Showing 180 open source projects for "rules"

View related business solutions
  • Auth0 B2B Essentials: SSO, MFA, and RBAC Built In Icon
    Auth0 B2B Essentials: SSO, MFA, and RBAC Built In

    Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.

    Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
    Sign Up Free
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 1
    AdAway

    AdAway

    Ad-blocking for your Android

    ...It effectively keeps pesky ads at bay so you can continue using your Android device uninterrupted by constant ads. AdAway gives you the option to add custom sources of host files. It also lets you add custom rules for your whitelist, blocklist and rules for redirects, so your ad blocking is not just generic, but tailored specifically how you want it. AdAway is currently being used by dozens of Android users worldwide.
    Downloads: 15 This Week
    Last Update:
    See Project
  • 2
    ngx_waf

    ngx_waf

    Handy, High performance, ModSecurity compatible Nginx firewall module

    Handy, High-performance Nginx firewall module. Such as black and white list of IPs or IP range, uri black and white list, and request body black list, etc. Directives and rules are easy to write and readable. The IP detection is a constant-time operation. Most of the remaining inspections use caching to improve performance. Compatible with ModSecurity's rules, you can use OWASP ModSecurity Core Rule Set. Supports verifying Google, Bing, Baidu and Yandex crawlers and allowing them automatically to avoid false positives. ...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 3
    simplewall

    simplewall

    Simple tool to configure Windows Filtering Platform (WFP)

    simplewall is an open-source Windows application that provides a user-friendly firewall control interface powered by Windows Filtering Platform (WFP), enabling users to block or allow outgoing and incoming network connections without diving into complex OS settings or command-line tools. The app presents a clean, intuitive UI where users can define rules based on process names, IP addresses, ports, and protocols, making it possible to restrict apps from accessing the internet or control specific traffic flows with fine granularity. Because simplewall leverages WFP directly, it operates at a low level in the network stack, ensuring reliable enforcement of rules system-wide while remaining lightweight. ...
    Downloads: 68 This Week
    Last Update:
    See Project
  • 4
    Tasmota

    Tasmota

    Alternative firmware for ESP8266 with easy configuration

    Alternative firmware for ESP8266 with easy configuration using webUI, OTA updates, automation using timers or rules, expandability and entirely local control over MQTT, HTTP, Serial or KNX. Unless your Tasmota powered device exhibits a problem or you need to make use of a feature that is not available in the Tasmota version currently installed on your device, leave your device alone - it works so don't make unnecessary changes! If the release version (i.e., the master branch) exhibits unexpected behaviour for your device and configuration, you should upgrade to the latest development version instead to see if your problem is resolved as some bugs in previous releases or development builds may already have been resolved. ...
    Downloads: 29 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 5
    YARA

    YARA

    The pattern matching swiss knife for malware researchers

    ...YARA is multi-platform, running on Windows, Linux and Mac OS X, and can be used through its command-line interface or from your own Python scripts with the yara-python extension. YARA-CI may be a useful addition to your toolbelt. This is GitHub application that provides continuous testing for your rules, helping you to identify common mistakes and false positives. If you plan to use YARA to scan compressed files (.zip, .tar, etc) you should take a look at yextend, a very helpful extension to YARA developed and open-sourced by Bayshore Networks.
    Downloads: 26 This Week
    Last Update:
    See Project
  • 6
    SWUpdate

    SWUpdate

    Software Update for Embedded Systems

    SWUpdate is a Linux Update agent with the goal to provide an efficient and safe way to update an embedded Linux system in the field. SWUpdate supports local and OTA updates and multiple update strategies and it is designed with security in mind. To start with SWUpdate, it is suggested you look at the documentation and build for one evaluation board (or you run SWUpdate on your host for a first overview). If you plan to update your device locally or remotely, SWUpdate is the right framework...
    Downloads: 19 This Week
    Last Update:
    See Project
  • 7
    bearer

    bearer

    Code security scanning tool (SAST) to discover security risks

    ...Bearer is a static application security testing (SAST) tool that scans your source code and analyzes your data flows to discover, filter and prioritize security risks and vulnerabilities leading to sensitive data exposures (PII, PHI, PD). We provides built-in rules against a common set of security risks and vulnerabilities, known as OWASP Top 10. Leakage of sensitive data through cookies, internal loggers, third-party logging services, and into analytics environments. Usage of weak encryption libraries or misusage of encryption algorithms. Unencrypted incoming and outgoing communication (HTTP, FTP, SMTP) of sensitive information. ...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 8
    Zen C

    Zen C

    Write like a high-level language, run like C

    Zen C is a minimal yet expressive implementation of the C programming language that aims to balance simplicity with practical capability, making it ideal for educational use, language experimentation, and small-scale systems programming. It provides a clean syntax and semantics that closely mirror classic C while enforcing stricter rules to eliminate common pitfalls like undefined behaviors or hidden conversions that often cause bugs. Zen-C includes a lightweight compiler front-end and runtime that can target multiple platforms, enabling users to compile and run code on both desktop and embedded environments without heavy tooling. Because it prioritizes clarity and predictability, the language makes it easier for learners to understand core systems concepts while still accessing low-level memory control and performance.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    DSVPN

    DSVPN

    A dead simple VPN

    ...No lousy documentation to read. No configuration file. No post-configuration. Run a single-line command on the server, a similar one on the client and you're done. No firewall and routing rules to manually mess with. Doesn't leak between reconnects if the network doesn't change. Blocks IPv6 on the client to prevent IPv6 leaks. Works on Linux (kernel >= 3.17), macOS and OpenBSD, as well as DragonFly BSD, FreeBSD and NetBSD in client and point-to-point modes. Adding support for other operating systems is trivial.
    Downloads: 3 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    Rspamd

    Rspamd

    Rapid spam filtering system

    Rspamd is an advanced spam filtering system and email processing framework that allows evaluation of messages by a number of rules including regular expressions, statistical analysis and custom services such as URL black lists. Each message is analysed by Rspamd and given a verdict that might be used by MTA for further processing (e.g. to reject a message, or add a special header indicating spam) along with other information, such as possible DKIM signature or modifications suggested for a message. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    shadowsocks-libev

    shadowsocks-libev

    Bug-fix-only libev port of shadowsocks

    ...You can configure your Linux-based box or router to proxy all TCP traffic transparently, which is handy if you use an OpenWRT-powered router. Although shadowsocks-libev can handle thousands of concurrent connections nicely, we still recommend setting up your server's firewall rules to limit connections from each user. We strongly encourage you to install shadowsocks-libev from jessie-backports-sloppy.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 12
    KCP

    KCP

    A fast and reliable ARQ protocol

    KCP is a fast and reliable protocol that can achieve the transmission effect of a reduction of the average latency by 30% to 40% and reduction of the maximum delay by a factor of three, at the cost of 10% to 20% more bandwidth wasted than TCP. It is implemented by using the pure algorithm, and is not responsible for the sending and receiving of the underlying protocol (such as UDP), requiring the users to define their own transmission mode for the underlying data packet, and provide it to...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    AWS IoT Jobs library

    AWS IoT Jobs library

    Client library for using AWS IoT Jobs service on embedded devices

    ...This library has gone through code quality checks including verification that no function has a GNU Complexity score over 8, and checks against deviations from mandatory rules in the MISRA coding standard. Deviations from the MISRA C:2012 guidelines are documented under MISRA Deviations. This library has also undergone both static code analysis from Coverity.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 14
    AWS SigV4 Library

    AWS SigV4 Library

    AWS library to sign AWS HTTP requests with Signature Version 4

    ...This library has gone through code quality checks including verification that no function has a GNU Complexity score over 8, and checks against deviations from mandatory rules in the MISRA coding standard. Deviations from the MISRA C:2012 guidelines are documented under MISRA Deviations. This library has also undergone static code analysis using Coverity static analysis, and validation of memory safety through the CBMC automated reasoning tool.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 15
    AWS IoT Fleet Provisioning Library

    AWS IoT Fleet Provisioning Library

    Client library for using AWS IoT Fleet Provisioning service

    ...This library has gone through code quality checks including verification that no function has a GNU Complexity score over 8, and checks against deviations from mandatory rules in the MISRA coding standard. Deviations from the MISRA C:2012 guidelines are documented under MISRA Deviations. This library has also undergone static code analysis using Coverity static analysis, and validation of memory safety through the CBMC automated reasoning tool.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    AWS IoT Device Defender Library

    AWS IoT Device Defender Library

    Client library for using AWS IoT Defender service on embedded devices

    ...This library has gone through code quality checks including verification that no function has a GNU Complexity score over 8, and checks against deviations from mandatory rules in the MISRA coding standard. Deviations from the MISRA C:2012 guidelines are documented under MISRA Deviations. This library has also undergone static code analysis using Coverity static analysis.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 17

    libreadconfig

    Library to process config file with syntax similar to udev rules files

    Library to process config file with syntax similar to udev rules files
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Implements the rules of Scrabble(tm) for Android devices (and historically, for PalmOS, PocketPC and others) (For development purposes there's also a Linux client using ncurses or GTK.) Easy to port to other platforms, supports multiple languages and multi-device play via the internet, SMS, Bluetooth, and NFC. Not vaporware: one of TIME.com's top 5 PalmOS apps
    Downloads: 24 This Week
    Last Update:
    See Project
  • 19
    C3PO is a software synthesis tool that provides a solution for building maintainable, reliable and robust software infrastructures and/or compiler frontends from a set of attributed grammar rules in EBNF notation.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 20

    ConsolePref

    A console preference game for linux

    The goal of the project is to write a computer preference game that is completely open and does not cheat. The program by default (unless explicitly specified otherwise) makes decisions using only information allowed by the game's rules.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    ...Modules for AWK, Perl, PHP, Python, Ruby, C#.net and VB.net are included too. The package includes also an IBAN converter to generate (german) IBANs and BICs from account data. All currently defined IBAN rules by Deutsche Bundesbank are implemented (Dec 2017: 57 rules) and tested against independent solutions.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    cline

    Command line tool for counting source code lines

    cline is a command line tool that counts code lines or non-whitespace characters in your project folder. It is designed to recursively find any source file matching specific rules and count the line breaks within that file. You may specify file suffixes to include or exclude as well as regular expressions for code lines that shall be excluded (e.g. to exclude comments). By default a heuristic algorithm skips binary files. You may configure the restrictiveness of this algorithm with command line options.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 23

    Mxx_ru

    Mxx_ru is a cross-platform build tool for C/C++.

    ...It's intended for C/C++ languages in general, but it's easy to extend for handling other languages. In contrast to well-known make utility, which provides explicit make rules with targets, dependencies and build commands, Mxx_ru has a template-based approach. Project file in Mxx_ru is a small Ruby program using already defined class (template) from Mxx_ru. The only thing developer is have to worry about is to create an object of required class and execute some of it's methods.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    schur

    schur

    Interactive Program For Calculating Properties Of Symmetric Functions

    Schur is a standalone program for interactively calculating properties of Lie groups and symmetric functions. Schur has been designed to answer questions of relevance to a wide range of problems of interest to chemists, mathematicians, computer scientists,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    UniSIMD-assembler

    SIMD macro assembler unified for ARM, MIPS, PPC and x86

    UniSIMD assembler is a high-level C/C++ macro assembler framework unified across ARM, MIPS, POWER and x86 architectures. It establishes a subset of both BASE and SIMD instruction sets with clearly defined common API, so that application logic can be written and maintained in one place without code replication. The assembler itself isn't a separate tool, but rather a collection of C/C++ header files, which applications need to include directly in order to use. At present, Intel...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB