Showing 13 open source projects for "security"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Context for your AI agents Icon
    Context for your AI agents

    Crawl websites, sync to vector databases, and power RAG applications. Pre-built integrations for LLM pipelines and AI assistants.

    Build data pipelines that feed your AI models and agents without managing infrastructure. Crawl any website, transform content, and push directly to your preferred vector store. Use 10,000+ tools for RAG applications, AI assistants, and real-time knowledge bases. Monitor site changes, trigger workflows on new data, and keep your AIs fed with fresh, structured information. Cloud-native, API-first, and free to start until you need to scale.
    Try for free
  • 1
    Containerization (Apple)

    Containerization (Apple)

    Containerization is a Swift package for running Linux containers

    ...It walks through the responsibilities of an image format, registry, and runtime, and shows how a minimal runtime can assemble an isolated process with the right filesystem view, environment, and entrypoint. The samples highlight security hardening considerations—such as process isolation, filesystem scoping, and least-privilege execution—so that containers are not just portable, but safer by default. Developers get a blueprint for taking standard container images and running them in a way that respects platform conventions, tooling, and policies. The emphasis is on clarity and standards alignment rather than building a production-grade engine, which makes the code ideal for learning and experimentation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    ModularBipolynom

    ModularBipolynom

    Modular Polynom manipulation in Java

    XY modular Polynom manipulation in Java for calculating elliptic curves point order
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    VulnX

    VulnX

    Intelligent Bot, Shell can achieve automatic injection

    vulnx, an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities in CMS systems. It can perform a quick CMS security detection, information collection (including sub-domain name, IP address, country information, organizational information and time zone, etc.), and vulnerability scanning. Vulnx is An Intelligent Bot Auto Shell Injector that detects vulnerabilities in multiple types of Cms, fast cms detection, information gathering, and vulnerability scanning of the target like subdomains, IP addresses, country, org, timezone, region, and more. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    Computer Glossary

    Computer Glossary

    is a rich dictionary containing multiple computer-related terms

    Computer Glossary is a rich dictionary containing multiple computer-related terms, which is useful for both students and professionals. The program integrates an offline database and offers references and descriptions for each term. Computer Glossary can be installed in just a few simple steps and does not require special skills. The program comes with a simple interface and lets you easily search any term. The results will let you see the word's definition, references to other related...
    Downloads: 1 This Week
    Last Update:
    See Project
  • The Original Buy Center Software. Icon
    The Original Buy Center Software.

    Never Go To The Auction Again.

    VAN sources private-party vehicles from over 20 platforms and provides all necessary tools to communicate with sellers and manage opportunities. Franchise and Independent dealers can boost their buy center strategies with our advanced tools and an experienced Acquisition Coaching™ team dedicated to your success.
    Learn More
  • 5

    smartIDS

    Lightweight intrusion detection for IoT and embedded devices.

    The aim of the project is a lightweight intrusion detection library for embedded devices which supports MSP430 and ARM Cortex based devices. Features include DSP/SIMD support, IoT and embedded protocols, distributed operation, event and history management, tool supported configuration and visualization. There is a Java port that supports less features.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Pulse capture

    Pulse capture

    Extract PPG signal from video image of the face

    The application was designed for the real time contactless photoplethysmography of the human face by means of an ordinary webcam in ambient light environment System requirements: - AMD or Intel CPU with 2 cores and 2.6 GHz clock speed (or higher); - 512 Mb of RAM (or higher); - OS Microsoft Windows 10/8/7/XP, booth 32 and 64 bit versions; - A RGB webcam (Logitech B910 is the best choice).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Oryon C Portable (moved)

    Oryon C Portable (moved)

    Open Source Intelligence Framework

    NEW PROJECT PAGE: https://sourceforge.net/projects/oryon-osint-browser/ Oryon C Portable is a web browser designed to assist researchers in conducting Open Source Intelligence investigations. Oryon comes with dozens of pre-installed tools and a select set of links cataloged by category – including those that can be found in the OI Shared Resources. ▪ Based on SRWare Iron version 31.0.1700.0 (Chromium) ▪ More than 70 pre-installed tools to support investigators in their everyday...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    ReBAC Java Library

    ReBAC library for java development

    Java library for Relationship Based Access Control (ReBAC). Provides a general framework creating ReBAC policies and model checking. Also provides tools for testing. Obtain latest version as a Maven Dependency: <dependency> <groupId>ca.ucalgary.ispia</groupId> <artifactId>rebac</artifactId> <version>0.1.7</version> </dependency>
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9

    Open Library Mangement System

    Open Library Mangement System

    The Open Library Mangement System is a project to create a web based system to help mange library's everywhere.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Axe Credit Portal - ACP- is axefinance’s future-proof AI-driven solution to digitalize the loan process from KYC to servicing, available as a locally hosted or cloud-based software. Icon
    Axe Credit Portal - ACP- is axefinance’s future-proof AI-driven solution to digitalize the loan process from KYC to servicing, available as a locally hosted or cloud-based software.

    Banks, lending institutions

    Founded in 2004, axefinance is a global market-leading software provider focused on credit risk automation for lenders looking to provide an efficient, competitive, and seamless omnichannel financing journey for all client segments (FI, Retail, Commercial, and Corporate.)
    Learn More
  • 10

    BPMN extension for Cloud computing

    java project for modifying jBPM models into cloud aware models

    ...Then user is able to define a sensitivity of data elements. After that an Ontology is created and filled in with model elements. Special logical rules process the data. User is able to additionally define the security level. The resulting model is created and can be opened in the jBPM.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Auto File Selection

    Detect all the "important" files from your computer.

    The main aim of this project is to design and develop a mechanism that can find all the “important” files inside a computer.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Vijner 974 E-Sys (2048 bits and unlimited encryption). Enables easy (un-)encryption from text input or .txt file, and to (un-)encrypt raw files, with Vigenère Algorithm + unlimited encryption keys. Simple and powerful. Adapt to fit your needs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next