Showing 29 open source projects for "at commands"

View related business solutions
  • Gain insights and build data-powered applications Icon
    Gain insights and build data-powered applications

    Your unified business intelligence platform. Self-service. Governed. Embedded.

    Chat with your business data with Looker. More than just a modern business intelligence platform, you can turn to Looker for self-service or governed BI, build your own custom applications with trusted metrics, or even bring Looker modeling to your existing BI environment.
  • Simplify Purchasing For Your Business Icon
    Simplify Purchasing For Your Business

    Manage what you buy and how you buy it with Order.co, so you have control over your time and money spent.

    Simplify every aspect of buying for your business in Order.co. From sourcing products to scaling purchasing across locations to automating your AP and approvals workstreams, Order.co is the platform of choice for growing businesses.
  • 1
    fd

    fd

    A simple, fast and user-friendly alternative to 'find'

    ... perform is to run fd with a single argument: the search pattern. Instead of just showing the search results, you often want to do something with them. fd provides two ways to execute external commands for each of your search results: the -x/--exec option runs an external command for each of the search results (in parallel), or the -X/--exec-batch option launches the external command once, with all search results as arguments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    moonwalk

    moonwalk

    Cover your tracks during Linux Exploitation by leaving zero traces

    Cover your tracks during Linux Exploitation / Penetration Testing by leaving zero traces on system logs and filesystem timestamps. moonwalk is a 400 KB single-binary executable that can clear your traces while penetration testing a Unix machine. It saves the state of system logs pre-exploitation and reverts that state including the filesystem timestamps post-exploitation leaving zero traces of a ghost in the shell.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Redox

    Redox

    Redox is an operating system written in Rust

    Redox is a Unix-like Operating System written in Rust, aiming to bring the innovations of Rust to a modern microkernel and full set of applications. Redox is a general purpose operating system written in pure Rust. Our aim is to provide a fully functioning Unix-like microkernel, that is both secure and free. We have modest compatibility with POSIX, allowing Redox to run many programs without porting. We take inspiration from Plan9, Minix, Linux, and BSD. Redox aims to synthesize years of...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 4
    xsv

    xsv

    A fast CSV command line toolkit written in Rust

    xsv is a command line program for indexing, slicing, analyzing, splitting and joining CSV files. Commands should be simple, fast and composable. Simple tasks should be easy. Performance trade offs should be exposed in the CLI interface. Composition should not come at the expense of performance. Let's say you're playing with some of the data from the Data Science Toolkit, which contains several CSV files. Maybe you're interested in the population counts of each city in the world. So grab...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.