Showing 5 open source projects for "key code"

View related business solutions
  • Auth0 for AI Agents now in GA Icon
    Auth0 for AI Agents now in GA

    Ready to implement AI with confidence (without sacrificing security)?

    Connect your AI agents to apps and data more securely, give users control over the actions AI agents can perform and the data they can access, and enable human confirmation for critical agent actions.
    Start building today
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • 1
    The Simplest Manual Counter

    The Simplest Manual Counter

    Manual counter with the keyboard or the mouse on images

    The only open source counter to count any items the simplest and easiest way with the keyboard, or the mouse specifically on images. After associating a key to each item, or a predefined graphical symbol for images, pressing the key or clicking on the image increments its associated counter, and displays (for the images) the symbol at the mouse's pointer location. Such a project is so simple a child could use it!
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Alien Evolution

    Alien Evolution

    A websocket based realtime browser application using the Alien Cipher.

    Alien Evolution realtime socket based delivery. What makes this website truly unique is we are using a Alien Cipher encoded websocket to deliver the html and javascript to the client. After the initial key exchange Alien completely drops http transfers from the mix and pushes the Alien Evolution website to client via the socket. Secure content delivery and realtime interactivity are the primary goals of this project and Alien Evolution does not disappoint. Alien moves the logic outside of the webtree and provide cgi abilities via the apis that connect the endpoints together and allows Alien to deliver client code on a realtime basis according to user interactions. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Betty

    Betty

    Holberton-style C code checker written in Perl

    Betty is a Perl-based coding style checker that enforces the Holberton School coding style (inspired by the Linux kernel style) for C code and documentation. It identifies inconsistencies, style violations, and formatting issues in C source files. You should be aware that by default, some text editors are using spaces instead of tabs. For instance, when you press tab key on emacs, by default, leading spaces will be put, and that will cause Betty to raise a lot of warnings. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    __Alien Cipher

    __Alien Cipher

    A bespoke symmetric cipher.

    Released under 'Creative Commons v3' license Alien Cipher is an endeavour to build my own symmetric cipher. The primary aim is to simply learn the fundamentals and finer details of cryptography in general and build working examples of my ideas in code. The code is shared here for posterity (future folk) in the guise that it may help others also on the path to cryptography. This code demo uses a 256bit rolling hash table (8x8bytes) at its heart to mix together pre-defined parameters in a way that allows the cipher to produce encoded output that is locked to a key of arbitrary length without padding. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • All-in-one security tool helps you prevent ransomware and breaches. Icon
    All-in-one security tool helps you prevent ransomware and breaches.

    SIEM + Detection and Response for IT Teams

    Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.
    Learn More
  • 5
    Cress Tool Suite

    Cress Tool Suite

    Cress is a comprehensive toolset for graphical service/workflow design

    Cress (Communication Representation Employing Systematic Specification) allows graphical description of a wide variety of services such as in data communications/telecommunications, but Cress is not limited to this. The approach allows services to be described graphically as (work)flows of activities. Cress diagrams are automatically translated into formal languages for rigorous analysis and verification, and are also automatically translated into implementation languages for deployment...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next