Showing 89 open source projects for "python 2"

View related business solutions
  • Red Hat Enterprise Linux on Microsoft Azure Icon
    Red Hat Enterprise Linux on Microsoft Azure

    Deploy Red Hat Enterprise Linux on Microsoft Azure for a secure, reliable, and scalable cloud environment, fully integrated with Microsoft services.

    Red Hat Enterprise Linux (RHEL) on Microsoft Azure provides a secure, reliable, and flexible foundation for your cloud infrastructure. Red Hat Enterprise Linux on Microsoft Azure is ideal for enterprises seeking to enhance their cloud environment with seamless integration, consistent performance, and comprehensive support.
  • Top-Rated Free CRM Software Icon
    Top-Rated Free CRM Software

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
  • 1
    NetworkX

    NetworkX

    Network analysis in Python

    ... with over 90% code coverage. Additional benefits from Python include fast prototyping, easy to teach, and multi-platform. Find the shortest path between two nodes in an undirected graph. Python’s None object is not allowed to be used as a node. It determines whether optional function arguments have been assigned in many functions. And it can be used as a sentinel object meaning “not a node”.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 2
    Sentry

    Sentry

    Cross-platform application monitoring and error tracking software

    ... provides real-time monitoring and data visualization through dashboards. Sentry’s server is in Python, but its API enables for sending events from any language, in any application. More than fifty-thousand companies already ship better software faster thanks to Sentry; let yours be one of them!
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    Jaeger

    Jaeger

    Monitor and troubleshoot transactions in complex distributed systems

    .... It is used for monitoring and troubleshooting microservices-based distributed systems. OpenTracing compatible data model and instrumentation libraries include Go, Java, Node, Python, C++ and C#. Jaeger uses consistent upfront sampling with individual per service/endpoint probabilities and it has multiple storage backends: Cassandra, Elasticsearch, memory.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    Twisted

    Twisted

    Event-driven networking engine written in Python

    Twisted is an event-based framework for internet applications, supporting Python 3.6+. It includes modules for many different purposes. Twisted supports all major system event loops, select (all platforms), poll (most POSIX platforms), epoll (Linux), kqueue (FreeBSD, macOS), IOCP (Windows), and various GUI event loops (GTK+2/3, Qt, wxWidgets). Third-party reactors can plug into Twisted, and provide support for additional event loops.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Business Continuity Solutions | ConnectWise BCDR Icon
    Business Continuity Solutions | ConnectWise BCDR

    Build a foundation for data security and disaster recovery to fit your clients’ needs no matter the budget.

    Whether natural disaster, cyberattack, or plain-old human error, data can disappear in the blink of an eye. ConnectWise BCDR (formerly Recover) delivers reliable and secure backup and disaster recovery backed by powerful automation and a 24/7 NOC to get your clients back to work in minutes, not days.
  • 5
    Spektral

    Spektral

    Graph Neural Networks with Keras and Tensorflow 2

    Spektral is a Python library for graph deep learning, based on the Keras API and TensorFlow 2. The main goal of this project is to provide a simple but flexible framework for creating graph neural networks (GNNs). You can use Spektral for classifying the users of a social network, predicting molecular properties, generating new graphs with GANs, clustering nodes, predicting links, and any other task where data is described by graphs. Spektral implements some of the most popular layers for graph...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    megawake

    megawake

    Remotely turn on devices connected to your home network

    ... to: 1-Connect to the same network as the device you want to wake. 2-Enable Wake on Lan (WoL) feature on the device you want to wake. 3-Make sure the device is turned off or in sleep state. System requirements for WoL: 1-Smart TV must be manufactured in 2012 or newer. 2-Windows PC must be Windows 95 or newer. 3-Wake on Lan supported BIOS (Firmware)
    Downloads: 4 This Week
    Last Update:
    See Project
  • 7
    EulerSharp

    EulerSharp

    Euler Yet another proof Engine

    EYE [1] is a reasoning engine supporting the Semantic Web layers [2]. It performs controlled chaining and it supports Euler paths [3]. Via N3 [4] it is interoperable with Cwm [5]. [1] http://eulersharp.sourceforge.net/README [2] http://www.w3.org/DesignIssues/diagrams/sweb-stack/2006a [3] http://mathworld.wolfram.com/KoenigsbergBridgeProblem.html [4] http://www.w3.org/TeamSubmission/n3/ [5] http://www.w3.org/2000/10/swap/doc/cwm
    Downloads: 3 This Week
    Last Update:
    See Project
  • 8
    LoL Absent

    LoL Absent

    Program to block League of Legends contacts.

    ABANDONED PROJECT. THE PROGRAM DOES NOT WORK BECAUSE THE CHAT SERVERS HAVE CHANGED SINCE THE LAST UPDATE. Program to block League of Legends contacts. When you use it, you will appear offline and you will not be able to write in the picks and bans phase, but yes during the game. REQUIREMENTS: 1 - Windows 10 x64 or higher operative system. 2 - NET Framework 4.7.2 or higher.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9

    WiFiSafe

    Small utility software conceived to share WiFi connections between com

    Small utility software conceived to share WiFi connections between computers. As the software is intended to be used on a USB drive, the WiFi profiles (the files that store the connection information) are encrypted to avoid revealing sensitive information in case the device is lost. It will run with admin rights in order to access WiFi keys. 1)Place this program on a USB device. 2)Run it, you will be asked to set up a new password. 3)Once it is done, choose Export profiles (or Synchronise...
    Downloads: 0 This Week
    Last Update:
    See Project
  • ConnectWise Cybersecurity Management for MSPs Icon
    ConnectWise Cybersecurity Management for MSPs

    Software and support solutions to protect your clients’ critical business assets

    ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.
  • 10
    Age and Gender Estimation

    Age and Gender Estimation

    Keras implementation of a CNN network for age and gender estimation

    Keras implementation of a CNN network for age and gender estimation. This is a Keras implementation of a CNN for estimating age and gender from a face image [1, 2]. In training, the IMDB-WIKI dataset is used. Because the face images in the UTKFace dataset is tightly cropped (there is no margin around the face region), faces should also be cropped in demo.py if weights trained by the UTKFace dataset is used. Please set the margin argument to 0 for tight cropping. You can evaluate a trained model...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 11
    Deep Learning with Keras and Tensorflow

    Deep Learning with Keras and Tensorflow

    Introduction to Deep Neural Networks with Keras and Tensorflow

    Introduction to Deep Neural Networks with Keras and Tensorflow. To date tensorflow comes in two different packages, namely tensorflow and tensorflow-gpu, whether you want to install the framework with CPU-only or GPU support, respectively. NVIDIA Drivers and CuDNN must be installed and configured before hand. Please refer to the official Tensorflow documentation for further details. Since version 0.9 Theano introduced the libgpuarray in the stable release (it was previously only available...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    BlueGate HotSpot (Remake)

    BlueGate HotSpot (Remake)

    Turns your Windows WiFi into a HotSpot

    ...: +Share any type of Internet Connection (LAN,Ethernet,3G/4G,Wifi,etc) +WPA2 AES Encryption +Extends your Router's range & Acts as a repeater +View clients connected (Device name, Ip Address, Mac Address) +Support Windows 7/8/8.1 +User Friendly & Light Weight +Leaves nothing behind (Virtual adapter is cleared when hotspot is stopped) +Written in Python 2 +Now it's open Source
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    PotHead

    PotHead

    ...! 5) Run the python file! Pothead.py -pp 22 23 -site http://YOURSITE.COM/api/write.php -apikey YOURAPIKEY 6) Profit! Is this for anyone? Hmmmm, yes and no I would suggest you know a thing or two about PHP & Python. It’s a pre-release and still in the early alpha stage. Is it safe? It’s pretty safe ;) Does it work? Yeah check it live! http://7ol.eu/view.php
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    radiustest

    Radius client written in python

    .../receive packets. It consists of two python classes: - RadiusExt: Radius class supporting AVP, authentication, packet manipulation (derived from Scapy Packet class) - RadiusAttr: Class for AVP (derived from Scapy Packet class) I use this client to: - test basic PAP authentication - send different AVP to test if Radius server is behaving correctly (RFC compliance) - display returned AVP - flood Radius server with multiple packets (performance testing) For examples please refer to readme.txt
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    LLDP Generator

    The project is a valid Link Layer Discovery Protocol frame generator

    ... automated tests can be made for testing the behavior of a LLDP neighbor. Example of tests: 1. Sending a large number of LLDP frames each containing all TLVs, each TLV having a large amount of informations. 2. Sending a large number of LLDP frames at a short interval and inspect the LLDP neighbor's database. 3. Try to overload some TLVs(adding more information than is permited) and inspect neighbor's database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    snakeFlow - collector for flow protocol version 5 writetten on python 2.7 By default output data to the console. May store file data and the database MySQL docs (2 parts): http://snakeproject.ru/rubric/article.php?art=python_netflow_collector_1 http://snakeproject.ru/rubric/article.php?art=python_netflow_collector_2
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    subnetcalculator

    subnetcalculator

    Basic subnet calculator written in Python.

    Based on the IP address and subnet mask input from the user, the following values are calculated: #1. Network address #2. Broadcast address #3. Number of valid hosts #4. Wildcard mask #5. Number of mask bits (CIDR notation) #6. Random IP addresses from the subnet.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    WiKID Two-Factor Authentication System

    WiKID Two-Factor Authentication System

    Two-factor authentication system

    The WiKID Strong Authentication System is a public-key based two-factor authentication system. It is a flexible, extensible, and secure alternative to tokens, certs and passwords. Application & API support exists for Java, ASP, PHP, Ruby, OpenVPN, TACACS+, etc. Read our eGuide on how to setup your network with two-factor authentication: http://www.wikidsystems.com/learn-more/two-factor-authentication-white-papers
    Downloads: 2 This Week
    Last Update:
    See Project
  • 19
    USE secure operating system

    USE secure operating system

    a secure, open source OS for use inside USEagency facilities

    ... and signature-based virus scan. After that, they will be placed in a leveled security storage space, each more secure--with the most secure being 50. Under 50 will be 46-49; under that is 36-45; under that is 27-25; under that is 26; under that is 14-25; under that is 6-13; under that is 5-3; lastly there is level 2 the most insecure. The operating system itself will require many passwords: boot up, access logon screen, login, admin, and more/ Mainly, it will be built with strong security as its base
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    pyforward

    pyforward

    Turn your linux machine into an infrastructure wifi router.

    pyforward is a GTK+ front-end to three core linux technologies that make it possible to turn your computer into a wifi access point in infrastructure mode: 1. iptables - To enable routing of your requests. 2. dnsmasq - To assign ip-addresses using dhcp. 3. hostapd - To enable wifi access to your machine in infrastructure mode. Refer the wiki page for more information on how to run pyforward. Note: Presently I'm in "development" mode. So, I urge the users of pyforward to make any...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    DogoIDS

    DogoIDS

    Active-probing-based network IDS for wireless networks

    DogoIDS is an open-source active-probing-based network intrusion detection system (AP-NIDS) for wireless multihop networks (MANETs, Wireless Mesh Networks, Sensor Networks, etc). At this stage, DogoIDS only support the IEEE 802.11s standard for Wireless Mesh Networks. DogoIDS is now under construction in a very early stage and mainly for research purposes. However, we aim to release a stable version ready for production soon. *** IMPORTANT *** We uploaded the very first experimental...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Python sniffer that identifies interactive SSH sessions. It detects when an intruder uses SSH with: a wrong password, a good one or with a password cracking program. It uses two techniques: SSH client's banner identification and SSH session total by
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    GIPC

    GIPC

    Geographical IP Correlation

    TL;DR Version: I wrote a tool called GIPC (short for Geographical IP Correlation and pronounced Gypsy) which takes a list of IP address and returns the Geographical information you select based on the MaxMind.com GeoCity Database. The exe requires 2 inputs: The IP file (one IP per line) MaxMind GeoCity database – This can be downloaded HERE:http://geolite.maxmind.com/download/geoip/database/GeoLiteCity.dat.gz Please read more on my blog: http://jcsocal.blogspot.com/2013/03/geographical-ip...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    minder

    minder

    Monitoring your infrastructure for free.

    This software presents a flexible and configurable proposal for monitoring and management of real and virtual HPC infrastructures, compatible with paradigm of cloud computing. We help you to answer: 1) What is the performance of my resources? 2) What equipment and resources do we have already? 3) What do we need to upgrade or repair? 4) What can we consolidate to reduce complexity or reduce energy use? 5) What resources would be better reused somewhere else? Status: PreAlpha, so any...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    GlassBeadGame

    GlassBeadGame

    Organizing the Knowledge of Humanity

    OUT OF DATE: See the Singularity project here at sourceforge. This project aims to make the expanse of human knowledge beautifully presentable and the exabytes of data navigable by an average user via the power of a Unified Data Model and 3d visualization layer for the Web. It will invert the top 3 layers of the OSI network model to make a 3-dimensional presentation layer with a peer-to-peer session layer for the Internet. For the curious, there is a simple demo that provides a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next