Showing 49 open source projects for "corruption"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Cloud tools for web scraping and data extraction Icon
    Cloud tools for web scraping and data extraction

    Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.

    Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
    Explore 10,000+ tools
  • 1
    Git

    Git

    Fast, scalable, distributed revision control system

    Git is a free, distributed version control system created by Linus Torvalds in 2005 to manage the development of the Linux kernel. It emphasizes speed, data integrity, and support for non-linear workflows, and remains the most popular VCS for collaborative software development. Git is an Open Source project covered by the GNU General Public License version 2 (some parts of it are under different licenses, compatible with the GPLv2). It was originally written by Linus Torvalds with help of a...
    Downloads: 20 This Week
    Last Update:
    See Project
  • 2
    ExifTool

    ExifTool

    ExifTool meta information reader/writer

    ...Typical workflows include extracting metadata to JSON/CSV/XML, renaming files from timestamps or tags, shifting capture times, copying tags between files, and cleaning or normalizing fields for archives. The tool is meticulous about character encodings, time zones, and tag groups, helping avoid silent corruption when moving metadata between ecosystems. It is scriptable and composable, with options to operate recursively, write sidecars, preserve originals, or do dry runs for safety. Professionals rely on ExifTool for digital asset management, forensic workflows, and any pipeline where metadata quality and traceability matter.
    Downloads: 67 This Week
    Last Update:
    See Project
  • 3
    Velero

    Velero

    Backup and migrate Kubernetes applications and their persistent volume

    ...Velero is an open source tool to safely backup and restore, perform disaster recovery, and migrate Kubernetes cluster resources and persistent volumes. Reduces time to recovery in case of infrastructure loss, data corruption, and/or service outages. Enables cluster portability by easily migrating Kubernetes resources from one cluster to another​. Offers key data protection features such as scheduled backups, retention schedules, and pre or post-backup hooks for custom actions. Backup your Kubernetes resources and volumes for an entire cluster, or part of a cluster by using namespaces or label selectors. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4
    Flow Matching

    Flow Matching

    A PyTorch library for implementing flow matching algorithms

    ...The underlying idea is to parameterize a flow (a time-dependent vector field) that transports samples from a simple base distribution to a target distribution, and train via matching of flows without requiring score estimation or noisy corruption—this can lead to more efficient or stable generative training. The library supports both continuous-time flows (via differential equations) and discrete-time analogues, giving flexibility in design and tradeoffs. It provides examples across modalities (images, toy 2D distributions) to help users understand how to apply flow matching in practice. ...
    Downloads: 9 This Week
    Last Update:
    See Project
  • G-P - Global EOR Solution Icon
    G-P - Global EOR Solution

    Companies searching for an Employer of Record solution to mitigate risk and manage compliance, taxes, benefits, and payroll anywhere in the world

    With G-P's industry-leading Employer of Record (EOR) and Contractor solutions, you can hire, onboard and manage teams in 180+ countries — quickly and compliantly — without setting up entities.
    Learn More
  • 5
    Ccache

    Ccache

    A fast compiler cache

    ...Supports fast "direct" and "depend" modes that don't rely on using the preprocessor. Supports compression using Zstandard. Checksums cache content using XXH3 to detect data corruption. Keeps statistics on hits/misses. Automatic cache size management. Easy installation.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6
    VictoriaMetrics

    VictoriaMetrics

    VictoriaMetrics: fast, cost-effective monitoring solution

    VictoriaMetrics is a fast, cost-effective and scalable monitoring solution and time series database. VictoriaMetrics is available in binary releases, Docker images, Snap packages and source code. Just download the latest version of VictoriaMetrics. VictoriaMetrics is developed at a fast pace, so it is recommended periodically checking the CHANGELOG and performing regular upgrades. It can be used as long-term storage for Prometheus. See these docs for details. It can be used as a drop-in...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 7
    HSD

    HSD

    Handshake Daemon & full node

    ...Names on the internet (top level domains, social networking handles, etc.) ultimately rely upon centralized actors with full control over a system that are relied upon to be honest, as they are vulnerable to hacking, censorship, and corruption. Handshake aims to experiment with new ways the internet can be more secure, resilient, and socially useful with a peer-to-peer system validated by the network's participants. Handshake is an experiment that seeks to explore those new ways in which the necessary tools to build a more decentralized internet. Services on the internet have become more centralized beginning in the 1990s, but do not fulfill the original decentralized vision of the internet.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Benthos

    Benthos

    Fancy stream processing made operationally mundane

    ...Benthos processes and acknowledges messages using an in-process transaction model with no need for any disk persisted state, so when connecting to at-least-once sources and sinks it's able to guarantee at-least-once delivery even in the event of crashes, disk corruption, or other unexpected server faults. This behaviour is the default and free of caveats, which also makes deploying and scaling Benthos much simpler.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 9
    SlateDB

    SlateDB

    A cloud native embedded storage engine built on object storage

    Unlike traditional LSM-tree storage engines, SlateDB writes data to object storage to provide bottomless storage capacity, high durability, and easy replication. SlateDB is an embedded storage engine built as a log-structured merge-tree. Unlike traditional LSM-tree storage engines, SlateDB writes data to object storage (S3, GCS, ABS, MinIO, Tigris, and so on). Leveraging object storage allows SlateDB to provide bottomless storage capacity, high durability, and easy replication. The trade-off...
    Downloads: 5 This Week
    Last Update:
    See Project
  • Nonprofit Budgeting Software Icon
    Nonprofit Budgeting Software

    Martus Solutions provides seamless budgeting, reporting, and forecasting tools that integrate with accounting systems for real-time financial insights

    Martus' collaborative and easy-to-use budgeting and reporting platform will save you hundreds of hours each year. It's designed to make the entire budgeting process easier and create unlimited financial transparency.
    Learn More
  • 10
    Bull

    Bull

    Queue package for handling distributed jobs and messages in NodeJS

    ...Metrics and statistics, and many more features. Queues are robust and can be run in parallel in several threads or processes without any risk of hazards or queue corruption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    ExtremeLauncher

    An Open-Source Minecraft Launcher

    ...Create your own modpacks with ease, complete with compatibility checks to prevent errors. - Instance Management: Keep game versions, mods, and settings isolated to avoid conflicts or accidental world corruption. - Performance Optimization: Built with the Qt toolkit for minimal system resource usage and maximum speed. - Customizability: Personalize themes and menu layouts to suit your style. Download Extreme Launcher today and enjoy a seamless, powerful way to manage your Minecraft adventures.
    Downloads: 21 This Week
    Last Update:
    See Project
  • 12

    CheckIt

    Checkit is a file integrity tool for Linux and Unix systems.

    ...It allows you to detect any data integrity issues or file changes to any file. By storing a checksum as an extended attribute, checkit provides an efficient way to detect silent data corruption, bit rot, or other modification errors. It was inspired by the checksumming performed by filesystems like BTRFS and ZFS. Checkit allows similar functionality, the ability to compare stored files and entire directory trees against a checksum at a glance.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    g3fc

    g3fc

    A modern, fast, and secure file archiver with built-in data resilience

    ...G3FC excels with its technical features: blazing-fast Zstandard compression, strong AES-256-GCM authenticated encryption, and optional Forward Error Correction (FEC) to prevent data corruption. Its unique footer design allows for instant file indexing and searching, even in massive archives, eliminating the slow scans required by formats like TAR. G3FC is built for developers and power users, with native, open-source implementations available in Rust, Go, C#, and Python for true cross-platform performance.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    Checkitgui

    Checkitgui

    Checkit is a graphical file integrity tool for Linux and Unix systems.

    ...It allows you to detect any data integrity issues or file changes to any file. By storing a checksum as an extended attribute, checkit provides an efficient way to detect silent data corruption, bit rot, or other modification errors. It was inspired by the checksumming performed by filesystems like BTRFS and ZFS. Checkit allows similar functionality, the ability to compare stored files and entire directory trees against a checksum at a glance. This is the GUI version
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    DAR - Disk ARchive

    DAR - Disk ARchive

    For full, incremental, compressed and encrypted backups or archives

    DAR is a command-line backup and archiving tool that uses selective compression (not compressing already compressed files), strong encryption, may split an archive in different files of given size and provides on-fly hashing, supports differential backup with or without binary delta, ftp and sftp protocols to remote cloud storage Archive internal's catalog, allows very quick restoration even a single file from a huge, eventually sliced, compressed, encrypted archive eventually located on...
    Leader badge
    Downloads: 199 This Week
    Last Update:
    See Project
  • 16
    sysexy

    sysexy

    the sexy sysex librarian that Linux needs...

    Sysexy MIDI Librarian is a data dump utility for musicians and studio producers. A librarian program allows you to do "sysex dumps" to and from synthesizers, drum machines, effects processors, etc., and archive the data on a computer, containing sounds, configuration settings, sequences which can later be sent back to the originating equipment. This allows a computer to be used as data storage for musical instruments and studio gear.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 17
    asami

    asami

    A flexible graph store, written in Clojure

    Asami is now being developed in this repository, as it is no longer being supported at Cisco. The deployment to Clojars has not changed, as it was always to my personal account.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Compare Backup Drive Hashes

    A spreadsheet to aid in detecting ransomware-corrupted files

    This project offers an Excel spreadsheet, available for download through the Files tab (above). The spreadsheet allows the user to compare two sets of file hashes, such as the hashes for files on two different data drives. The spreadsheet's Instructions tab provides step-by-step guidance through that comparison process. The purpose of the file hash comparison is to identify files whose contents have changed. For example, the files on an up-to-date data drive may be compared against the...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    seladb/pickledb-rs

    seladb/pickledb-rs

    PickleDB-rs is a lightweight and simple key-value store

    PickleDB-RS is a lightweight, fast, and key-value store written in Rust. Inspired by the Python PickleDB, it provides a simple, NoSQL database for small applications that require persistent key-value storage without the overhead of full-fledged databases. It is designed for speed and ease of use, with a JSON-based storage format.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Resilient Linux

    Resilient Linux

    A resilient Debian Linux derivative for indestructible installations.

    PC distribution with the data partition mounted on top of a read-only system partition, resistent to filesystem-corruption. For 64bit desktops. Resilient A Debian GNU/Linux (Buster) derivative with a unique partitioning scheme crafted for maximizing the strength against filesystem corruption: the ISO9660 system partition is read-only by design at filesystem-level. Ductile Persistence partition contains only the diffs from the stock installation; system updates and your data lay there – you can do complete system backups/snapshots by just tar-ring the files contained within that partition. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    DBRECOVER for MySQL

    repair corrupt MySQL database recover dropped table and database

    DBRECOVER For MYSQL Database(InnoDB/MyISAM) is professional utility to recover data from damaged or corrupt InnoDB tables and MyISAM tables, made by DBRECOVER SOFTWARE INC. We provide dbrecover for mysql as software and service. Using DBRECOVER For MYSQL , it is possible to recover data from tables that can not be read even using innodb_force_recovery. The software is intended to be used against ibdata files that are not in active use by a live DB server. In general terms, the...
    Downloads: 18 This Week
    Last Update:
    See Project
  • 22
    Rdbtools

    Rdbtools

    Parse Redis dump.rdb files, Analyze Memory, and Export Data to JSON

    ...By default, the callback try to parse RDB data using UTF-8 and escape non 'ASCII printable' characters with the \U notation, or non-UTF-8 parsable bytes with \x. Attempting to decode RDB data can lead to binary data corruption, this can be avoided by using the --escape raw option. Another option is to use -e base64 for Base64 encoding of binary data.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23

    XWA Hacker

    Fixes for X-Wing game binaries

    Fix/improve X-Wing games (XWA and others) to allow them to run on current PCs with improved graphics. Now also available on the Microsoft Store (consider it beta) at ms-windows-store://pdp/?productid=9PPKMJSRTM2B or https://www.microsoft.com/store/apps/9PPKMJSRTM2B
    Downloads: 8 This Week
    Last Update:
    See Project
  • 24
    Sploitware

    Sploitware

    Vulnerability analytics

    ...It brings together links to tutorials, tools, writeups, and CTF resources so that security learners don’t have to hunt across the internet for a coherent path. The focus is on practical exploitation skills: understanding memory corruption, reverse engineering, shellcode, privilege escalation, and platform specifics. By being a single, public list, it lowers the barrier for newcomers who want to go from “I know nothing about exploitation” to “I can follow a CTF writeup” in a guided way. It is also helpful for defenders and security engineers who want to understand offensive techniques to harden systems. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    KonDB

    Organizer for your Kontakt files

    - Easily Organize, Sort Through, and Load your Kontakt NKI/NKM Files in Windows - This project was built to satisfy a need to have a separate app to manage a large Kontakt files collection. - This app does not delete/move/rename/etc. your files, but it will make management of your files a lot easier. Getting Started: Drag-and-drop files/folders into this app from your computer at any time to add to your index. If you drag in the same file(s) twice, it won't be re-added. Drag-and-drop...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next