    Broot

    A new way to see and navigate directory trees

    ...That's what makes it usable where the old tree command would produce pages of output. Hit alt/enter and you're back to the terminal in the desired location. This way, you can navigate to a directory with the minimum amount of keystrokes, even if you don't exactly remember where it is. Broot is fast and doesn't block (any keystroke interrupts the current search to start the next one). Never lose track of file hierarchy while you search. Broot tries to select the most relevant file. You can still go from one match to another one using tab or arrow keys. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    serve

    serve

    Static file serving and directory listing

    ...The quickest way to get started is to just run npx serve in your project's directory. If you prefer, you can also install the package globally using Yarn (you'll need at least Node.js LTS). The core of serve is serve-handler, which can be used as middleware in existing HTTP servers. In order to customize the default behaviour, you can also pass custom routing rules, provide your own methods for interacting with the file system and much more.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    authentik

    authentik

    The authentication glue you need

    ...It can be seamlessly integrated into existing environments to support new protocols. authentik is also a great solution for implementing sign-up, recovery, and other similar features in your application, saving you the hassle of dealing with them. authentik is an open-source Identity Provider focused on flexibility and versatility. You can use authentik in an existing environment to add support for new protocols, implement sign-up/recovery/etc. in your application so you don't have to deal with it, and many other things. You can adopt authentik to your environment, regardless of your requirements. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 5
    truffleHog

    truffleHog

    Searches through git repositories for high entropy strings and secrets

    truffleHog searches through git repositories for high entropy strings and secrets, digging deep into commit history. TruffleHog runs behind the scenes to scan your environment for secrets like private keys and credentials, so you can protect your data before a breach occurs. Secrets can be found anywhere, so TruffleHog scans more than just code repositories, including SaaS and internally hosted software. With support for custom integrations and new integrations added all the time, you can secure your secrets across your entire environment. TruffleHog is developed by a team entirely comprised of career security experts. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    Guardian

    Guardian

    Elixir Authentication

    ...If you can attach an authentication token you can authenticate it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Fail2Ban

    Fail2Ban

    Daemon to ban hosts that cause multiple authentication errors

    ...Fail2Ban is able to reduce the rate of incorrect authentications attempts however it cannot eliminate the risk that weak authentication presents. Configure services to use only two factor or public/private authentication mechanisms if you really want to protect services.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 8
    jwt-auth

    jwt-auth

    JSON web token authentication for Laravel and Lumen

    ...To make authenticated requests via http using the built in methods, you will need to set an authorization header. If you don't like the idea of catching mulitple exceptions inline, then you are free to add a global exception handler with Laravel.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Kanidm

    Kanidm

    Kanidm: A simple, secure, and fast identity management platform

    ...If you want to host your own authentication service, then Kanidm is for you.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 10
    Uptrace

    Uptrace

    Open source APM: OpenTelemetry traces, metrics, and logs

    Uptrace is an open-source APM tool that supports distributed tracing, metrics, and logs. You can use it to monitor applications and set up automatic alerts to receive notifications via email, Slack, Telegram, and more. Uptrace is an open-source APM that supports OpenTelemetry tracing, metrics, and logs. You can use it to monitor applications and set up alerts to receive notifications via email, Slack, Telegram, and more.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Authenticator Pro

    Authenticator Pro

    Two-Factor Authentication (2FA) client for Android + Wear OS

    Authenticator Pro is a free and open-source two-factor authentication app for Android. It features encrypted backups, icons, categories, a high level of customization, and even a Wear OS app. Unlike some alternative apps, Authenticator Pro gives you control over your data. You can import from other apps and export at any time. Authenticator Pro is a community-backed open-source project which aims to provide privacy and security to users. The source-code is auditable by anyone on GitHub and released under the GPL 3.0 license. The project has no corporate ties or interests but, rather has the purpose of providing a secure and private two-factor authentication solution to the privacy-conscious. ...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 12
    Authelia

    Authelia

    The Single Sign-On Multi-Factor portal for web apps

    ...Written in Go and React, authorization policies and many other backend tasks are completed in mere milliseconds and login portal loading times of 100 milliseconds makes it one of the fastest solutions available. Processors can use a lot of electricity, but when idle usage is basically so low that you can't measure it, and active usage in a small business environment being under 1% you can rest easy (with the exclusion of password hashing).
    Downloads: 4 This Week
    Last Update:
    See Project
  • 13
    Google Auth Library

    Google Auth Library

    Google Auth Library for Node.js

    This is Google's officially supported node.js client library for using OAuth 2.0 authorization and authentication with Google APIs. Use Application Default Credentials when you use a single identity for all users in your application. Especially useful for applications running on Google Cloud. Application Default Credentials also support workload identity federation to access Google Cloud resources from non-Google Cloud platforms. Use JWT when you are using a single identity for all users. Especially useful for server->server or server->API communication. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Pow

    Pow

    Robust, modular, and extendable user authentication system

    ...Pow is built to be modular, and easy to configure. The configuration is passed to function calls as well as plug options, and they will take priority over any environment configuration. It's ideal in case you got an umbrella app with multiple separate user domains. The easiest way to use Pow with Phoenix is to use a :otp_app in function calls and set the app environment configuration. It will keep a persistent fallback configuration that you configure in one place. Pow ships with a session plug module. You can easily switch it out with a different one. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    ZITADEL

    ZITADEL

    Identity infrastructure, simplified for you

    Secure authentication management for your application. Customize as you grow, with easy APIs and programmable workflows. Focus on growing, your login is in good hands. Streamline your application development with our all-in-one identity suite. Designed for all user types, be it consumers, businesses, or employees. Offload complex tasks by using our API as solid abstractions. Benefit from an adaptable identity infrastructure with custom code extensions and robust security defaults.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    Better Auth

    Better Auth

    The most comprehensive authentication library for TypeScript

    ...It provides a comprehensive set of features out of the box and includes a plugin ecosystem that simplifies adding advanced functionalities with minimal code in a short amount of time. Whether you need 2FA, multi-tenant support, or other complex features. It lets you focus on building your actual application instead of reinventing the wheel.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    ORY Oathkeeper

    ORY Oathkeeper

    A cloud native Identity & Access Proxy / API (IAP)

    ...The Access Control Decision API can be deployed alongside an existing API Gateway or reverse proxy. Ory offers a support plan for Ory Network Hybrid, including Ory on private cloud deployments. If you have a self-hosted solution and would like help, consider a support plan! The team at Ory has years of experience in cloud computing. Ory's offering is the only official program for qualified support from the maintainers.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 18
    JSS

    JSS

    An authoring tool for CSS which uses JavaScript as a host language

    A lib for generating Style Sheets with JavaScript. JSS is an authoring tool for CSS which allows you to use JavaScript to describe styles in a declarative, conflict-free and reusable way. It can compile in the browser, server-side or at build time in Node. JSS is framework agnostic. It consists of multiple packages, the core, plugins, framework integrations and others. If you’re interested in playing around with JSS, you can use an online code playground.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Casdoor

    Casdoor

    An open-source Identity and Access Management (IAM)

    ...Access to Casdoor is very convenient, please visit How to Connect to Casdoor for details. Casdoor also support sign up directly. By filling your Username, Display name, Password and Email, after your receive your Email code, you can sign up in Casdoor.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Sentry

    Sentry

    Cross-platform application monitoring and error tracking software

    ...The most users and logs will have to provide are the clues, and Sentry provides the answers. Sentry offers enhanced application performance monitoring through information-laden stack traces. It lets you build better software faster and more efficiently by showing you all issues in one place and providing the trail of events that lead to errors. It also provides real-time monitoring and data visualization through dashboards. Sentry’s server is in Python, but its API enables for sending events from any language, in any application. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Pocket ID

    Pocket ID

    Easy-to-use OIDC provider that allows to authenticate with passkeys

    ...It’s designed to be simpler to install and use than larger identity solutions like Keycloak or Hydra and integrates smoothly with other self-hosted applications that understand OIDC protocols. With Docker-ready setup and broad community interest, the project supports a fully self-managed authentication stack where you control user identity, sessions, and login flows without relying on third-party services. It has gained popularity in the self-hosted ecosystem as a straightforward way to add single sign-on capabilities and modern security to your apps.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    PHP OAuth 2.0 Server

    PHP OAuth 2.0 Server

    A spec compliant, secure by default

    league/oauth2-server is a standards compliant implementation of an OAuth 2.0 authorization server written in PHP which makes working with OAuth 2.0 trivial. You can easily configure an OAuth 2.0 server to protect your API with access tokens, or allow clients to request new access tokens and refresh them. The latest version of this package supports PHP 7.2, PHP 7.3, PHP 7.4, PHP 8.0. The openssl and json extensions are also required. All HTTP messages passed to the server should be PSR-7 compliant. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    Go Backend Clean Architecture

    Go Backend Clean Architecture

    A Go (Golang) Backend Clean Architecture project with Gin, MongoDB

    ...It demonstrates practical patterns for repository interfaces, DTOs, and consistent response envelopes that keep APIs predictable. Testing is first-class: ports and adapters are designed for mocking and table-driven tests, which reduces friction when you add features. As a learning resource and a real starter, it helps teams jumpstart services with boundaries that age well.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    Comeonin

    Comeonin

    Password hashing specification for the Elixir programming language

    ...The library’s helpers make it straightforward to add registration and login flows that resist brute-force and side-channel attacks. Migration paths and checks are included so you can upgrade algorithms or work factors over time without breaking existing credentials. Its focus on practical ergonomics—clear APIs, sensible defaults, and good docs—has made it the de facto choice for password handling in Elixir. By centralizing hashing concerns, Comeonin helps teams avoid subtle security mistakes while keeping authentication code terse and testable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Ockam

    Ockam

    Orchestrate end-to-end encryption, mutual authentication

    ...To build trust for data-in-motion, applications need end-to-end guarantees of data authenticity, integrity, and confidentiality. To be private and secure by-design, applications must have granular control over every trust and access decision. Ockam allows you to add these controls and guarantees to any application. We are passionate about making powerful cryptographic and messaging protocols simple and safe to use for millions of builders. Create a mutually authenticated and end-to-end encrypted secure channel between two Ockam nodes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB