Showing 37 open source projects for "factor"

View related business solutions
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Let your crypto work for you

    Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    Aegis Authenticator

    Aegis Authenticator

    A free, secure and open source app for Android

    Aegis Authenticator is a free and open-source two-factor authentication (2FA) app for Android that helps users secure their online accounts by generating cryptographic one-time passwords (OTPs) such as TOTP and HOTP codes. Unlike many proprietary MFA apps, Aegis is designed with user privacy and local control in mind, storing secrets only on the device in an encrypted vault protected by PIN or biometric unlock, and offering features like backups encrypted with a user-chosen passphrase. ...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 2
    Quarkus
    A Kubernetes Native Java stack tailored for OpenJDK HotSpot and GraalVM, crafted from the best-of-breed Java libraries and standards. Quarkus tailors your application for GraalVM and HotSpot. Amazingly fast boot time, incredibly low RSS memory (not just heap size!) offering near-instant scale-up and high-density memory utilization in container orchestration platforms like Kubernetes. We use a technique we call compile-time boot. Combine both the familiar imperative code and the reactive...
    Downloads: 13 This Week
    Last Update:
    See Project
  • 3
    Bastillion

    Bastillion

    Web-based SSH console that centrally manages administrative access

    ...Web-based administration is combined with the management and distribution of user's public SSH keys. Key management and administration is based on profiles assigned to defined users. Administrators can login using two-factor authentication with Authy or Google Authenticator. From there they can manage their public SSH keys or connect to their systems through a web-shell. Commands can be shared across shells to make patching easier and eliminate redundant command execution. Bastillion layers TLS/SSL on top of SSH and acts as a bastion host for administration. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    desktop-icons

    Application for resizing images to create icons of standard sizes

    This tiny application allows you to create the icons for an application taking as input an image and resizing it to different Windows standard sizes: * 16 x 16 * 32 x 32 * 64 x 64 * 128 x 128 You can also resize that input image to a configurable size that canbe different from the previous ones. When resizing, you can translate a particular color to another one (that can be useful to change the background, that might be transparent to white). You can change the alpha component...
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 5
    TigerSafe

    TigerSafe

    Free open source password manager

    ...It is highly recommended to do backups of the file storing passwords with TigerSafe, for example copy/paste it in USB flash drives, cloud drives like Google Drive, Dropbox... Indeed, users are solely responsible for their data. TigerSafe also enables you to store the 2-factor authentication mechanism mostly used by modern websites (TOTP 2FA) in a secure way. Since TigerSafe is particularly sensitive, no binary installation file is provided (because it could be infected by a virus, or have a vulnerability in its dependencies such as the JDK implementation used). Instead, installation instructions are provided, and a YouTube video for Windows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    GaME - Solitaire-RPG Editor

    GaME - Solitaire-RPG Editor

    Solitaire-RPG Editor with Support for Game Master Emulation

    GaME is an editor with support for Game Master Emulation (especially Mythic, see http://wordmillgames.com) and some hopefully useful feature to keep track of threads and characters, roll dice and organize the solitaire-rpg session into scenes. The editor has been designed to be used without a mouse (although of course you may use a mouse or similar devices if you like). Every feature is availabe via keyboard shortcuts or by calling up the central context menu.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    Linearizer

    Small application that helps linearizing (cos x)^n and (sin x)^n

    ...The aim is to help students view a quick result of an operation of linearization they are dealing with. The small app helps doing this: *Decomposition of a number into prime factor products * Simplification of Fractions *Operations on Fractions *Combinatorial calculations *Linearization of (cos x)^n and (sin x)^n
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    andOTP

    andOTP

    Open source two-factor authentication for Android

    Open source two-factor authentication for Android. It implements Time-based One-time Passwords (TOTP) and HMAC-Based One-Time Passwords (HOTP). Simply scan the QR code and login with the generated 6-digit code. This project started out as a fork of the great OTP Authenticator app written by Bruno Bierbaumer, which has sadly been inactive since 2015. By now almost every aspect of the app has been changed/re-written so the fork status of the Github repository got detached upon user request. ...
    Downloads: 21 This Week
    Last Update:
    See Project
  • 9
    Google Authenticator Android

    Google Authenticator Android

    Open source fork of the Google Authenticator Android app

    Google Authenticator for Android is the open-source two-factor authentication app that generates time-based (TOTP) and counter-based (HOTP) one-time codes entirely on the device. It’s designed to be simple, offline, and standards-compliant, so any service that supports OATH OTP can interoperate with it. The app streamlines enrollment via QR codes or manual key entry, then displays rotating numeric codes with clear account labels to reduce mistakes during login.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 10
    DACO-algorithm

    DACO-algorithm

    A novel transcription factor complex prediction algorithm.

    Eukaryotic gene expression is controlled through molecular logic circuits that combine regulatory signals of many different factors. Complexation of transcription factors and other regulatory proteins is a prevailing and highly conserved mechanism of signal integration within critical regulatory pathways and enable to infer controlled genes as well as the exerted regulatory mechanism. We developed DACO (domain-aware cohesiveness optimization), a novel algorithm that combines...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Ice AWS

    Ice AWS

    AWS Usage Tool

    Ice provides a birds-eye view of our large and complex cloud landscape from a usage and cost perspective. Cloud resources are dynamically provisioned by dozens of service teams within the organization and any static snapshot of resource allocation has limited value. The ability to trend usage patterns on a global scale, yet decompose them down to a region, availability zone, or service team provides incredible flexibility. Ice allows us to quantify our AWS footprint and to make educated...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Weather-Forecast

    Weather-Forecast

    Weather Forecast is a simple app that shows you a weather.

    ...It is a nice option for the times you just need to check in on the weather to plan for your week ahead, your weekend plans or any other times when the weather could play a factor. This Weather app has a host of updates since released, with a few new features added to the mix. Furthermore, it delivers the basic weather information among with useful informations(Pressure clouds,Wind Speed) to your Windows computer in a clean, eye-catching and easy to use package together.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Google Authenticator OpenSource

    Google Authenticator OpenSource

    Open source version of Google Authenticator (except the Android app)

    Google Authenticator is the open-source counterpart of Google’s one-time passcode apps, implementing industry-standard OATH algorithms such as TOTP (time-based) and HOTP (counter-based) for two-factor authentication. The repository historically hosts code for mobile platforms like iOS and BlackBerry, demonstrating how to generate numeric codes locally without needing network access. Its core purpose is to help services and users add a second factor that’s simple to deploy yet resistant to password reuse and phishing. The app flow revolves around enrolling secrets via QR codes or manual entry, storing them securely on-device, and rendering rotating codes synchronized by time. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    BlackBoxSocket

    My twist to a Java based secure layer for socket communication.

    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    Subtitles synchronization

    Application in Java for synchronizing subtitles (.srt and .ass)

    Application writen in Java which allows synchronizing subtitles by multiplying the times of the subtitles by a factor and then adding a delay in milliseconds. It accepts formats of subtitles with extensions: .srt and .ass It is possible to select the charset used for the output file. The GUI allows switching between English and Spanish languages. You will find more about it at this web site: https://www.frojasg1.com:8443/downloads_web/web/html/sincronizadorDeSubtitulos.html?...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    FaceAccess Facial Recognition System

    FaceAccess Facial Recognition System

    FaceAccess is an Access Control System based on Facial Recognition

    With the growing need to exchange information and share resources, information security has become more important than ever in both the public and private sectors. Although many technologies have been developed to control access to files or resources, to enforce security policies, and to audit network usages, there does not exist a technology that can verify that the user who is using the system is the same person who logged in. FaceAccess provides a prototype implementation as a "login...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    iMir

    Integrated pipeline for HT miRNA-Seq data analysis

    Processing of smallRNA-Seq data to gather biologically relevant information requires application of multiple statistical and bioinformatics tools from different sources, each focusing on a specific step of the analysis pipeline. The analytical workflow can be challenging for the continuous interventions by the operator, a critical factor when large numbers of datasets need to be analyzed at once. To allow a flexible and comprehensive analysis of smallRNA-Seq data we designed a novel modular pipeline, called iMir, integrating multiple open source modules and resource in an automated workflow, devising different statistical approaches to analyze data rigorously. iMir comprises also a Graphical User Interface (GUI), so that the pipeline is particularly suited for biologist and early stage bioinformaticians and produces both graphics and text outputs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    WiKID Two-Factor Authentication System

    WiKID Two-Factor Authentication System

    Two-factor authentication system

    The WiKID Strong Authentication System is a public-key based two-factor authentication system. It is a flexible, extensible, and secure alternative to tokens, certs and passwords. Application & API support exists for Java, ASP, PHP, Ruby, OpenVPN, TACACS+, etc. Read our eGuide on how to setup your network with two-factor authentication: http://www.wikidsystems.com/learn-more/two-factor-authentication-white-papers
    Downloads: 18 This Week
    Last Update:
    See Project
  • 19
    ...This is a beta version, so please report any bug if you find something wrong! Your help will be very appreciated! NEWS! asymptotic diagram plotting function added! the function is in beta test, and does not support complex factor.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 20

    EDNA

    Energy Based Multiple Sequence Alignment (MSA) for Binding Sites

    Multiple Sequence Alignment for Transcription Factor Binding Sites using Di nucleotides dependencies and relying on Free Interaction energies between neighbouring DNA bases to stabilise substitution energy of the alignment. http://www.ncbi.nlm.nih.gov/pubmed/23990411
    Downloads: 2 This Week
    Last Update:
    See Project
  • 21

    TFAST

    Software for analysis of afSELEX-seq data

    Transcription Factor Analysis using SELEX with High-Throughput Sequencing (TFAST) is software developed by the Mobley lab at the University of Michigan designed to assist with transcription factor binding site discovery using data generated from aptamer-free SELEX-seq (afSELEX-seq).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    PairedComparison

    PairedComparison

    The Software Estimation Tool

    The blog contains the milestones the project has reached, new features incorporated and step-by-step user guides. The Github Repository is here - https://github.com/sidharthamani/PairedComparison
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Barada
    Barada (Barada Aint Respecting Any Deceptive Adversaries) is a PAM module designed to provide two-factor authentication support. There is companion software called Gort which runs on Android devices, essentially turning your phone into a SecureID token. The PAM module is available in the repositories for Debian based distributions. Gort, the Android client, is available from the android market (https://play.google.com/store/apps/details?
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    ...The result can be saved as text (.txt, .ans), HTML (.html) or as an image (.jpg). You can influence the conversion by altering certain options (font, font size, scale factor, colour etc.).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    SEvents is a System of Event programming with random factor designed to accept a script file and execute it with using extra modules. One module - one object, which relate on changing of some variables.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB