13 projects for "basic" with 2 filters applied:

  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • eProcurement Software Icon
    eProcurement Software

    Enterprises and companies seeking a solution to manage all their procurement operations and processes

    eBuyerAssist by Eyvo is a cloud-based procurement solution designed for businesses of all sizes and industries. Fully modular and scalable, it streamlines the entire procurement lifecycle—from requisition to fulfillment. The platform includes powerful tools for strategic sourcing, supplier management, warehouse operations, and contract oversight. Additional modules cover purchase orders, approval workflows, inventory and asset management, customer orders, budget control, cost accounting, invoice matching, vendor credit checks, and risk analysis. eBuyerAssist centralizes all procurement functions into a single, easy-to-use system—improving visibility, control, and efficiency across your organization. Whether you're aiming to reduce costs, enhance compliance, or align procurement with broader business goals, eBuyerAssist helps you get there faster, smarter, and with measurable results.
    Learn More
  • 1
    Osquery

    Osquery

    SQL operating system instrumentation and monitoring framework

    ...With osquery, SQL tables represent abstract concepts such as running processes, loaded kernel modules, open network connections, browser plugins, hardware events or file hashes.Osquery queries your devices like a database. Osquery uses basic SQL commands to leverage a relational data-model to describe a device. Frequently, attackers will leave a malicious process running but delete the original binary on disk. This query returns any process whose original binary has been deleted, which could be an indicator of a suspicious process.
    Downloads: 19 This Week
    Last Update:
    See Project
  • 2
    Honeyd2MySQL

    Honeyd2MySQL

    Utility to move honeyd.log entries to a MySQL database.

    This is yet another simple piece of software that extracts all the basic stats from honeyd’s text-based log files and inserts them in a MySQL database. Then you can run some queries and of course visualize the data if you want to. Many things are hardcoded or dead simple, but it does the job. The file is a modified version of “honeyd_importer” perl script originally writen by Joshua Gimer and shared through “honeypots” mailing list.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Pyama

    Open Source System and Network Monitoring for Linux Desktop

    Open Source system and network monitoring application for desktop Linux user. It gives end-user broader view of what happening on their system. The basic idea is give linux user application that can monitor system like many commercial antivirus HIDS.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts coming from a SNORT IDS system.
    Downloads: 8 This Week
    Last Update:
    See Project
  • Create and run cloud-based virtual machines. Icon
    Create and run cloud-based virtual machines.

    Secure and customizable compute service that lets you create and run virtual machines.

    Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
    Try for free
  • 5
    NLog is a logging platform for .NET with rich log routing and management capabilities. It uses familar logger pattern known from log4xxx. Advanced routing options include buffering, asynchronous logging, load balancing, failover, and more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    BASE+ (Basic Analysis and Security Engine) is based on ACID project. This application provides a web front-end to query and analyze the alerts coming from various IDS systems (e.g. Snort).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Very basic RRDtool tutorial. It is an example in that way. It can save you a couple of days of discovering on your own. In any case you have to read the manual _before_ that ;)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    IDS via ACL log management, including basic reporting via PHP
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    The Winfessor Enhanced .NET Trace Library is written in VB.NET, supports class level configuration, and contains both console and Winforms trace receiver interfaces. To use it you simply put a Traceable attribute on your class and call a static method.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Payments you can rely on to run smarter. Icon
    Payments you can rely on to run smarter.

    Never miss a sale. Square payment processing serves customers better with tools and integrations that make work more efficient.

    Accept payments at your counter or on the go. It’s easy to get started. Try the Square POS app on your phone or pick from a range of hardworking hardware.
    Learn More
  • 10
    A neat weblog using PHP and MySQL. Intend to provide all the most basic functionality to your weblog, diary, article collection (or whatever you would like to use it for). Simplicity and functionality goes before complexity and lots of functions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    daddyQ, written in Python, monitors and logs disk usage on file servers, and take actions on excessive disk usage. Users that are often over their quota or are over the quota with excessive disk usage get their files deleted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    secheck is a script which imitates currently existing log checkers but with a focus on security. secheck does some basic system security checking, then emails to output to a given user.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The Linux BSM is an auditing tool that aims to bring the capabilities of Sun's Solaris Basic Security Module to Linux.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next