Showing 136 open source projects for "order"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 1
    certstrap

    certstrap

    Tools to bootstrap CAs, certificate requests, and signed certificates

    ...If the CN contains spaces, certstrap will change them to underscores in the filename for easier use. The spaces will be preserved inside the fields of the generated files. certstrap requires either -common-name or -domain flag to be set in order to generate a certificate signing request.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Horusec

    Horusec

    Open source tool that improves identification of vulnerabilities

    Horusec is an open source tool that performs a static code analysis to identify security flaws during the development process. Currently, the languages for analysis are C#, Java, Kotlin, Python, Ruby, Golang, Terraform, Javascript, Typescript, Kubernetes, PHP, C, HTML, JSON, Dart, Elixir, Shell, Nginx. The tool has options to search for key leaks and security flaws in all your project's files, as well as in Git history. Horusec can be used by the developer through the CLI and by the...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    Bayes Anti-Spam

    Bayes Anti-Spam

    Anti Spam AddIn / Plugin for Outlook

    For Outlook I had been using the SpamBayes plugin for years in order to remove spam e-mails. However, with Outlook 365 the addin stopped working for me. This reimplementation enables you to mark e-mails as spam or valid. Based on your input the addin learns how to classify e-mails. If the addin detects spam then it will move the e-mail to a configurable folder in Outlook. E-mails for which the decision is uncertain will be moved to another configurable folder.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    Face Mask Detection

    Face Mask Detection

    Face Mask Detection system based on computer vision and deep learning

    Face Mask Detection system based on computer vision and deep learning using OpenCV and Tensorflow/Keras. Face Mask Detection System built with OpenCV, Keras/TensorFlow using Deep Learning and Computer Vision concepts in order to detect face masks in static images as well as in real-time video streams. Amid the ongoing COVID-19 pandemic, there are no efficient face mask detection applications which are now in high demand for transportation means, densely populated areas, residential districts, large-scale manufacturers and other enterprises to ensure safety. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 5
    React Native Push Notifications

    React Native Push Notifications

    React Native local and remote notifications

    React Native Local and Remote Notifications for iOS and Android. firebase-messaging, prior to version 15 requires to have the same version number in order to work correctly at build time and at run time. The Firebase Android library firebase-core is no longer needed. This SDK included the Firebase SDK for Google Analytics. Now, to use Analytics or any Firebase product that recommends the use of Analytics, you need to explicitly add the Analytics dependency. Example folder contains an example app to demonstrate how to use this package. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Trape

    Trape

    OSINT tool for tracking users and analyzing browser data online

    ...It provides researchers, security professionals, and organizations with a platform for studying how attackers could gather intelligence through social engineering techniques. The tool can clone websites and monitor interactions in order to collect data from visitors, allowing investigators to observe user behavior and session activity. Trape was originally created to educate the public about how large internet services may obtain confidential information such as session status or browser details without users realizing it. Over time, it has evolved into a research platform that helps analysts track cybercriminal activity and study online tracking mechanisms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    [LINUX] Pwnagotchi Connection Share

    [LINUX] Pwnagotchi Connection Share

    Simple bash script for connection sharing.

    ...You have to run this script every time you connect your Pwnagotchi to your PC and want to share your internet connection. Useful for let the gotchi able to upload handshakes to online cracking services like OnlineHashCrack. HOW TO USE: In order to make that script working you need to follow the commented instructions inside code. For more info: https://pwnagotchi.ai/configuration/#connecting-to-pi0w-with-microusb-cable-on-linux-host *designed for pwnagotchi but works on any raspberry. Telegram: @xNigredo Pwnagotchi Italia: https://t.me/pwnagotchiitalia
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    cmb1ne

    cmb1ne

    Software to encrypt your Files or combine a secret file to another.

    WARNING -------------------------------------------------------------------------------------------------- The antivirus software will detect a trojan, but there is no danger. In order to be able to use the software, allow the program in your antivirus program. -------------------------------------------------------------------------------------------------- Software to encrypt your Files or combine a secret file to another Icon by Adioma
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    pico

    pico

    A Git-driven task runner built to facilitate GitOps and Infrastructure

    ...The modern browser is very much like an operating system, both in terms of complexity and code size. Only massive corporations can build and maintain it. Further, the web breeds platforms that exploit your reward and learning centers in order to increase "engagement." We have no issue with the commercialization of the web -- that's how useful services exist. However, we are more aligned with products and services that promote human communication and collaboration in its purest forms. Many of our services don't require a password, but still offer many familiar features like content management.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 10
    PermissionsDispatcher

    PermissionsDispatcher

    A declarative API to handle Android runtime permissions

    PermissionsDispatcher provides a simple annotation-based API to handle runtime permissions. This library lifts the burden that comes with writing a bunch of check statements whether permission has been granted or not from you, in order to keep your code clean and safe. PermissionsDispatcher introduces only a few annotations, keeping its general API concise. Annotate a method that explains why the permissions are needed. It passes in a PermissionRequest object which can be used to continue or abort the current permission request upon user input. Annotate a method that is invoked if the user doesn't grant the permissions. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Ank Zipper

    Ank Zipper

    A free and easy-to-use password protected file archiver

    Ank Zipper provides you with a lightweight, Java-based application designed to provide security to your documents. Ank Zipper can compress both files and folders and create password-protected archives, in order to prevent unauthorized access to important files. Additionally, it can be used for extracting or simply browsing ZIP files.It includes AES(Advanced Encryption Standard) algorithm to encrypt/decrypt file(s). Ank Zipper is a cross-platform software that can be used on any platform that features Java compatibility (e.g. Mac OS X, Linux, Windows).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    NetProxy Content Filtering And Web cache

    NetProxy Content Filtering And Web cache

    Small Content Filtering And Web Acceleration Appliance

    NetProxy, aka Debian NetInstall is an ISO based on the Artica Appliance Software. It provides a Proxy + Web-Filtering It is optimized for small hardware in order to be installed on small VPS, virtual machines and microboxes.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 13
    Libecc is an Elliptic Curve Cryptography C++ library for fixed size keys in order to achieve a maximum speed. The goal of this project is to become the first free Open Source library providing the means to generate safe elliptic curves.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    ModularBipolynom

    ModularBipolynom

    Modular Polynom manipulation in Java

    XY modular Polynom manipulation in Java for calculating elliptic curves point order
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    SSL Kill Switch 2

    SSL Kill Switch 2

    Blackbox tool to disable SSL certificate validation

    Blackbox tool to disable SSL/TLS certificate validation - including certificate pinning - within iOS and macOS applications. Once loaded into an iOS or macOS application, SSL Kill Switch 2 will patch low-level functions responsible for handling SSL/TLS connections in order to override and disable the system's default certificate validation, as well as any kind of custom certificate validation (such as certificate pinning). It was successfully tested against various applications implementing certificate pinning including the Apple App Store. The first version of SSL Kill Switch was released at Black Hat Vegas 2012. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    Our idea is to deploy a society of computational agents that collaborate in order to achieve the shared goal of decrypting a chunk of ciphertext or recovering a password from an hash by means of a dictionary-based attack.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    terminal-notifier

    terminal-notifier

    Send User Notifications on macOS from the command-line

    terminal-notifier is a command-line tool to send macOS User Notifications, which are available on macOS 10.10 and higher. alerter features were merged in terminal-notifier 1.7. This led to some issues and even more issues in the 1.8 release. From now on terminal-notifier won't have the sticky notification feature nor the actions buttons. If you need them please use alerter. Sticking to two smaller specialized tools will hopefully make them easier to maintain and less error prone. It is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    L2TP over IPsec VPN Manager

    A GUI to manage L2TP over IPsec virtual private network connections

    It provides a system tray icon in the notification area from which a non privileged user can establish and bring down L2TP over IPsec VPN connections. There is also a 'Edit connections' menu item. In order to bring up the editor dialog, a non privileged user must authenticate as root. From there the user can add, remove and edit vpn connections. Editing allows configuring various options for IPsec, L2TP and PPP. Among others, the user can configure eg. the gateway, the use of either PSK or a certificate for authentication, various L2TP options as redial- timeout and attempts and of course all important PPP options. ...
    Downloads: 14 This Week
    Last Update:
    See Project
  • 19
    Wi-Fi Cracking

    Wi-Fi Cracking

    Crack WPA Wi-Fi routers with Airodump-ng and Aircrack-ng Hashcat

    ...WPA/WPA2 uses a 4-way handshake to authenticate devices to the network. You don't have to know anything about what that means, but you do have to capture one of these handshakes in order to crack the network password. These handshakes occur whenever a device connects to the network. The final step is to crack the password using the captured handshake. If you have access to a GPU, it is highly recommended to use hashcat for password cracking.
    Downloads: 39 This Week
    Last Update:
    See Project
  • 20
    FoxNuke

    FoxNuke

    A Proffesional Stress-Testing(ddos) tool for pentesters

    The FoxNuke program is written in python and uses Firefox in order to complete the distributed denial of service attack feature. Multiple headers are used from the Firefox browser, along with a personal configuration option for the Opera browser. The FoxNuke Program is still underdevelopment as of 8/24/17, full release is set to come out sometime during 2017-2018. If you would like to participate in the TESTING of this program and would like to help report bugs, etc. then please email leyvarosnel@gmail.com for further inquiries. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    x_Cleaner

    x_Cleaner

    Utility to sector-level cleaning your storage with special algorithm.

    ...Bruce Schneier's algorithm (1-st pass 0x1, 2-nd pass 0x0, 3-7 passes - random values) x_Cleaner works for Windows XP, Vista,7 and later versions. -- Important! Run x_Cleaner with administrative rights in order to clean non-removable media.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    OMEN

    OMEN

    OMEN: Ordered Markov ENumerator - Password Guesser

    ...OMEN consists of two separate program modules: createNG and enumNG. createNG calculates n-gram probabilities based on a given list of passwords and stores them on the hard disk. Based on these probabilities enumNG enumerates new passwords in the correct order (descending). Before one can generate any passwords, the n-gram probabilities have to be estimated using createNG. To calculate the probabilities using the default settings, createNG must be called giving a path to a password list that should be trained.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    BTCore

    A Collection of Useful Java/Swing Code

    NEWEST FEATURE ---------- Added one line ".zip" extraction to Util class! Added one line ".zip" extraction from URL (web) and one line file download from URL! BTCore is a library that was designed to be used with all of Banotech's software. It includes a tremendous amount of code snippets and classes that have been boiled down to allow ease of use by everyone. BTCore is, and always will be FREE. It has tools that we scrapped together over our last few projects, and that we found...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Mpge

    Mpge

    Mpge

    Mpge is a wrapper of meterpreter (msfconsole, msfpayload and msfencode) of Metasploit Framework directly integrated with Mac OS X Snow Leopard 10.6.8 and with OS X Mavericks 10.9. With Mpge is possible make trojan horse files for Microsoft Windows, Linux and Mac OS X 10.3 Panther, OS X 10.4 Tiger, OS X 10.5 Leopard and OS X Montain Lion 10.8.1 for all Mac OS X is possible make a trojan horse files contains a reverse shell into files .pkg and files .app. I used three real Mac OS X: Attacker:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Betwixt

    Betwixt

    Web debugging proxy based on Chrome DevTools network panel

    Betwixt will help you analyze web traffic outside the browser using familiar Chrome DevTools interface. Download the latest release for your operating system, build your own bundle or run Betwixt from the source code. In order to capture traffic, you'll have to direct it to the proxy created by Betwixt in the background.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB