Showing 2622 open source projects for "web-based"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    A toolkit of nitty-gritty classes from real-life projects. Contains generic snippets along with things like server-side DOM implementation or RSA or code generation tools.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    TACS (Trust Ant Colony System) is a Trust model for P2P, Ad-hoc and Wireless Sensor networks (also valid for multi-agent systems) based on the bio-inspired algorithm ACS (Ant Colony System).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    viewstate is a decoder and encoder for ASP .Net viewstate data. It supports the different viewstate data formats and can extract viewstate data direct from web pages. viewstate will also show any hash applied to the viewstate data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    This library attempts to secure eval() in order to allow for user-controlled, over-the-web, variable-handling-focused, third-party parsers independent scripting.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Streamline Azure Security with Palo Alto Networks VM-Series Icon
    Streamline Azure Security with Palo Alto Networks VM-Series

    Centrally manage physical and virtualized firewalls with Panorama

    Improve your security posture and reduce incident response time. Use the VM-Series to natively analyze Azure traffic and dynamically drive policy updates based on workload changes.
    Learn more
  • 5
    Perl-based syslog watcher that matches certain login failures (SSH, FTP, POP3) and can dynamically block and email an alert, helping to monitor and manage hosting servers. NOTE: Although no recent updates, I'm still able/willing to update this code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    OCTV it is a robust and complete solution of security and monitoring.It has support for different models of cameras IP.Among its functions includes playback, recording, motion detection, event scheduling and can work simultaneously with many cameras
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    stproxy is small, fast and efficient HTTP/SSL proxy, features: high-anonymous, basic http authorization, user management using web interface, asynchronous dns resolver, single-threaded (only one process-thread)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Open2SA is the 2 Step Authenticator, a PIN ciphering, 2 Factor Authentication process using a Dynamic Grid Card. The authentication technique is simple and secure and the code required for the process is compact and easy to understand.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    XMLStore is a new project that cares about XML-based Databases Access with users Authentication and Authorization and more such as dead-lock accesses. It will be soon introduced to other kind of databases such as SQL,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • 10
    GigoIt’s HumanAuth supports ADA and Section 508 requirements, increased security and includes watermarked images with random positioning. HumanAuth ensures that an actual human is using your site without forcing them to read distorted CAPTCHA text.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    HoneyBow sensor, a malware collect tool based on the high interaction honeypot. Released under the name of mwcollect.org, can be integrated with nepenthes sensor and the mwcollect alliance’s GOTEK architecture.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    CryptPad is a .NET Compact Framework 1.1 simple notes application which operates encrypted text documents (.wrc) based on user provided password. This way one can store confidential data on Windows Mobile operating systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    alerttail tails a file and triggers events based on regex matching. Notify (libnotify), sys command, filtering and geoip localization actions are provided. Highly configurable via config file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    JSmex is a JAVA based SmartCard Explorer with an user friendly GUI. It can read and edit the data on SIM, JavaCard, Geldkarte and Cryptoflex cards. Since version 1.1.0 JSmex can also read electronic passports (MRTDs) in plain or BAC mode.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    PHP Screw is a PHP script encryption tool. When you are developing a commercial package using PHP, the script can be distributed as encrypted up until just before execution, preserving your intellectual property.
    Leader badge
    Downloads: 2 This Week
    Last Update:
    See Project
  • 16

    Cnc's IP Data Volume Report

    Logs IP to IP contact, number of packets, bytes.

    Cnc's IP Data Volume Report: Logs IP to IP contact, number of packets, bytes, time of contact, Ethernet too! View via local web interface. Very simple for those who want to view who your computer is contacting the most!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    JM Key Creator is a .Net 2.0 Framework dependent Windows Application used to generate license keys, registration keys, and activation keys. It includes the ability to perform hashed randomization and also includes methods of creating validation of keys.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Projeto de software parte integrante do trabalho de conclusão de curso de Tetri Mesquita Neto, do curso de Bacharelado em Informática, na Universidade Estadual do Oeste do Paraná - UNIOESTE, campus Cascavel-PR.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Webswell Connect is a business integration tool based on WS web services, ebXML and AS2 standards. Installer includes ebXML Registry/Repository, universal Message Service Handler and Dispatcher and supporting software. Tech support at www.webswell.com
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    This project aims to develop a prototype system that explores how we should re-invision computer system design based on changes in how people get the software that they run, as well as advances in static analysis of software.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Honeytrap is a network security tool written to observe attacks against network services. As a low-interactive honeypot, it collects information regarding known or unknown network-based attacks and uses plugins for automated analysis.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    serverM is an extremely flexible signature-based host-based intrusion detection system (HIDS). Running as a Perl daemon, it uses little CPU, and is capable of detecting a wide range of intrusions. Signature language is powerful and alarm options varied.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    BruteNet is a system of the distributed brute force and distributed calculations built on user extensions capable to solve a great number of problems related to the partition on a lot of machines.With sample extention you can distribute brute md5-hash
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Suite of services and tools for handling PKI requirements. The initial list of programs contains: 1) a viewer/encoding converter for X.509 certificates, 2) a viewer/editor/generator for PKCS#7 and 3) a viewer/editor/generator for various keystores types.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    The Aleph project is a simple Web API for using an access control list composed of OpenIDs.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB