Showing 8 open source projects for "password"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Context for your AI agents Icon
    Context for your AI agents

    Crawl websites, sync to vector databases, and power RAG applications. Pre-built integrations for LLM pipelines and AI assistants.

    Build data pipelines that feed your AI models and agents without managing infrastructure. Crawl any website, transform content, and push directly to your preferred vector store. Use 10,000+ tools for RAG applications, AI assistants, and real-time knowledge bases. Monitor site changes, trigger workflows on new data, and keep your AIs fed with fresh, structured information. Cloud-native, API-first, and free to start until you need to scale.
    Try for free
  • 1
    LX Linux

    LX Linux

    A light version of Debian with minimal installed using LXDE.

    LX Linux is a distro based on Debian using LXDE as DE with some customization. The installation process uses Calamares. Recommended for very old machines, like 15 years old or more. live password: live Come with some extra repositories to install 3rd part packages (optional). - If brightness keys do not work, open a terminal: sudo nano /etc/default/grub where GRUB_CMDLINE_LINUX_DEFAULT="xxxxx" put acpi_backlight=video or acpi_backlight=vendor try one or another and test which one fits your machine Ctrl + s Ctrl + x sudo update-grub - Automatic login: Menu > Preferences > LXDM configurator mark "Automatic login" and close - Use Connman Settings to connect Wi-Fi
    Downloads: 24 This Week
    Last Update:
    See Project
  • 2
    openWrt-snort

    openWrt-snort

    Image of OpenWrt OS, with snort community featured in.

    ...eth1, which can be USB -> Ethernet port, is used as WAN port, to connect Pi board to Internet IP. to flash img file, you can restore in SD card, or use Balena Etcher to flash. or you can use DD commend of UNIX. **USERNAME** - root **PASSWORD** - bing.google12
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    DracOS GNU/Linux Remastered
    What is DracOS GNU/Linux Remastered ? DracOS GNU/Linux Remastered ( https://github.com/dracos-linux ) is the Linux operating system from Indonesia , open source is built based on Debian live project under the protection of the GNU General Public License v3.0. This operating system is one variant of Linux distributions, which is used to perform security testing (penetration testing). Dracos linux in Arm by hundreds hydraulic pentest, forensics and reverse engineering. Use a GUI-based...
    Downloads: 59 This Week
    Last Update:
    See Project
  • 4
    Rescatux

    Rescatux

    Easy to use Repair distribution for both Gnu/Linux and Windows systems

    Rescatux is a GNU/Linux repair cd (and eventually also Windows) but it is not like other rescue disks. Rescatux comes with Rescapp. Rescapp is a nice wizard that will guide you through your rescue and repair tasks. When the wizard is not able to solve your problem you can also enjoy of Rescatux unique support features: * Chat: Open the chat for asking help directly in Rescatux channel. * Share log: After running an option you can share its log (the action registry that it has done) so...
    Leader badge
    Downloads: 1,561 This Week
    Last Update:
    See Project
  • Run applications fast and securely in a fully managed environment Icon
    Run applications fast and securely in a fully managed environment

    Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.

    Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
    Try for free
  • 5
    Cnchi

    Cnchi

    A modern, flexible online system installer for Antergos Linux

    Cnchi was the graphical installer developed for the now-discontinued Antergos Linux distribution. Designed to offer a user-friendly installation experience, Cnchi provided both novice and experienced users with a simple, guided interface for configuring system settings, selecting desktop environments, and installing packages. It dynamically fetched up-to-date packages during installation and supported custom configurations, language options, and partitioning schemes. Though Antergos is no...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Antorca
    A performance and usability focused Linux distribution based on 64-bit Debian testing. It is the successor to illume OS. To use the live ISO image, login to "root" with the password "antorca".
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    LinuxTLE

    LinuxTLE

    LinuxTLE (Revival)

    ...distribution=linuxtle - https://en.wikipedia.org/wiki/LinuxTLE - https://th.wikipedia.org/wiki/ลีนุกซ์ทะเล Installation: - Recommend burn with DVD - Currently x64 iso - Use "Refracta Installer" inside "System Tools" category from start menu. - CD Username: user - CD Password: root Note: To get the same desktop as CD. Please install with the current user & root password & change them after installed.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 8
    USE secure operating system

    USE secure operating system

    a secure, open source OS for use inside USEagency facilities

    ...It will also have fined-tuned firewall capabilities, with a default policy of deny all inbound except HTTP HTTPS and SSH. Web browser will be sand boxed from other parts of the OS. In order to access saved passwords, cache, cookies, ect in web browser, username/password are required. Downloaded files (and any other files entering the system) will be subjected to both an exception-based and signature-based virus scan. After that, they will be placed in a leveled security storage space, each more secure--with the most secure being 50. Under 50 will be 46-49; under that is 36-45; under that is 27-25; under that is 26; under that is 14-25; under that is 6-13; under that is 5-3; lastly there is level 2 the most insecure. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next