Showing 6 open source projects for "hidden"

View related business solutions
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • 1
    IronClaw

    IronClaw

    IronClaw is OpenClaw inspired but focused on privacy & security

    ...It operates on the principle that your AI should work for you, not external vendors, ensuring all data is stored locally, encrypted, and never shared. The platform emphasizes transparency, offering auditable code with no hidden telemetry or data harvesting. IronClaw runs untrusted tools inside isolated WebAssembly (WASM) sandboxes with strict capability-based permissions. It supports multiple interaction channels, including REPL, HTTP webhooks, Telegram, Slack, and a real-time web gateway. With dynamic tool building, persistent memory, and background automation, IronClaw is built to securely expand and adapt to your personal and professional workflows.
    Downloads: 15 This Week
    Last Update:
    See Project
  • 2
    fd

    fd

    A simple, fast and user-friendly alternative to 'find'

    fd is a program to find entries in your filesytem. It is a simple, fast and user-friendly alternative to find. While it does not aim to support all of find's powerful functionality, it provides sensible (opinionated) defaults for a majority of use cases. First, to get an overview of all available command line options, you can either run fd -h for a concise help message or fd --help for a more detailed version. fd is designed to find entries in your filesystem. The most basic search you can...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    Grin

    Grin

    Minimal implementation of the Mimblewimble protocol

    Grin is an in-progress implementation of the Mimblewimble protocol. Grin is a privacy-preserving digital currency built openly by developers and distributed all over the world. Grin has no amounts and no addresses. Transactions can be trivially aggregated. To hide the origin of a newly created transaction, it gets relayed among a sub-set of peers before it is widely broadcasted. Electronic transactions for all. Without censorship or restrictions. Designed for the decades to come, not just...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    tirith

    tirith

    Your browser catches homograph attacks

    ...The project emphasizes local-only analysis with no telemetry and no background daemons, so it can run offline and keep sensitive command context on-device. It integrates into popular shells via hooks (zsh, bash, fish, and PowerShell), including paste-aware protections so hidden characters or malicious rewrites get caught at the moment they enter the terminal.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 5
    Stegcore

    Stegcore

    A cross-platform crypto-steganography toolkit

    Stegcore combines cryptography and steganography to hide encrypted data inside ordinary files. It encrypts your payload before embedding it, so the hidden content is unreadable even if someone extracts it, and invisible to anyone who doesn't know it's there. Unlike basic steganography tools that hide data without encrypting it, Stegcore ensures the payload is cryptographically protected at rest. Unlike pure encryption tools, the payload isn't even visible. Designed for journalists, security researchers, red teamers, digital forensics professionals, and CTF participants.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 6
    ReadyPC

    ReadyPC

    Free open-source Windows optimizer and debloater

    ...ReadyPC is especially geared toward gamers and power users who want to reduce background processes and maximize system efficiency. It runs entirely locally, ensuring no data collection, accounts, or hidden services are involved. Overall, ReadyPC offers a trustworthy and user-friendly way to fine-tune Windows for speed, stability, and privacy.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB