The myriad of functionality that comes with Snare, from Verbose Truncation to Output Driven Filtering have been helping companies around the world zero in on threats in record time while spending less on their SIEM. This is made possible by reducing the noise in your log collection while delivering the critical data for both forensics and analytics, dependably. Snare just works. Try our agents free today!Sponsored Listing
OSI-Approved Open Source (382)
- GNU General Public License version 2.0 (80)
- GNU Library or Lesser General Public License version 2.0 (18)
- BSD License (14)
- MIT License (8)
- Mozilla Public License 1.0 (7)
- Open Software License 3.0 (7)
- GNU General Public License version 3.0 (6)
- Apache License V2.0 (3)
- Adaptive Public License (2)
- Common Public License 1.0 (2)
- Educational Community License, Version 2.0 (2)
- Mozilla Public License 1.1 (2)
- Artistic License (1)
- Computer Associates Trusted Open Source License 1.1 (1)
- Eclipse Public License (1)
- Public Domain (20)
- Other License (5)
- Creative Commons Attribution License (2)
- Linux (295)
- Windows (265)
Grouping and Descriptive Categories (165)
- All POSIX (79)
- All 32-bit MS Windows (49)
- 32-bit MS Windows (32)
- OS Portable (20)
- OS Independent (14)
- All BSD Platforms (9)
- 32-bit MS Windows (8)
- 64-bit MS Windows (8)
- Project is an Operating System Distribution (7)
- Project is an Operating System Kernel (4)
- Project is OS Distribution-Specific (3)
- Classic 8-bit Operating Systems (1)
- Modern (162)
- Mac (150)
- Android (115)
- BSD (82)
- Other Operating Systems (31)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
Enver hopes to store and associate speech recognition data with corresponding applications on devices that support it, it is meant to work in much the same that DNS does for the internet. It should also list names that will answer a call from a phone or
EveAI processes the data assuming that it has already been read by a sensor. Theoretically this should give it reflex behavior. Now the end product should be a self conscious machine future plans are to include the field of robotics.
Event Horizon is a 3D space flight game similar to Ambrosia's Escape Velocity.
You can start backing up your Hyper-V and VMware hosts in a matter of minutes. Then set up a backup schedule and replicate backups offsite for added disaster recovery. You can even granularly restore Files or Exchange Items directly, or instantly boot a VM from backup. Download today and get a chance to WIN a Nintendo Switch!Sponsored Listing
ExtraPuTTY - fork of putty 0.67. (Add win32 API,shortcuts for pre-defined command,can use files instead of the registry,auto-reconnect, scripting a session with lua,integrates FTP,TFTP,Ymodem,Xmodem transfert protocols, integrates cygwin, zmodem, session manager,hyper link projects and others ...)285 weekly downloads
Our project targets to build real-time rendering ray tracer with advanced geometry supportting such NURBS or other spline surfaces. This project will be open and last for a long time, for I am not focusing on Graphics now.
FCGRAKit is a library for computer graphics programmers (C/C++/Java)
Code for the Beta Test/Development of code for the cRIO controller for the new 2009 FIRST Robotics Season. We will be using C and LabView both to evaluate the controller.
Fast Model Based Variant Filtering Tool6 weekly downloads
Simplify teamwork and stay in control of your communications with MegaPath One. Unified communications makes staying in touch with associates easy and efficient. See when others are available. Initiate a chat. Host a voice or video conference from any device, and invite guests to join via web browser. Handle matters quickly from your always-on virtual collaboration space with presence, instant messaging, video conferencing and screen sharing.Sponsored Listing
The aim of this project is to develop a Graphic Processing Unit core targeting FPGA implementation.
A C-based bluetooth scanner. Uses multiple dongles to optimise the discovery process. Parameters can be adapted at the command line. Can use some dongles to discover devices, and other dongles to inquire their names. Optimised for scanning crowds.2 weekly downloads
FastPval is multiple stage p-value computing software that computes empirical p-values from a large set of permutated/resampled background data.2 weekly downloads
Fat file system image reading tools.
At last, the second release is available since yesterday. he main changes are the display of mesh objects according to the file format and a improved rendering. The program is still intended for POSIX users and Debian/Ubuntu in particular.
There's no event quite like OSCON—the best place on Earth to sharpen your skills and discover new techniques, making you better at what you do and igniting your love of all things digital. You'll find everything open source: languages, communities, best practices, products and services. Join us May 8-11 in Austin, TX, and let OSCON ignite your love of all things digital!Sponsored Listing
To create a application which is used for file system security using encryption. Encryption can be generalized to folder as well as files, with several options and a very user friendly GUI.
File Sync is a simple command line utility to keep an arbitrary number
This app deletes from the Internet Explorer history all URLs that match a set of user defined patterns (regular expressions). Example: use it to delete wiki edit URLs such as .../twiki/bin/edit. Once started the app prunes the history every few minutes.
Flash Translation Layers for academic purpose
Time-stamp of a created file can be modified by attacker. This project is meant to track File timestamp values , using NTFS data structures rather than trusting the original time stamp modified by attacker.
The book shows you how architecting a modern security visibility infrastructure can help your business adapt to new threats, lengthen the usefulness of your current security investments, and optimize uptime and availability. See the entire threat landscape, understand security visibility basics, support both inline and out-of-band security systems, explore security visibility use cases and ask the right questions about visibility.Sponsored Listing
GADA - Genome Alteration Detection Algorithm
This is a source repository for Gonzaga University's Evolutionary Algorithms reasearch group, GUCEA.
A car game
A generic interface between robots. This is an attempt to formalize a simple protocol for communikating between robots - with concern of the actual media.
Galactic Domine - Evolve in the galaxy
A Project that dedicates itself to creating alternate Programs for Windows, Linux (probably Mac too ) in Visual Basic and C
This tool is designed to solve generalized pattern matching problem, by which we only find a set of sub-patterns, ignoring the gaps in between the sub-patterns. This tool is extremely fast and also has good tolerance to errors.