Showing 43 open source projects for "corruption"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Context for your AI agents Icon
    Context for your AI agents

    Crawl websites, sync to vector databases, and power RAG applications. Pre-built integrations for LLM pipelines and AI assistants.

    Build data pipelines that feed your AI models and agents without managing infrastructure. Crawl any website, transform content, and push directly to your preferred vector store. Use 10,000+ tools for RAG applications, AI assistants, and real-time knowledge bases. Monitor site changes, trigger workflows on new data, and keep your AIs fed with fresh, structured information. Cloud-native, API-first, and free to start until you need to scale.
    Try for free
  • 1
    WCDB

    WCDB

    Cross-platform database framework developed by WeChat

    ...ORM/persistence solution via Room from Android Architecture Components. Concurrent access via connection pooling from modern Android framework. Repair toolkit for database corruption recovery.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    ExifTool

    ExifTool

    ExifTool meta information reader/writer

    ...Typical workflows include extracting metadata to JSON/CSV/XML, renaming files from timestamps or tags, shifting capture times, copying tags between files, and cleaning or normalizing fields for archives. The tool is meticulous about character encodings, time zones, and tag groups, helping avoid silent corruption when moving metadata between ecosystems. It is scriptable and composable, with options to operate recursively, write sidecars, preserve originals, or do dry runs for safety. Professionals rely on ExifTool for digital asset management, forensic workflows, and any pipeline where metadata quality and traceability matter.
    Downloads: 103 This Week
    Last Update:
    See Project
  • 3
    Git

    Git

    Fast, scalable, distributed revision control system

    Git is a free, distributed version control system created by Linus Torvalds in 2005 to manage the development of the Linux kernel. It emphasizes speed, data integrity, and support for non-linear workflows, and remains the most popular VCS for collaborative software development. Git is an Open Source project covered by the GNU General Public License version 2 (some parts of it are under different licenses, compatible with the GPLv2). It was originally written by Linus Torvalds with help of a...
    Downloads: 13 This Week
    Last Update:
    See Project
  • 4
    Velero

    Velero

    Backup and migrate Kubernetes applications and their persistent volume

    ...Velero is an open source tool to safely backup and restore, perform disaster recovery, and migrate Kubernetes cluster resources and persistent volumes. Reduces time to recovery in case of infrastructure loss, data corruption, and/or service outages. Enables cluster portability by easily migrating Kubernetes resources from one cluster to another​. Offers key data protection features such as scheduled backups, retention schedules, and pre or post-backup hooks for custom actions. Backup your Kubernetes resources and volumes for an entire cluster, or part of a cluster by using namespaces or label selectors. ...
    Downloads: 6 This Week
    Last Update:
    See Project
  • Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place. Icon
    Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place.

    For healthcare Providers and Facilities

    Incredable streamlines and simplifies the complex process of medical credentialing for hospitals and medical facilities, helping you save valuable time, reduce costs, and minimize risks. With Incredable, you can effortlessly manage all your healthcare providers and their credentials within a single, unified platform. Our state-of-the-art technology ensures top-notch data security, giving you peace of mind.
    Learn More
  • 5
    Ccache

    Ccache

    A fast compiler cache

    ...Supports fast "direct" and "depend" modes that don't rely on using the preprocessor. Supports compression using Zstandard. Checksums cache content using XXH3 to detect data corruption. Keeps statistics on hits/misses. Automatic cache size management. Easy installation.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    VictoriaMetrics

    VictoriaMetrics

    VictoriaMetrics: fast, cost-effective monitoring solution

    VictoriaMetrics is a fast, cost-effective and scalable monitoring solution and time series database. VictoriaMetrics is available in binary releases, Docker images, Snap packages and source code. Just download the latest version of VictoriaMetrics. VictoriaMetrics is developed at a fast pace, so it is recommended periodically checking the CHANGELOG and performing regular upgrades. It can be used as long-term storage for Prometheus. See these docs for details. It can be used as a drop-in...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 7
    HSD

    HSD

    Handshake Daemon & full node

    ...Names on the internet (top level domains, social networking handles, etc.) ultimately rely upon centralized actors with full control over a system that are relied upon to be honest, as they are vulnerable to hacking, censorship, and corruption. Handshake aims to experiment with new ways the internet can be more secure, resilient, and socially useful with a peer-to-peer system validated by the network's participants. Handshake is an experiment that seeks to explore those new ways in which the necessary tools to build a more decentralized internet. Services on the internet have become more centralized beginning in the 1990s, but do not fulfill the original decentralized vision of the internet.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    SlateDB

    SlateDB

    A cloud native embedded storage engine built on object storage

    Unlike traditional LSM-tree storage engines, SlateDB writes data to object storage to provide bottomless storage capacity, high durability, and easy replication. SlateDB is an embedded storage engine built as a log-structured merge-tree. Unlike traditional LSM-tree storage engines, SlateDB writes data to object storage (S3, GCS, ABS, MinIO, Tigris, and so on). Leveraging object storage allows SlateDB to provide bottomless storage capacity, high durability, and easy replication. The trade-off...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 9
    Benthos

    Benthos

    Fancy stream processing made operationally mundane

    ...Benthos processes and acknowledges messages using an in-process transaction model with no need for any disk persisted state, so when connecting to at-least-once sources and sinks it's able to guarantee at-least-once delivery even in the event of crashes, disk corruption, or other unexpected server faults. This behaviour is the default and free of caveats, which also makes deploying and scaling Benthos much simpler.
    Downloads: 4 This Week
    Last Update:
    See Project
  • Rent Manager Software Icon
    Rent Manager Software

    Landlords, multi-family homes, manufactured home communities, single family homes, associations, commercial properties and mixed portfolios.

    Rent Manager is award-winning property management software built for residential, commercial, and short-term-stay portfolios of any size. The program’s fully customizable features include a double-entry accounting system, maintenance management/scheduling, marketing integration, mobile applications, more than 450 insightful reports, and an API that integrates with the best PropTech providers on the market.
    Learn More
  • 10
    Flow Matching

    Flow Matching

    A PyTorch library for implementing flow matching algorithms

    ...The underlying idea is to parameterize a flow (a time-dependent vector field) that transports samples from a simple base distribution to a target distribution, and train via matching of flows without requiring score estimation or noisy corruption—this can lead to more efficient or stable generative training. The library supports both continuous-time flows (via differential equations) and discrete-time analogues, giving flexibility in design and tradeoffs. It provides examples across modalities (images, toy 2D distributions) to help users understand how to apply flow matching in practice. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    Bull

    Bull

    Queue package for handling distributed jobs and messages in NodeJS

    ...Metrics and statistics, and many more features. Queues are robust and can be run in parallel in several threads or processes without any risk of hazards or queue corruption.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12

    ExtremeLauncher

    An Open-Source Minecraft Launcher

    ...Create your own modpacks with ease, complete with compatibility checks to prevent errors. - Instance Management: Keep game versions, mods, and settings isolated to avoid conflicts or accidental world corruption. - Performance Optimization: Built with the Qt toolkit for minimal system resource usage and maximum speed. - Customizability: Personalize themes and menu layouts to suit your style. Download Extreme Launcher today and enjoy a seamless, powerful way to manage your Minecraft adventures.
    Downloads: 20 This Week
    Last Update:
    See Project
  • 13
    g3fc

    g3fc

    A modern, fast, and secure file archiver with built-in data resilience

    ...G3FC excels with its technical features: blazing-fast Zstandard compression, strong AES-256-GCM authenticated encryption, and optional Forward Error Correction (FEC) to prevent data corruption. Its unique footer design allows for instant file indexing and searching, even in massive archives, eliminating the slow scans required by formats like TAR. G3FC is built for developers and power users, with native, open-source implementations available in Rust, Go, C#, and Python for true cross-platform performance.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 14
    DAR - Disk ARchive

    DAR - Disk ARchive

    For full, incremental, compressed and encrypted backups or archives

    DAR is a command-line backup and archiving tool that uses selective compression (not compressing already compressed files), strong encryption, may split an archive in different files of given size and provides on-fly hashing, supports differential backup with or without binary delta, ftp and sftp protocols to remote cloud storage Archive internal's catalog, allows very quick restoration even a single file from a huge, eventually sliced, compressed, encrypted archive eventually located on...
    Leader badge
    Downloads: 213 This Week
    Last Update:
    See Project
  • 15
    asami

    asami

    A flexible graph store, written in Clojure

    Asami is now being developed in this repository, as it is no longer being supported at Cisco. The deployment to Clojars has not changed, as it was always to my personal account.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    Compare Backup Drive Hashes

    A spreadsheet to aid in detecting ransomware-corrupted files

    This project offers an Excel spreadsheet, available for download through the Files tab (above). The spreadsheet allows the user to compare two sets of file hashes, such as the hashes for files on two different data drives. The spreadsheet's Instructions tab provides step-by-step guidance through that comparison process. The purpose of the file hash comparison is to identify files whose contents have changed. For example, the files on an up-to-date data drive may be compared against the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    seladb/pickledb-rs

    seladb/pickledb-rs

    PickleDB-rs is a lightweight and simple key-value store

    PickleDB-RS is a lightweight, fast, and key-value store written in Rust. Inspired by the Python PickleDB, it provides a simple, NoSQL database for small applications that require persistent key-value storage without the overhead of full-fledged databases. It is designed for speed and ease of use, with a JSON-based storage format.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Resilient Linux

    Resilient Linux

    A resilient Debian Linux derivative for indestructible installations.

    PC distribution with the data partition mounted on top of a read-only system partition, resistent to filesystem-corruption. For 64bit desktops. Resilient A Debian GNU/Linux (Buster) derivative with a unique partitioning scheme crafted for maximizing the strength against filesystem corruption: the ISO9660 system partition is read-only by design at filesystem-level. Ductile Persistence partition contains only the diffs from the stock installation; system updates and your data lay there – you can do complete system backups/snapshots by just tar-ring the files contained within that partition. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    DBRECOVER for MySQL

    repair corrupt MySQL database recover dropped table and database

    DBRECOVER For MYSQL Database(InnoDB/MyISAM) is professional utility to recover data from damaged or corrupt InnoDB tables and MyISAM tables, made by DBRECOVER SOFTWARE INC. We provide dbrecover for mysql as software and service. Using DBRECOVER For MYSQL , it is possible to recover data from tables that can not be read even using innodb_force_recovery. The software is intended to be used against ibdata files that are not in active use by a live DB server. In general terms, the...
    Downloads: 20 This Week
    Last Update:
    See Project
  • 20
    Rdbtools

    Rdbtools

    Parse Redis dump.rdb files, Analyze Memory, and Export Data to JSON

    ...By default, the callback try to parse RDB data using UTF-8 and escape non 'ASCII printable' characters with the \U notation, or non-UTF-8 parsable bytes with \x. Attempting to decode RDB data can lead to binary data corruption, this can be avoided by using the --escape raw option. Another option is to use -e base64 for Base64 encoding of binary data.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21

    XWA Hacker

    Fixes for X-Wing game binaries

    Fix/improve X-Wing games (XWA and others) to allow them to run on current PCs with improved graphics. Now also available on the Microsoft Store (consider it beta) at ms-windows-store://pdp/?productid=9PPKMJSRTM2B or https://www.microsoft.com/store/apps/9PPKMJSRTM2B
    Downloads: 11 This Week
    Last Update:
    See Project
  • 22
    Sploitware

    Sploitware

    Vulnerability analytics

    ...It brings together links to tutorials, tools, writeups, and CTF resources so that security learners don’t have to hunt across the internet for a coherent path. The focus is on practical exploitation skills: understanding memory corruption, reverse engineering, shellcode, privilege escalation, and platform specifics. By being a single, public list, it lowers the barrier for newcomers who want to go from “I know nothing about exploitation” to “I can follow a CTF writeup” in a guided way. It is also helpful for defenders and security engineers who want to understand offensive techniques to harden systems. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    KonDB

    Organizer for your Kontakt files

    - Easily Organize, Sort Through, and Load your Kontakt NKI/NKM Files in Windows - This project was built to satisfy a need to have a separate app to manage a large Kontakt files collection. - This app does not delete/move/rename/etc. your files, but it will make management of your files a lot easier. Getting Started: Drag-and-drop files/folders into this app from your computer at any time to add to your index. If you drag in the same file(s) twice, it won't be re-added. Drag-and-drop...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    goleveldb

    goleveldb

    LevelDB key/value database in Go

    ...OpenFile uses standard file-system backed storage implementation as described in the leveldb/storage package. OpenFile will return an error with type of ErrCorrupted if corruption is detected in the DB. Use errors.IsCorrupted to test whether an error is due to corruption. Corrupted DB can be recovered with Recover function. CompactRange compacts the underlying DB for the given key range. In particular, deleted and overwritten versions are discarded, and the data is rearranged to reduce the cost of operations needed to access the data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Taskbook

    Taskbook

    Tasks, boards & notes for the command-line habitat

    By utilizing a simple and minimal usage syntax, that requires a flat learning curve, taskbook enables you to effectively manage your tasks and notes across multiple boards from within your terminal. All data are written atomically to the storage in order to prevent corruption and are never shared with anyone or anything. Deleted items are automatically archived and can be inspected or restored at any moment. You can now support the development process through GitHub Sponsors.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next