Showing 7 open source projects for "params-validate"

View related business solutions
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • Cut Cloud Costs with Google Compute Engine Icon
    Cut Cloud Costs with Google Compute Engine

    Save up to 91% with Spot VMs and get automatic sustained-use discounts. One free VM per month, plus $300 in credits.

    Save on compute costs with Compute Engine. Reduce your batch jobs and workload bill 60-91% with Spot VMs. Compute Engine's committed use offers customers up to 70% savings through sustained use discounts. Plus, you get one free e2-micro VM monthly and $300 credit to start.
    Try Compute Engine
  • 1
    CoreCycler

    CoreCycler

    Script to test single core stability

    ...Modern CPUs can adjust their CPU frequency depending on their load, and have mechanisms that allow them to clock higher. With this script, you can test the stability for each core, which helps you to validate if your Ryzen "PBO" resp. "Curve Optimizer" settings are actually stable. It also works to test Intel's "Active-Core" Turbo-Boost settings.
    Downloads: 106 This Week
    Last Update:
    See Project
  • 2
    Scoop Extras

    Scoop Extras

    The Extras bucket for Scoop

    Scoop «Extras» is the community-maintained bucket of additional manifests for Scoop, the popular Windows command-line installer; it contains packages and app manifests that don’t fit the stricter criteria of the main Scoop bucket. The repository is organized as a large collection of individual manifest files, helper scripts, and tooling to validate and publish new manifests, and it’s intended so users can extend Scoop with many community-contributed applications. Installation is straightforward for Scoop users: add the bucket with scoop bucket add extras and then install any manifest with scoop install <manifest>, making it quick to access a wide range of Windows command-line and GUI tools. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    BadUSB

    BadUSB

    Flipper Zero badusb payload library

    ...It typically contains firmware examples, payloads, and explanations showing how a device presenting as a Human Interface Device (HID) can inject keystrokes, open shells, or orchestrate data exfiltration when plugged into a machine. The codebase is frequently intended for security research and defensive testing: defenders and red teams use it to validate endpoint controls, USB whitelisting, and user training. Due to the dual-use nature of such techniques, responsible repositories emphasize lab-only experiments, consent-based testing, and mitigations like disabling autorun, enforcing device policies, and using endpoint detection.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 4
    Containers Roadmap

    Containers Roadmap

    This is the public roadmap for AWS container services

    ...The issue history provides valuable context on trade-offs, design pivots, and integration plans across the container ecosystem on AWS. It is not a codebase; it is a living roadmap that signals what’s under consideration, in progress, or shipped. Teams use it to validate use cases, surface gaps, and coordinate previews with early adopters who can test features in realistic environments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cut Data Warehouse Costs up to 54% with BigQuery Icon
    Cut Data Warehouse Costs up to 54% with BigQuery

    Migrate from Snowflake, Databricks, or Redshift with free migration tools. Exabyte scale without the Exabyte price.

    BigQuery delivers up to 54% lower TCO than cloud alternatives. Migrate from legacy or competing warehouses using free BigQuery Migration Service with automated SQL translation. Get serverless scale with no infrastructure to manage, compressed storage, and flexible pricing—pay per query or commit for deeper discounts. New customers get $300 in free credit.
    Try BigQuery Free
  • 5
    Pester

    Pester

    Pester is the ubiquitous test and mock framework for PowerShell

    Pester is the de-facto unit testing and mocking framework for PowerShell, widely used to validate scripts, modules, and automation workflows. It provides a readable DSL for writing Describe/Context/It style specs, expressive assertion helpers (Should), and facilities for setup/teardown to keep tests isolated and reproducible. Beyond unit tests, Pester supports integration tests and can mock functions and modules so external side effects (network, registry, file system) are faked during runs. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Ultimate AppLocker Bypass List

    Ultimate AppLocker Bypass List

    The most common techniques to bypass AppLocker

    ...The project functions as a living catalog: entries list binaries, script hosts, and patterns that researchers have tested or reported in the wild, along with notes about context, platform constraints, and mitigation ideas. It is aimed primarily at defenders, incident responders, and security researchers who need a consolidated reference to understand common bypass vectors and to validate detection logic. The repository emphasizes defensive use—helping blue teams craft allow-list policies, create detection rules, and test policy hardening in isolated lab environments—rather than offensive exploitation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    PowerSploit PowerShell

    PowerSploit PowerShell

    A PowerShell Post-Exploitation Framework

    ...Because the modules can be used to both demonstrate weaknesses and to exploit them, the project is typically referenced in threat emulation, penetration testing, and defensive research to understand attacker capabilities. Responsible use centers on authorized assessments: defenders use the toolkit to validate monitoring and detection, while operators apply its lessons to patch, harden, and instrument systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB