Showing 6 open source projects for "detect it"

View related business solutions
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Retool your internal operations Icon
    Retool your internal operations

    Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.

    Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
    Build an app in Retool
  • 1

    hash_val_4_Bloom

    search for hash values used in Bloom filter for QNR membership

    FenderBender -- on MersenneForum.org "Determine Squares" -- came up with using Bloom filter to detect Quadratic non-residues modulo small primes in order to reject what inputs are certainly not square roots. This reduces, by > 99%, the amount of actual square root calc's done and therefore is more efficient and faster. Search fur 32-bit vs 64-bit, hash values that make "perfect" Bloom filter. Variety of (simple) hash functions, requiring 2, 3, 4 or 5 hash values.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    P.I.P. Equation Converter

    P.I.P. Equation Converter

    Prefix/Infix/Postfix Equation Converter

    P.I.P. EQUATION CONVERTER - version 1.1 Copyright (C) 2015 ISYS lab P.I.P. Equation Converter is a very simple Prefix/Infix/Postfix equation converter. It can detect and convert equation from one form to the other. Important: ++++++++++ * supported operands: A-Z, a-z, 0-9 (only single character each) * supported operators: '+', '-', '*', '/', '(', ')' * do not use brackets while inputting Prefix/Postfix Equation * do use brackets while inputting Infix Equation * this application cannot validate equation; it can only detect and convert
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    NetworkMiner packet analyzer

    NetworkMiner packet analyzer

    The Network Forensics Tool

    NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows that can detect the OS, hostname and open ports of network hosts through packet sniffing or by parsing a PCAP file. NetworkMiner can also extract transmitted files from network traffic. New versions of NetworkMiner are released exclusively on www.netresec.com since version 2.0 of NetworkMiner. This page on SourceForge is only kept to provide hosting of older versions of the software.
    Downloads: 39 This Week
    Last Update:
    See Project
  • 4
    Defraser is a forensic analysis application that can be used to detect full and partial multimedia files in datastreams. It is typically used to find (and restore) complete or partial video files in datastreams (for instance, unallocated diskspace).
    Downloads: 6 This Week
    Last Update:
    See Project
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • 5
    This program is able to detect circles in images. Therefor it uses the hough algorithm CvHoughCircles from the OpenCV library. You can define all parameters e.g. min-/max radius, min distance between circles, all kinds of thresholds, filters and so on.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A proof-of-concept application of the Statistical Protocol IDentification (SPID) algorithm. SPID can detect the application layer protocol (layer 7) by analysing flow (packet sizes etc.) and payload statistics (byte values etc.) from pcap files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next