Showing 7 open source projects for "security"

View related business solutions
  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1

    Ip Logger

    Keep log of your IP.

    This will log your ip when it changes. It runs as a service which will automatically start up when the computer starts. This is ideal for people who would like to know their ip when they what to use RDC, or any other services which require them to connect to their PC/server. PLEASE REGISTER AT http://www.tylersimmonds.co.uk/ip/admin/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    NeoLogger

    NeoLogger

    Full Featured Windows Command Line Syslog Logger

    NeoLogger is Windows Syslog Client similar to the logger command known from UNIX/LINUX systems used to send SYSLOG messages. It adds some usefull features to filter and replace content, reads from standard input, files or the windows eventlog. It is also able to watch a file or an eventlog for changes and transmits only the new entries. Logit is an additional tool, that logs process or batch output to a log file or windows Eventlog using predefined prefixes and timestamps. (see the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    With the Log Parser one can scan logs, whitelist out legitimate, non-corrupt entries (usually file paths), and apply a standard format to a log generated by any antivirus or malware-removal program. This makes for easier reading of the meat in any log.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Skavenger analyzes HTTP traffic logged by various Web proxies (including WebScarab and Burp) for indications of common web vulnerabilities such as XSS, CRLF injection and various kinds of information disclosure.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 5
    IntraNET Tracker is a very simple website visitor counter and tracking system in .NET C#, based in Microsoft technologies. It is specially suited for integrated security scenarios, supporting tracking of users behavior.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    IPHits is a security tool that will scan various log files of blocked IPs and report any matches found from a list of Anti-P2P companies.Designed to simplify the reporting process of blocked IP ranges to keep future block lists current.Email your results
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    This project is a filter for Microsoft Internet Security and Acceleration Server with GUI tool for administrators, which provides a simple way for counting and limiting the amount of Internet traffic used by the local network users.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB