Showing 103 open source projects for "evidence"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    Quint Code

    Quint Code

    Structured reasoning framework for Claude Code, Gemini, and Cursor

    Quint Code is a structured reasoning and decision-support framework aimed at making AI-assisted software engineering and decision workflows more rigorous and auditable. It implements the First Principles Framework (FPF) to guide users and AI tools through hypothesis generation, logical verification, evidence gathering, and documented decision making, reducing reliance on ad hoc or “vibe” coding. Instead of accepting the first plausible answer generated by an AI assistant, Quint Code encourages generating multiple competing hypotheses, verifying them, and validating them against real evidence stored in a structured “knowledge base” within your project. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    Shannon

    Shannon

    Fully autonomous AI hacker to find actual exploits in your web apps

    ...The project blends source-aware analysis with automated web interaction so it can validate issues like injection flaws, authentication bypasses, and other exploitable paths in a way that resembles an actual attacker’s workflow. Instead of requiring you to manually reproduce findings, Shannon is designed to produce actionable evidence that a weakness can be weaponized, which helps teams prioritize what truly matters. It positions itself as a pre-attacker safety net, aiming to break your web app before someone else does and thereby reduce the gap between “potentially vulnerable” and “confirmed exploitable.”
    Downloads: 44 This Week
    Last Update:
    See Project
  • 3
    DeepSearcher

    DeepSearcher

    Open Source Deep Research Alternative to Reason and Search

    ...The overall workflow aims to minimize hallucinations by grounding outputs in retrieved material and then applying structured reasoning over that evidence before generating a final report.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    CampusShame

    CampusShame

    Crowdsource and document the reputational history of companies

    ...It compiles lists of companies that have had so-called “shameful” behaviors, such as rescinding offers, canceling intention letters, or terminating three-party agreements after acceptance, alongside a parallel list of companies without reported negative incidents. The project draws on publicly available anecdotes, snapshots, and forum posts from platforms such as NowCoder, Maimai, and Zhihu to provide evidence and context for each entry, preserving details that might otherwise be lost as threads get deleted or censored. It also includes commentary on recruitment pitfalls and encourages contributors to share their own experiences or corrections to keep the list up to date.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 5
    MetaScreener

    MetaScreener

    AI-powered tool for efficient abstract and PDF screening

    MetaScreener is an open-source AI-assisted tool designed to streamline the screening process in systematic literature reviews and academic research workflows. The system helps researchers analyze large collections of academic abstracts and research papers to determine which studies are relevant for inclusion in evidence synthesis projects. Instead of manually reviewing hundreds or thousands of documents, researchers can use MetaScreener to apply machine learning techniques that assist with classification and prioritization of candidate papers. The platform can analyze both abstracts and full PDF documents, enabling automated filtering based on research criteria defined by the user. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    PokeeResearch-7B

    PokeeResearch-7B

    Pokee Deep Research Model Open Source Repo

    PokeeResearchOSS provides an open-source, agentic “deep research” model centered on a 7B backbone that can browse, read, and synthesize current information from the web. Instead of relying only on static training data, the agent performs searches, visits pages, and extracts evidence before forming answers to complex queries. It is built to operate end-to-end: planning a research strategy, gathering sources, reasoning over conflicting claims, and writing a grounded response. The repository includes evaluation results on multi-step QA and research benchmarks, illustrating how web-time context boosts accuracy. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    ResultTypes.jl

    ResultTypes.jl

    A Result type for Julia—it's like Nullables for Exceptions

    ResultTypes provides a Result type that can hold either a value or an error. This allows us to return a value or an error in a type-stable manner without throwing an exception.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    AbstractGPs.jl

    AbstractGPs.jl

    Abstract types and methods for Gaussian Processes

    AbstractGPs.jl is a package that defines a low-level API for working with Gaussian processes (GPs), and basic functionality for working with them in the simplest cases. As such it is aimed more at developers and researchers who are interested in using it as a building block than end-users of GPs. You may want to go through the main API design documentation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Mobile Verification Toolkit

