Showing 49 open source projects for "task"

View related business solutions
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    File system/directory monitoring utilities with loggin and task processing support (can execute files or make a WCF service call). Multiple configuration options. Source code libraries can be used to create a custom file system monitor.
    Leader badge
    Downloads: 27 This Week
    Last Update:
    See Project
  • 2

    MLCrypt

    Simple, lightweight, standalone command-line single file encryption.

    ...However, its usage on Windows PCs may be inconvenient (installation administrator rights; large executable size for perhaps just a one-time file decryption, complicated command-line switches for stronger encryption). NCrypt would fulfill this task, but does not operate on 64-bit Windows - MLCrypt was created because of this. The program's primary aim is cascade encryption: create an encrypted outer layer over an existing compressed and encrypted archive file. (Each encryption layer should have a different complex password.) MLCrypt.zip contains all the executables: Linux, Windows, Raspberry Pi.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    VirAtt Virus Scanner

    VirAtt Virus Scanner

    This program is a scanner that helps detect and delete virus.

    This program is a scanner that helps detect and delete virus such as "MyDoom, Sasser, etc", created with custom engine developed by VirAtt Viruslab this program fastly detect, delete, and destroy process file of the virus itself including fixing registry error caused by the virus.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 4

    Task Protector

    Behavior-based anti-malware and process protection tool

    Downloads: 0 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 5
    SimpleSiteAudit Multisite

    SimpleSiteAudit Multisite

    Detect file changes on remote web sites

    ...Your sites can be monitored for hacker activity without any detectable monitoring system on the sites themselves. The ‘Master’ site can also be monitored by the same script. Primarily, the SimpleSiteAudit script is designed to be used as a scheduled task or cron job, run maybe once an hour. It can also be run from your browser via the preferences page. SSAM also provides its own log view and a view of your cron log. Full details can be found on my web site - link below.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Quickly recover problems that was created by viruses/malwares: Registry editor has been disable, task manager has been disable. also, contains sort of 'task-manager-replacement'. The name is a bit pretentious, but I couldn't think of any better name :-)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    SmartRouter Project
    SmartRouter Project A GNU/Linux Router, Firewall and Proxy Server
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Data exchange is a core part of all cloud systems so it becomes necessarily important to control access to data that are confidential and whose integrity influences the state of the system at any time.It can be proven that the administrator in a IaaS can easily perform some hidden and malicious task on unsuspecting customer machine. This is attributed to the fact that he/she possesses the root privilege to do so and forms an attack. A cold boot attack can easily be lauched amongst other attacks by the privilege user or system administrator.A simple attack scenario could be that a customer pays a virtual machine at Amazon EC2 (Provider) and the systemadmin (Privilidged User) who is, for instance, threatened to be fired, has access to the same virtual machine state, this priviledged user can easily leak customer’s data. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Web Crawler Security Tool

    A web crawler oriented to information security.

    Last update on tue mar 26 16:25 UTC 2012 The Web Crawler Security is a python based tool to automatically crawl a web site. It is a web crawler oriented to help in penetration testing tasks. The main task of this tool is to search and list all the links (pages and files) in a web site. The crawler has been completely rewritten in v1.0 bringing a lot of improvements: improved the data visualization, interactive option to download files, increased speed in crawling, exports list of found files into a separated file (useful to crawl a site once, then download files and analyse them with FOCA), generate an output log in Common Log Format (CLF), manage basic authentication and more! ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 10
    CesTa (Code Enhancing Security Transformation and Analysis) is a tool for enhancing security by program transformations. Focused on Smart Cards (Java Card in particular), powered by Ant, ANTLR and StringTemplates.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Basic Key Logger
    Non-stealth keylogger for Windows. Records mouse and keyboard (precision~10-15ms), log of events (disk size~2.5k/s) + log of operations (~ 0.2k/s). Standalone, with local copy of Python: unzip to install, delete to uninstall.NEW: hidden/visible icon
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    secureStore
    Designed for data centre management, secureStore uses end to end encryption, granular user access control, comprehensive login, and open source technology to create a secure way to manage sensitive information such as private keys, certificates, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    LibIDMEF is an implementation of the Internet Engineering Task Force (IETF), Intrusion Detection Exchange Format Charter Working Group (IDWG), draft standard Intrusion Detection Message Exchange Format (IDMEF) protocol.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 14
    Windows LFST is a scheduled task running frequently that tallies up the number of login failures to Windows Services and bans the IP address offending.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    The file recovery process is not an easy task to run on Linux and Unix based OSes and there`s almost no good user interfaces for end users, so that`s why, El Recuperador, is intended to make a generic Web-based GUI framework based on forensics informatic
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    FZBFD is Brute Force Detection for Filezilla ftp server. fzbfd.pl looks at the logs from filezilla and will auto ban or block ips from accessing your FTP server. FZBFD can be setup to run hourly using task manager and uses dshield.org's top offenders...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    openSNMP is a multi-threaded SNMPv3 engine. This project supports the Simple Network Management Protocol version 3. In particular, it is designed to match the architecture of the Internet Engineering Task Force SNMPv3 standard (RFCs 3410-15).
    Downloads: 4 This Week
    Last Update:
    See Project
  • 18
    TuxGuardian is an application-based firewall with a graphical interface. It's main task is to control and forbid transmission & reception of data by unauthorized applications; it can be thought as the Linux equivalent to apps such as ZoneAlarm and Kerio
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    The main task of snal is to detect network sniffers. This is done by analyzing TCP/IP packets and DNS queries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    This project will focus on developing a C++ implementation of the Group Secure Association Key Management Protocol (GSAKMP) proposed via an Internet Draft in the Multicast Security Working Group of the Internet Engineering Task Force.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    This will be a project that allows the secure storage of authorization, such as passwords as user names for any computer program that requiers the task of memorizing the authorzation infomation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    The Cryptix ASN.1 Kit aims at facilitating the task programmers face in coding, accessing and generating java-bound, both types and values, defined as ASN.1 constructs, or encoded as such.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    CloudSurfer

    CloudSurfer

    A cloud brokering system for security requirements

    ...The need for this kind of system revealed itself only recently, with the development and the expansion of cloud computing. Finding a right Cloud Provider can become a very difficult task, when you take into account that there is an on-going growth in number of providers. That's when the Cloud brokering systems, such as CloudSurfer, take effect in helping you find the best provider. Its main purpose is to make it easier for a customer to find the Cloud Provider who offers security features for his services which the customer needs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    BP-Sim

    BP-Sim

    EFT simulator

    BP-Sim allows users to perform an extensive range of tests across the chain of payment services and thus identify potential causes of failures before launching payment systems into production. BP-Sim consists of following modules: BP-Source, BP-Host, BP-HSM and BP-SeeEMV. BP-Source and BP-Host are payment transaction simulators supporting formats as: APACS30, AS2805, many ISO8583 dialects, IFSF, SPDH, TCMP. Together with industry-standard cryptography, multi-platform support, configurable...
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB