10 projects for "source" with 2 filters applied:

  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 1
    ttyrpld is a multi-OS kernel-level TTY keylogger and screenlogger with (a)synchronous replay support. It runs on Linux, Solaris, FreeBSD, NetBSD and OpenBSD.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Nmap Log Stripper is a Bash script intended to be a way to condense all, or some, of the IPs of a "random" (-iR) nmap scan into a file for later usage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Zee

    Experimental lightweight editor

    ZEE HAS MOVED TO GITHUB (see "Zee Web Site" link).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Squeezer is a multi-dimensional logfile analyzer for Squid web cache server. It measures transfer speed from Squid, source servers and other caches and gives an information useful for tuning Squid and web cache hierarchy or mesh.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    Snort2c attempts to be a improved version of snort2pf wrote by Stephan Schmieder with some advantages: kqueue, pf table support, pf ioctl's calls and others. It works monitoring snort's alertfile and blocking attackers ip using pf calls.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Impost is a network security auditing tool designed to analyze the forensics behind protocol exploitation.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    Shoki is a free, open source network intrusion detection system. The fundamental design goals are simplicity and modularity, and the focus is on traffic analysis rather than content inspection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    my-swatch pretends to be an implementation of msyslog and swatch together. What it pretends to accomplish is put all together, to log events to a remote database (like msyslog) and to awake triggers (like swatch).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Jacclog is a modular open source access logs analytics system written in Java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10
    A tool suite to analyse protocol streams and whose flow characteristic. On the other side, the tool suite can be used to gather information about the network infrastructure and detect bottlenecks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB