Showing 122 open source projects for "detect it"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Ingest Package Label Data Using OCR Software Icon
    Ingest Package Label Data Using OCR Software

    PackageX OCR API converts any smartphone into a powerful universal label scanner that reads every bit of text on the label, including barcodes and QR

    Our state-of-the-art OCR technology uses robust deep learning models and proprietary algorithms to extract information from package labels.
    Learn More
  • 1
    Harmonia - Music score analysis
    Harmonia is a tool for analyzing music scores exported to MIDI or MusicXML format. It allows you to detect voices inside a single MIDI track (eg. live piano recording), main themes (and their motifs), harmonic key and chord interpretation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    VulnX

    VulnX

    Intelligent Bot, Shell can achieve automatic injection

    vulnx, an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities in CMS systems. It can perform a quick CMS security detection, information collection (including sub-domain name, IP address, country information, organizational information and time zone, etc.), and vulnerability scanning. Vulnx is An Intelligent Bot Auto Shell Injector that detects vulnerabilities in multiple types of Cms, fast cms detection, information gathering, and vulnerability scanning of the target like subdomains, IP addresses, country, org, timezone, region, and more. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    BotSlayer

    BotSlayer

    BotSlayer Community Edition

    BotSlayer is an application that helps track and detect potential manipulation of information spreading on Twitter. The tool is developed by the Observatory on Social Media at Indiana University --- the same lab that brought to you Botometer and Hoaxy. BotSlayer is not a tool to detect and remove likely social bots from your list of Twitter followers or friends. For that purpose, check out Botometer.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Synchrorep

    Synchrorep

    Synchronize directories

    Synchrorep is a one click directory synchronization software. All modification will be reported to one to the other and vice versa. Usefull for nomads or speedup differencials backup.
    Downloads: 4 This Week
    Last Update:
    See Project
  • Child Care Center Software Icon
    Child Care Center Software

    Perfect for Daycares, Schools, After School Programs, Camps and More!

    Procare Child Care Management platform is suitable for after-school programs, childcare centers, daycare, child activity centers, and school districts. With Procare Child Care Management, users can manage the tracking of family data and accounting, employee data, expenses, attendance, meals payroll, and more. Procare Child Care Management modules include classroom management, tuition collection, cloud data hosting, and parent management.
    Learn More
  • 5
    ShadowSocksShare

    ShadowSocksShare

    Python ShadowSocks framework

    This project obtains the shared ss(r) account from the ss(r) shared website crawler, redistributes the account and generates a subscription link by parsing and verifying the account connectivity. Since Google plus will be closed on April 2, 2019, almost all the available accounts crawled before come from Google plus. So if you are building your own website, please keep an eye on the updates of this project and redeploy using the latest source code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    DetectAndTrack

    DetectAndTrack

    The implementation of an algorithm presented in the CVPR18 paper

    DetectAndTrack is the reference implementation for the CVPR 2018 paper “Detect-and-Track: Efficient Pose Estimation in Videos,” focusing on human keypoint detection and tracking across video frames. The system combines per-frame pose detection with a tracking mechanism to maintain identities over time, enabling efficient multi-person pose estimation in video. Code and instructions are organized to replicate paper results and to serve as a starting point for researchers working on pose in video. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Python Taint

    Python Taint

    Static Analysis Tool for Detecting Security Vulnerabilities in Python

    Static analysis of Python web applications based on theoretical foundations (Control flow graphs, fixed point, dataflow analysis) Detect command injection, SSRF, SQL injection, XSS, directory traveral etc. A lot of customization is possible. For functions from builtins or libraries, e.g. url_for or os.path.join, use the -m option to specify whether or not they return tainted values given tainted inputs, by default this file is used.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    devicesinlan

    devicesinlan

    Show devices in a lan

    Show devices in a lan. You can enter your known devices, in order to detect strange devices.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 9

    AESOP-ACP

    A simulation framework for production process modeling in Python

    ...Compared to its ancestor - jES - it is lightweight, more general and written in Python. The basic goal of the simulator is to find bottlenecks in production process which could be hard to detect with traditional approaches (e.g., top-down). In addition, it can be used to speculate about “what-if” scenarios in order to suggest solution strategies.
    Downloads: 0 This Week
    Last Update:
    See Project
  • The fastest way to host, scale and get paid on WordPress Icon
    The fastest way to host, scale and get paid on WordPress

    For developers searching for a web hosting solution

    Lightning-fast hosting, AI-assisted site management, and enterprise payments all in one platform designed for agencies and growth-focused businesses.
    Learn More
  • 10
    chrome-cut-cli

    chrome-cut-cli

    command line tool to scan, detect, stream and control chrome cast

    Basic command line tool to async scan, detect, stream and control chrome cast devices. Great for pranking someone with a chrome cast device in your local network. Plus there is a GUI version here. https://sourceforge.net/projects/chrome-cut/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Chrome-Cut

    Chrome-Cut

    Python3 tool to scan, detect and control chromecast devices

    Basic GUI, CLI tool programmed in Python 3.4 and QT5. It gives you the ability to detect, scan and send some useful HTTP requests "Commands" to endless amount of chromecast devices. As well as the ability to loop the commands so the process of repeating it will be automated with a set duration in-which the looping will be done.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    PyCosmic is a tool to detect and clean single images from the disturbing cosmic ray hits. It was designed and tested specifically for CALIFA and other fiber-fed integral-field spectroscopy dataset. It is written in Python and can be executed from the command line. New release is version v0.5. Updated to be compatible with numpy version 1.12. New release is version v0.4.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    WebShellSearch

    Toolkit to search for malicious shells

    A Python open source toolkit that helps you find malicious, hidden and suspicious PHP scripts and shells in a chosen destination, it automates the process of detecting the above.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Kaengu

    kaengu: Framework to build C-Code Flow Graphs and to calculate Metrics

    Kaengu is a framework to build Code Flow Graphs from C-Source Code and to calculate different metrics. Graphical view on Code is a strong tool to a.) understand software and b.) detect flaws. Additionally, Kaengu can calculate some interesting metrics, such as the newly developed F-Complexity as well as Graph energy and propositions for Code Refactoring.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    In programming assignments, students tend to copy from one another as they are given the same set of questions. This conduct should not be allowed as it is an individual assignment and each student must complete on his own. The existing program is available to detect plagiarism through source code similitude. However, it is hard to detect similarity in source code especially if the number of students is high. Furthermore, it is better to prevent plagiarism before it is committed. The “Anti-Plagiarism Graph Generator” program is developed to prevent plagiarism in Graph Theory course programming assignments. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    ncPRO-seq

    ncPRO-seq

    Non-Coding RNA PROfiling from sRNA-seq

    ncPRO-seq is a tool for annotation and profiling of ncRNAs from smallRNA sequencing data. It aims to interrogate and perform detailed analysis on small RNAs derived from annotated non-coding regions in miRBase, piRBase, Rfam and repeatMasker, and regions defined by users. The ncPRO pipeline also has a module to identify regions significantly enriched with short reads that can not be classified as known ncRNA families. ############# Docker version : download and run Dockerfile (go in...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    nogotofail

    nogotofail

    An on-path blackbox network traffic security testing tool

    nogotofail is a network security testing tool developed by Google to help developers and researchers identify weaknesses in TLS/SSL implementations and detect unencrypted traffic that could compromise sensitive data. The tool functions as an on-path man-in-the-middle (MiTM) testing system, allowing users to inspect and evaluate how applications and devices handle encrypted connections under real-world conditions. It can detect a wide range of vulnerabilities, including improper SSL certificate validation, library misconfigurations, and downgrade or stripping attacks such as SSL and STARTTLS stripping. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    PyLogAnalyser

    A Python multiplatform tool to filter, colorise and analyse logs

    PyLogAnalyzer is a tool that receives an input log in black and white, a configuration INI file, which contains the list of rules to process the input, and an output file where to save the results. These rules permit to detect an input line according to a regular expression (regex) or line number range, filter it, pass it, colorise in foreground and background, columnise the groups of the regex and enable or disable the rule. The final goal of this tool is to ameliorate reading long and difficult b/w logs, speed up the analysis and enhance day to day wearying activities. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    iTag

    iTag

    Tag images using various categories and modifiers

    iTag has been designed for researchers that rely on photographic census techniques of animals that are hard to detect via image recognition algorithms and was originally developed for counting Grey Seals in the German wadden sea during March 2013. It has since then been further expanded and has now reached beta status. iTag allows Users to define up to 9 different categories and name them accordingly. In addition, 4 modifiers are available to further increase the options during a tagging session. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20

    Python Open Source Echosounder Toolkit

    real-time visualization of network data broadcasts from echosounders

    ...The Python Open Source Echosounder Toolkit (pyOSET) was designed to facilitate this process by providing near real-time visualization of network data broadcasts from multiple echosounder systems, and to serve as a framework for implementation of algorithms to detect, locate, and identify fish or the seabed. An Alpha release of the software is available under the GNU General Public License, version 2. Many practical aspects of the user interface are still in the planning and development phase. Those who wish to participate in the development of pyOSET are encouraged to subscribe to the Developer's Mailing List. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    polypy
    **(9 march 2016) this project is continued on github : http://jaapkroe.github.io/polypy ** Python script to analyze (shortest-path) rings in structures read from xyz-files. It can be useful for example to identify defects in crystal structures or molecules.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    BlueGate HotSpot

    BlueGate HotSpot

    BlueGate HotSpot is a hotspot software

    BlueGate HotSpot Lite 2.0 New Features in 2.0: +Support windows 7/8/8.1 and 10 !!! +ICS Sharing Bug Fixed +Network Statistics +Improved UI +Detect New Devices Automatically +New Settings Available With BlueGate HotSpot, you can transform your PC into a real WiFi hotspot, and share your computer’s Internet connection as Wi-Fi with any other PC or mobile device. BlueGate is a very simple and user friendly software that turns your Windows 7/8/8.1 PC into a Wi-Fi Hotspot easily and quickly. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 23

    CCH

    A genetics tool that identifies genomic regions of shared ancestry

    Combinatorial Conflicting Homozygosity (CCH) uses dense Single Nucleotide Polymorphism (SNP) genotypes to identify regions of the genome inherited from a common ancestor among any or all subsets of a group. Analysis is rapid and can identify loci containing genes for dominant traits. CCH is robust to the presence of phenocopies and can detect undisclosed shared common ancestry. The associated publication regarding CCH may be accessed here: http://www.biomedcentral.com/1471-2164/16/163 If you use CCH please cite: Levine AP, Connor TM, Oygar DD, Neild GH, Segal AW, Maxwell PH, Gale DP. Combinatorial Conflicting Homozygosity (CCH) analysis enables the rapid identification of shared genomic regions in the presence of multiple phenocopies. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    Music Merge Manager

    Identify duplicate songs based on track metadata (ID3, etc)

    Given two trees of audio files, examine the metadata for each file to try and determine the differences in the content of the trees. This helps find duplicate songs (or non-duplicated songs) even if the music is stored in different formats. Toggles let you determine how specific the matching criteria must be: Track number and song name? Artist, album, and track length? All of the above? Ultimately this program will let you delete duplicates from either the left or right trees, or copy...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    Penetration-Testing-Toolkit v1.0

    A web interface for various penetration testing tools

    Penetration-Testing-Toolkit is a web based project to automate Scanning a network,Exploring CMS, Generating Undectable metasploit payload, DNS-Queries, IP related informations, Information Gathering, Domain related info etc
    Downloads: 0 This Week
    Last Update:
    See Project