Showing 94 open source projects for "convert python to c"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    Output spool reader for Snort! This program decouples output overhead from the Snort network intrusion detection system and allows Snort to run at full speed. It takes input and output plugins and can therefore be used to convert almost any spooled fil
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Live Security/Forensics Linux Distribution, built from scratch and packed full of tools useful for vulnerability analysis, penetration tests, and forensic analysis.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    pyxntp is a Python module which allows the implementation of a Reference Clock Driver from python, via the xntpd Shared Memory interface.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4
    Linux/Windows Admin with interactive features to control Resources on a remote PC
    Downloads: 0 This Week
    Last Update:
    See Project
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 5
    STAT is a framework for building modular, stateful signature-based intrusion detection systems. STAT provides a means to develop sensors which operate in different domains and environments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Pycap provides the ability to capture packets from, and inject packets onto, network interfaces. It dissects commonly found structures in network packets such as Ethernet, IP, ARP, TCP, UDP, and ICMP headers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    An alternative Identification system that is a replacement for Microsoft's Passport and the Liberty Alliance. Its a simple architecture that is setup so anyone can run a server and thereby have control over their online identification.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Linux Mobile System is a full Linux system within a USB Flash Memory Drive. This system will be able to boot from any i386 based PC, so we can to run a lot of utilities: network diagnostic, disk diagnostic, administration terminal, etcetera.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    This library makes SRV records in DNS simple to use; actually, due to the fallback for classical connection mechanisms, it makes building a network connection in general extremely simple.
    Downloads: 0 This Week
    Last Update:
    See Project
  • SIEM | API Security | Log Management Software Icon
    SIEM | API Security | Log Management Software

    AI-Powered Security and IT Operations Without Compromise.

    Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can:
    Learn More
  • 10
    isectd is a middleware daemon that provides many-to-many client-to-server connectivity. Supports multiplexing requests to multiple server processes over IP networks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    pyquota is a Python wrapper module for manipulating disk quotas.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Scalable Cluster Environment (SCE) is a set of interoperable opensource tools that enable users to build and use Beowulf cluster effectively to solve their problems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    PAIP (pipe) is a universal filter application. It uses plugins to transmit and convert data. They can be nested, so the inner structures can become quite complex (non-linear). The command-line interface is similar to a programming language and very easy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Originally written by Paul Vixie in 1986 and distributed through mod.sources, "display" is a program which will repeatedly execute a command and display the output through curses. The purpose of this project is to maintain and extend display.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    Shadow Watcher is a Peer to Peer log sharing tool for the security analyst. Consider it a "community watch" program which allows you to keep your system secure from the threats on the internet and help others do the same.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    PyWIRLD started as a remote ppp dialer. It will be able to manage several machines from a single client, monitor and control network interfaces, and have all features availible via dynamically loadable plugins.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    A peer-to-peer chat program that uses public key encryption (via Gnu Privacy Guard) to keep your conversations from the eyes of packet sniffers (*Cough* Carnivore *Cough*)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Etch is a cross-platform, language- and transport-independent framework for building and consuming network services. With Etch, service development and consumption becomes no more difficult than library development and consumption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    6bed4

    zeroconfig IPv6 tunnel

    The use of NAT devices all over the Internet has made peer-to-peer exchanges unreliable. The rise of IPv6 should repair this, but it will still not be reliable until all peers have implemented IPv6. Such IPv6 implementation could be arranged on the fly with a tunnel mechanism that does not rely on router co-operation or manual configuration. This specification details such a method of embedding IPv6 into UDP and IPv4. It employs embedded Router Solicitation to configure the tunnel's...
    Downloads: 0 This Week
    Last Update:
    See Project