    Mobile Verification Toolkit

    Helps with conducting forensics of mobile devices

    ...It has been developed and released by the Amnesty International Security Lab in July 2021 in the context of the Pegasus project along with a technical forensic methodology and forensic evidence. MVT is a forensic research tool intended for technologists and investigators. Using it requires understanding the basics of forensic analysis and using command-line tools. This is not intended for end-user self-assessment. If you are concerned with the security of your device please seek expert assistance. Compare extracted records to a provided list of malicious indicators in STIX2 format. ...
    Downloads: 37 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 10
    MiroThinker

    MiroThinker

    MiroThinker is an open source deep research agent

    ...Rather than simply generating responses from a single prompt, the agent performs structured multi-step reasoning processes that involve searching for information, analyzing evidence, and synthesizing conclusions. The platform is optimized for research tasks such as financial forecasting, knowledge discovery, and large-scale information synthesis. MiroThinker has been evaluated on several agent benchmarks and has demonstrated strong performance on tests designed to measure deep research capabilities.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 11
    HolmesGPT

    HolmesGPT

    CNCF Sandbox Project

    ...The system aggregates signals from observability tools such as logs, metrics, alerts, and distributed traces, then analyzes them using large language models to identify potential root causes. Rather than requiring engineers to manually correlate large volumes of monitoring data, HolmesGPT automatically synthesizes evidence and presents explanations in natural language. The project is developed by Robusta and has been accepted as a Cloud Native Computing Foundation Sandbox project, highlighting its relevance to the cloud-native ecosystem. It is designed to operate as an automated troubleshooting assistant that can analyze incidents continuously and support on-call engineers during outages.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    Tailslayer

    Tailslayer

    Library for reducing tail latency in RAM reads

    Tailslayer is a cybersecurity and forensic analysis tool designed to extract and analyze artifacts from Tails OS environments. It focuses on uncovering traces of activity in systems that are designed to be privacy-preserving and ephemeral. The tool helps investigators identify residual data such as logs, configurations, or usage traces that may persist despite Tails’ security features. It is particularly relevant for digital forensics and research into privacy systems. Tailslayer emphasizes...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Tongyi DeepResearch

    Tongyi DeepResearch

    Tongyi Deep Research, the Leading Open-source Deep Research Agent

    DeepResearch (Tongyi DeepResearch) is an open-source “deep research agent” developed by Alibaba’s Tongyi Lab designed for long-horizon, information-seeking tasks. It’s built to act like a research agent: synthesizing, reasoning, retrieving information via the web and documents, and backing its outputs with evidence. The model is about 30.5 billion parameters in size, though at any given token only ~3.3B parameters are active. It uses a mix of synthetic data generation, fine-tuning and reinforcement learning; supports benchmarks like web search, document understanding, question answering, “agentic” tasks; provides inference tools, evaluation scripts, and “web agent” style interfaces. ...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 14
    ArchiveBox

    ArchiveBox

    Open source self-hosted web archiving

    ...ArchiveBox is an open source tool that lets organizations & individuals archive both public & private web content while retaining control over their data. It can be used to save copies of bookmarks, preserve evidence for legal cases, backup photos from FB/Insta/Flickr or media from YT/Soundcloud/etc., save research papers, and more. ArchiveBox is an open-source, self-hosted web archiving tool for saving websites offline. It helps organizations and individuals preserve bookmarks, research papers, and social media content, among others.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    Scira

    Scira

    AI-powered search engine that helps you find information

    Scira is an open source AI-powered search and research assistant designed to provide fast, conversational answers grounded in web and knowledge sources. The project combines a modern web interface with retrieval-augmented generation techniques to deliver responses that are both natural language friendly and evidence oriented. It is built for developers who want to deploy their own Perplexity-style or AI search experience without relying on proprietary hosted services. Scira emphasizes speed, clean UI design, and extensibility so teams can customize data sources, models, and ranking logic. The architecture typically supports real-time querying, streaming responses, and modular backend components. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Tailsnitch

    Tailsnitch

    A security auditor for Tailscale configurations

    ...Tailsnitch supports authentication via the Tailscale API (including OAuth or API keys) and provides options to filter findings, run only high-severity checks, and produce compliance artifacts like SOC 2 evidence exports.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Rogue

    Rogue

    AI Agent Evaluator & Red Team Platform

    ...During testing, Rogue records conversations and produces detailed reports that explain whether the agent passed or failed each scenario. These reports include reasoning and evidence, helping developers understand why a particular failure occurred.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    Open Deep Research

    Open Deep Research

    An AI-powered research assistant that performs iterative research

    ...It is intentionally kept compact, with a codebase under roughly 500 lines, making it highly approachable for experimentation and learning. The architecture demonstrates how modern agent pipelines can continuously gather evidence, extract learnings, and adjust research direction over time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Trillian

    Trillian

    A transparent, highly scalable and cryptographically verifiable data

    ...The system is designed for horizontal scale with gRPC APIs, enabling multiple frontends and sequencers to operate over a shared backend. Common use cases include certificate transparency, package registries, and audit logs where public verifiability or tamper evidence is required. Trillian exposes both “log” and “map” primitives so developers can choose between append-only timelines or verifiable dictionaries depending on their data model. By making verification independent of trust in the operator, trillian helps build systems that are auditable by external parties.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Deep Research

    Deep Research

    Use any LLMs (Large Language Models) for Deep Research

    ...It offers MCP server support and SSE APIs, so IDEs and agent clients can drive the same workflow programmatically. The result is a repeatable process for scoping questions, collecting evidence, and producing a concise report with citations and reasoning steps.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Bootstrap Your Own Latent (BYOL)

    Bootstrap Your Own Latent (BYOL)

    Usable Implementation of "Bootstrap Your Own Latent" self-supervised

    ...This repository offers a module that one can easily wrap any image-based neural network (residual network, discriminator, policy network) to immediately start benefitting from unlabelled image data. There is now new evidence that batch normalization is key to making this technique work well. A new paper has successfully replaced batch norm with group norm + weight standardization, refuting that batch statistics are needed for BYOL to work. Simply plugin your neural network, specifying (1) the image dimensions as well as (2) the name (or index) of the hidden layer, whose output is used as the latent representation used for self-supervised training.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Deep Search Agent

    Deep Search Agent

    Implement a concise and clear Deep Search Agent from 0

    ...The repository illustrates how large language models can be orchestrated with tools and planning logic to execute complex search workflows rather than single-prompt responses. It typically combines reasoning, retrieval, and iterative refinement so the agent can break down questions, gather evidence, and synthesize structured outputs. The project is positioned primarily as a proof of concept for deep research agents rather than a production-ready system. Its architecture highlights agent loops, tool calling, and stepwise execution, which are increasingly important patterns in modern AI automation. Overall, the demo serves as a practical reference for developers exploring autonomous research agents and multi-tool LLM orchestration.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Timesketch

    Timesketch

    Collaborative forensic timeline analysis

    Timesketch is a collaborative forensic timeline analysis platform used to investigate security incidents by turning diverse evidence into a single, searchable chronology. Analysts ingest logs and artifacts from many sources—endpoints, servers, cloud services—and Timesketch normalizes them into events on a unified timeline. Powerful search, aggregations, and saved views help you pivot quickly, highlight anomalies, and preserve investigative steps for later review.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    web-eval-agent MCP Server

    web-eval-agent MCP Server

    An MCP server that autonomously evaluates web applications

    web-eval-agent is a Model Context Protocol (MCP) server that spins up a browser-use–capable debugging agent to autonomously run and evaluate web apps straight from your editor. It’s positioned as a “let the coding agent debug itself” companion: the agent launches the app, navigates flows, captures evidence, and iterates on failures without manual copy-pasting of logs. The repository focuses on developer ergonomics, exposing typed MCP tools so clients like Claude Desktop can start sessions, gather traces, and reason over failures with structured artifacts. Marketing and README material emphasize supercharging local debugging loops by combining live browser execution with LLM-driven hypotheses and fixes. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    pic-standard

    pic-standard

    Local protocol for safe agentic AI. Intent + impact + verifiable

    ...Before any high-impact tool call, the agent must submit an Action Proposal (schema + verifier): - explicit intent - impact classification (read / write / money / irreversible / privacy / etc.) - provenance sources with trust levels (untrusted → trusted via verification) - claims backed by verifiable evidence (SHA-256 file hashes or Ed25519 signatures) If trust/evidence is insufficient, it fails closed and blocks the action. Current version features: - Deterministic Hash Evidence verification (SHA-256) - Signature evidence (Ed25519) - Keyring expiry + revocation - CLI keys - MCP and LangGraph integrations - Comprehensive tests, examples, and documentation
    Downloads: 3 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB