Showing 13 open source projects for "input-leap"

View related business solutions
  • Auth0 B2B Essentials: SSO, MFA, and RBAC Built In Icon
    Auth0 B2B Essentials: SSO, MFA, and RBAC Built In

    Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.

    Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
    Sign Up Free
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    Logan

    Logan

    Logan is a lightweight case logging system based on mobile platform

    Logan is a log platform with the ability to collect, store, upload and analyze front-end logs. We provide five components, including iOS SDK, Android SDK, Web SDK, analysis services Server SDK and LoganSite. In addition, we also provide a Flutter plugin Flutter Plugin. LoganSite provides a visualized way for developers to scan and search logs uploaded from App and Web. To put it simply, the traditional idea is to piece together the problems that appear in the logs of each system, but the new...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    Syslogd2

    High capacity syslog data collection, filtering, and management.

    ...It is multi-threaded, scalable and versatile with features designed for both network and host managers. Each Syslogd2 binary is customized from a set of over 20 features at compile-time. It can support input from text files, named-pipes, Linux kernel and user-defined Linux and (both IPv4 and IPv6) IP sockets (both UDP and TCP). It provides a pre-loadable name-cache that can replace DNS services for host-name resolution. Syslogd2 easy-to-use filters use string-matching to select messages which can then be modified, dropped, kept or re-routed (changed to new facilities). ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    DBD2

    A multi-threaded, multi-database tcp-based database insertion app.

    DBD2 inserts database records from TCP input. It is a companion project to Syslgod2 and an application in its own right. It ships with a backgrounding client for generic use. The client sends whatever information the user puts on the command-line to the back-end daemon via TCP. Upon successful transmission, the client exits. On failure, it backs off and retries until its life-time timer expires.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    collectd

    collectd

    System information collection daemon

    collectd is a small daemon which collects system information periodically and provides mechanisms to store and monitor the values in a variety of ways.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Compliant and Reliable File Transfers Backed by Top Security Certifications Icon
    Compliant and Reliable File Transfers Backed by Top Security Certifications

    Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.

    Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
    Start Free Trial
  • 5
    keysniffer

    keysniffer

    Linux kernel mode debugfs keylogger

    ...So the module now supports a module parameter codes which shows the keycode shift_mask pair in hex (codes=1) or decimal (codes=2). You can lookup the keycodes in /usr/include/linux/input-event-codes.h. The keypress logs are recorded in debugfs as long as the module is loaded. Only root or sudoers can read the log. The module name has been camouflaged to blend-in with other kernel modules. You can, however, execute a script at shutdown or reboot (the procedure would be distro-specific) to save the keys to a file. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    TeeW

    TeeW

    Tee utility for the Windows command line

    Reads standard input, writes it to standard output and to zero or more files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    syslog proxy daemon

    syslog proxy daemon

    creates an extra socket for syslog (e.g. in a chroot jail)

    Developed for systems that have an older version of syslogd which does not support multiple sockets (e.g. via the '-a' flag). Performs extensive message validation according to RFC 3164
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Logpp is a tool for preprocessing event logs and feeding relevant data to other programs for storing or in-depth analysis. Logpp reads lines appended to input files, matches the lines with patterns, and writes the results to given destinations.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    psyslog is a replacement for syslogd and klogd. it was born because of the missing feature of metalog to log into a mysql database.It uses input and output plugins which makes it easy to extend.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    Searches arbitrary text input (logs, etc) for regular expression(s) matching, and then executes arbitrary SQL statement(s) with matched substrings used as parameters. Offers daemon, incremental and transactional features.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    General line based buffer with backlog written in "C". It supports multiple input and a single output. I/O modules: TCP/IP, UDP/IP, Unix sockets, File/Pipe. It supports backlog writing (and resume) so a failsafe transport-buffer can be build.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Output spool reader for Snort! This program decouples output overhead from the Snort network intrusion detection system and allows Snort to run at full speed. It takes input and output plugins and can therefore be used to convert almost any spooled fil
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    ESM (Extensible System Monitor) is a daemon that lets you tie together plugins to monitor and report on your system. The plugins communicate with ESM via standard input and standard output and can be easilly written in any language.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB