Showing 11 open source projects for "attack phone number"

View related business solutions
  • Auth0 for AI Agents now in GA Icon
    Auth0 for AI Agents now in GA

    Ready to implement AI with confidence (without sacrificing security)?

    Connect your AI agents to apps and data more securely, give users control over the actions AI agents can perform and the data they can access, and enable human confirmation for critical agent actions.
    Start building today
  • Context for your AI agents Icon
    Context for your AI agents

    Crawl websites, sync to vector databases, and power RAG applications. Pre-built integrations for LLM pipelines and AI assistants.

    Build data pipelines that feed your AI models and agents without managing infrastructure. Crawl any website, transform content, and push directly to your preferred vector store. Use 10,000+ tools for RAG applications, AI assistants, and real-time knowledge bases. Monitor site changes, trigger workflows on new data, and keep your AIs fed with fresh, structured information. Cloud-native, API-first, and free to start until you need to scale.
    Try for free
  • 1
    libphonenumber

    libphonenumber

    Library for parsing and validating international phone numbers

    ...Provides valid example numbers for all countries/regions, with the option of specifying which type of example phone number is needed. Quickly guesses whether a number is a possible phone number by using only the length information, much faster than a full validation. To include the Java code in your application, either integrate with Maven (see wiki) or download the latest jars from the Maven repository.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 2
    ncnn

    ncnn

    High-performance neural network inference framework for mobile

    ...It brings artificial intelligence right at your fingertips with no third-party dependencies, and speeds faster than all other known open source frameworks for mobile phone cpu. ncnn allows developers to easily deploy deep learning algorithm models to the mobile platform and create intelligent APPs. It is cross-platform and supports most commonly used CNN networks, including Classical CNN (VGG AlexNet GoogleNet Inception), Face Detection (MTCNN RetinaFace), Segmentation (FCN PSPNet UNet YOLACT), and more. ncnn is currently being used in a number of Tencent applications, namely: QQ, Qzone, WeChat, and Pitu.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 3
    Udp2raw-tunnel

    Udp2raw-tunnel

    Turns UDP traffic into encrypted UDP/fakeTCP/ICMP traffic

    A tunnel which turns UDP traffic into encrypted fakeTCP/UDP/ICMP traffic by using Raw Socket, helps you bypass UDP FireWalls(or unstable UDP environment). When used alone, Udp2raw tunnels only UDP traffic. Nevertheless, if you used udp2raw + any UDP-based VPN together, you can tunnel any traffic(include TCP/UDP/ICMP), currently, OpenVPN/L2TP/ShadowVPN and tinyfecVPN are confirmed to be supported. Linux host (including desktop Linux,Android phone/tablet,OpenWRT router,or Raspberry PI) with...
    Downloads: 33 This Week
    Last Update:
    See Project
  • 4

    onet

    OctopusNet - SAT>IP Server with various possibilities

    ...The to-use client software (*3) is for the operating systems iOS (iPhone, iPad), Android, Mac OS and Windows already from various manufacturers available on the market (Smart TVs, Windows Phone, Windows RT and Kindle Fire HD in preparation). All models in the Octopus Net series contains a 5 port gigabit managed switch and the possibility to be equipped with two DuoFlex modules (* 4). The Octopus Net can be any number of times cascaded (controlled by IP address).The use of wireless clients requires an additional wireless access point...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Dun and Bradstreet Risk Analytics - Supplier Intelligence Icon
    Dun and Bradstreet Risk Analytics - Supplier Intelligence

    Use an AI-powered solution for supply and compliance teams who want to mitigate costly supplier risks intelligently.

    Risk, procurement, and compliance teams across the globe are under pressure to deal with geopolitical and business risks. Third-party risk exposure is impacted by rapidly scaling complexity in domestic and cross-border businesses, along with complicated and diverse regulations. It is extremely important for companies to proactively manage their third-party relationships. An AI-powered solution to mitigate and monitor counterparty risks on a continuous basis, this cutting-edge platform is powered by D&B’s Data Cloud with 520M+ Global Business Records and 2B+ yearly updates for third-party risk insights. With high-risk procurement alerts and multibillion match points, D&B Risk Analytics leverages best-in-class risk data to help drive informed decisions. Perform quick and comprehensive screening, using intelligent workflows. Receive ongoing alerts of key business indicators and disruptions.
    Learn More
  • 5
    mpdClientS60qt
    A mobile client to control the music player daemon (MPD) from a Nokia S60 3rd device via Wifi (it needs Qt libraries installed)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A application written in C++ for organize contacts in different lists (Adress, Tel Phone Number and so on) and manage dates with contacts including email. With User authentication and access control user <-> contact list.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Call someone or send SMS just by clicking a phone number in your addressbook. For sending SMS a stand alone GUI is available as well. Phone calls are made via normal phones, no headset/soundcard required.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    This project defines the framework for Distributed Conferencing (DCON) by appropriately orchestrating the operation of a number of XCON (http://www.ietf.org/html.charters/xcon-charter.html) "focus" elements.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    This program makes it possible to use your old analog modem to dialup, and keep a complete record of all your friends and family for easy reference when trying to find there phone number or email address.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Yeastar: Business Phone System and Unified Communications Icon
    Yeastar: Business Phone System and Unified Communications

    Go beyond just a PBX with all communications integrated as one.

    User-friendly, optimized, and scalable, the Yeastar P-Series Phone System redefines business connectivity by bringing together calling, meetings, omnichannel messaging, and integrations in one simple platform—removing the limitations of distance, platforms, and systems.
    Learn More
  • 10
    Nimda Stats is a simple program that analyzes Apache's error log, counts the number of Nimda virus attempts, and lists the top 100 'ip's that were used to attack your computer in an HTML file. More features coming soon.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    PNX system develops the middle-ware source code to glue Asterisk with a number of powerful telephony products such as: 1) OpenH323 H.323 stack 2) Vovida SIP stack 3) Bayonne Voice Automation Platform The advantages? An advanced IP PBX supporting the wide
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next