Showing 10 open source projects for "csv analyze"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    VisiData

    VisiData

    A terminal spreadsheet multitool for discovering and arranging data

    ...VisiData is a free, open-source tool that lets you quickly open, explore, summarize, and analyze datasets in your computer’s terminal. VisiData works with CSV files, Excel spreadsheets, SQL databases, and many other data sources.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    User Scanner

    User Scanner

    Scan usernames and emails across many platforms from the CLI

    user-scanner is a command-line OSINT tool designed to analyze the presence and availability of usernames and email addresses across many online platforms. It helps users quickly determine whether a specific username or email is already associated with accounts on social networks, developer platforms, creator communities, gaming services, and other sites. user-scanner is useful for security researchers, investigators, and analysts performing open source intelligence, as well as individuals or...
    Downloads: 15 This Week
    Last Update:
    See Project
  • 3
    dnstwist

    dnstwist

    Detects phishing and lookalike domains using DNS fuzzing techniques

    dnstwist is an open source cybersecurity tool designed to identify malicious or suspicious domain names that imitate legitimate websites. It works by generating a large set of domain name permutations based on a target domain and analyzing whether any of those variants are actively registered or used. These permutations simulate common techniques used in phishing attacks, typosquatting, and brand impersonation campaigns. Security teams can use the tool to discover potential threats where...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    Tookie-OSINT

    Tookie-OSINT

    Username OSINT tool for discovering accounts across many websites

    Tookie-OSINT is an open source intelligence tool designed to help security researchers, ethical hackers, and investigators discover online accounts associated with a specific username. It automates the process of searching for usernames across multiple websites, making it easier to identify a person's presence on different platforms. By entering a target username, Tookie-OSINT scans a list of supported sites and checks whether the username exists on those platforms. This approach removes the...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 5
    h8mail

    h8mail

    Email OSINT tool for finding breached credentials by email

    h8mail is an open source email OSINT and password breach hunting tool designed to help security professionals investigate compromised credentials associated with email addresses. It works by querying multiple breach and reconnaissance services to identify whether an email address has appeared in publicly leaked datasets. The tool can also search locally stored breach dumps, such as Troy Hunt’s “Collection1” or the widely known “Breach Compilation,” allowing investigators to analyze large...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    OhMyForm

    OhMyForm

    Free open source alternative to TypeForm, TellForm, or Google Forms

    Create stunning embeddable forms for recruiting, market research, surveys and more. With OhMyForm you'll get all the features you need to run, administer, analyze and distribute forms for free. With our opensource community, OhMyForm is always improving and is vetted by top programming experts around the world, ensuring that our code is top-notch, eliminating potential bugs and errors.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    INVESTOCK - Analyze Indian shares

    INVESTOCK - Analyze Indian shares

    Back test, analyze, rate of return of Indian shares for 20+ years.

    Analyze, winning percentage, back test and estimate the maximum rate of return from the historical prices of an equity stock listed in NSE, India between any two selected dates for more than 20 years. INVESTOCK program is used to get the historical prices of an Indian share listed in National Stock Exchange( NSE), India between any two selected dates.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    instagram-profilecrawl

    instagram-profilecrawl

    Instagram profile crawler that extracts posts, tags, and stats

    ...It crawls profile data such as follower counts, post information, hashtags, and other engagement-related metadata. It operates by automating a web browser using Selenium and performing requests to gather structured information from the platform. instagram-profilecrawl can analyze multiple usernames in a single run and store the extracted information locally in structured formats such as JSON. The collected data can include profile metadata, post details, engagement metrics, and commenter activity, allowing users to analyze account behavior or monitor profile growth over time. It also provides scripts for downloading images from crawled profiles and logging statistics into CSV files for tracking metrics like followers, likes, and comments. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    Crystalsim -  XRD hkl simulation

    Crystalsim - XRD hkl simulation

    X-ray diffraction (XRD) analysis for hkl simulation of any crystal.

    Crystalsim is a simple freeware program with a neat graphical user interface for X-ray diffraction (XRD) data analysis . It can simulates all possible {hkl} planes data for the selected crystal. Crystallographic Information File (.cif) can also be used. Analyze both powder diffraction and single crystal data . Indexed at International Union of Crystallography (IUCR). Crystalline lattice parameters such as ‘a’, ‘b’, ‘c’ as well as interfacial angles such as alpha, beta, gamma can also be entered manually. Processed data can be saved as .csv file format. Designed by M Kanagasabapathy, Assistant Professor, Department of Chemistry, Rajus' College, Affiliated to Madurai Kamaraj University Rajapalayam (TN) India email: rrcmks(at)gmail.com
    Downloads: 2 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 10
    AttackSurfaceMapper

    AttackSurfaceMapper

    Automated tool for mapping & expanding organization’s attack surface

    AttackSurfaceMapper (ASM) is a reconnaissance and attack surface discovery tool designed to automate the process of mapping potential targets within an organization's infrastructure. It combines open source intelligence (OSINT) with selective active reconnaissance techniques to expand and analyze a target’s external attack surface. Users can supply domains, subdomains, or IP addresses as input, and applies multiple discovery methods to identify additional related assets such as new...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB