Showing 23 open source projects for "big linux"

View related business solutions
  • Free CRM Software With Something for Everyone Icon
    Free CRM Software With Something for Everyone

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    Think CRM software is just about contact management? Think again. HubSpot CRM has free tools for everyone on your team, and it’s 100% free. Here’s how our free CRM solution makes your job easier.
    Get free CRM
  • The #1 Embedded Analytics Solution for SaaS Teams. Icon
    The #1 Embedded Analytics Solution for SaaS Teams.

    Qrvey saves engineering teams time and money with a turnkey multi-tenant solution connecting your data warehouse to your SaaS application.

    Qrvey’s comprehensive embedded analytics software enables you to design more customizable analytics experiences for your end users.
    Try Developer Playground
  • 1
    xxHash

    xxHash

    Extremely fast non-cryptographic hash algorithm

    xxHash is an extremely fast non-cryptographic hash algorithm, working at RAM speed limit. It is proposed in four flavors (XXH32, XXH64, XXH3_64bits and XXH3_128bits). The latest variant, XXH3, offers improved performance across the board, especially on small data. It successfully completes the SMHasher test suite which evaluates collision, dispersion and randomness qualities of hash functions. Code is highly portable, and hashes are identical across all platforms (little / big endian...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    Wemake Django Template

    Wemake Django Template

    Bleeding edge django template focused on code quality and security

    ... be consistent, so we use strict quality and style checks. Development, testing, and production should have the same environment, so again we develop, test, and run our apps in docker containers. Documentation and codebase are the only sources of truth. This template is oriented on big projects, when there are multiple people working on it for a long period of time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Athena OS

    Athena OS

    An Arch Linux-based distro focused on Cybersecurity.

    The purpose of Athena project arises to offer a different experience than the most used pentesting distributions. These distros are mainly based on Debian, and they rely mainly on Debian or GitHub repositories for retrieving security tools that don't store all security tools and are hard to maintain. Furthermore, these OSes come already with a big number of tools and services of which a good percentage is never used by the average of users, and it becomes a space waste and could cause...
    Leader badge
    Downloads: 285 This Week
    Last Update:
    See Project
  • 4
    ufonet

    ufonet

    UFONet - Denial of Service Toolkit

    UFONet - Is a set of hacktivist tools that allow launching coordinated DDoS and DoS attacks and combine both in a single offensive. It also works as an encrypted DarkNET to publish and receive content by creating a global client/server network based on a direct-connect P2P architecture. + FAQ: https://ufonet.03c8.net/FAQ.html -------------------------------------------- -> UFONet-v1.8 [DPh] "DarK-PhAnT0m!" (.zip) -> md5 = [ c8ab016f6370c8391e2e6f9a7cbe990a ] -> UFONet-v1.8...
    Downloads: 15 This Week
    Last Update:
    See Project
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 5
    LEACrypt

    LEACrypt

    TTAK.KO-12.0223 Lightweight Encryption Algorithm Tool

    The Lightweight Encryption Algorithm (also known as LEA) is a 128-bit block cipher developed by South Korea in 2013 to provide confidentiality in high-speed environments such as big data and cloud computing, as well as lightweight environments such as IoT devices and mobile devices. LEA is one of the cryptographic algorithms approved by the Korean Cryptographic Module Validation Program (KCMVP) and is the national standard of Republic of Korea (KS X 3246). LEA is included in the ISO/IEC...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    sWAF

    sWAF

    A simple Web Application Firewall docker image

    ... never be too much paranoid about web security for a lot of good reasons. Too much time security is left on the background, or only by using some basic - but not sufficient - options and applications are front-faced to the big bad Internet.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    FinalCrypt

    FinalCrypt

    FinalCrypt - Unbreakable One-Time Pad Encryption

    Why FinalCrypt? 1. Most people choose Disk-Encryption as it's easier to unlock a whole drive, but Big-Brother or Malware can then also read all your files. Only use File-Encryption! 2. Most software uses recently broken AES encryption. 3. Soon The Shor's algorithm will instantly break all assymmetric encryption with Quantum Computers. 4. FinalCrypt uses Symmetric One Time Pad Encryption, which is the most unbreakable encryption there is. 5. FinalCrypt is the only "One Time Pad...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Offensive Web Testing Framework

    Offensive Web Testing Framework

    Offensive Web Testing Framework (OWTF), is a framework

    OWASP OWTF is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST so that pentesters will have more time to see the big picture and think out of the box. More efficiently find, verify and combine vulnerabilities. Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions. Perform more tactical/targeted fuzzing...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    MikroLock

    MikroLock

    MikroLock reads and writes encrypted miniLock files

    MikroLock is a fast native implementation of the open minilock file format (https://minilock.io). Despite its name (and in contrast to the original implementation), it can also handle BIG files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Shift, the browser that merges all of your web apps into one powerful window. Icon
    Shift, the browser that merges all of your web apps into one powerful window.

    Your power browser.

    Streamline everything you do online when you install Shift and access thousands of apps without leaving your browser. Connect all of your Gmail, Outlook, and Office 365 accounts and manage everything from one centralized window. Build out your Shift browser with apps that integrate seamlessly so you have ultra-fast access to all the tools you use to stream, shop, work, browse, and stay connected. Shift brings it all together.
    Try for Free
  • 10
    AdwCleaner
    AdwCleaner is a free tool that will scan your computer and efficiently removes Adware (ads softwares), PUP/LPI (Potentially Undesirable Program), Toolbars, Hijacker (Hijack of the browser's homepage). It also features anti adware host that will help to prevent advertising software from installing on your machine. It works with a Search and Delete mode. It can be easily uninstalled using the mode "Uninstall". AdwCleaner is now part of the Malwarebytes family. We at Malwarebytes are big fans...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    NSDi (Network Services Discoverer) is a metarepository for big/small environments. This tool uses differents plugins to discover the services and software installed on servers. You can create many repositories accesibles via API for many external tools.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    w-o-f

    w-o-f

    Passive or learning mode of web application firewalls to evaluate WAF

    "Web application firewalls (WAF)" , The today's requirement to secure the web applications without changing the existing infrastructure.But at the same time, it is a big risk in case of WAF behavior and false positives (legitimate traffic blocking). This talk will demonstrates a new concept to evaluate any WAF without taking risk of putting any WAFs into inline mode.Everything will be in learning or in passive mode.This project describes concept of one special engine,which can be used...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    InfoSim

    A Java Framework for Simulating Information Theory Concepts

    This is a Java Framework which allows to design and simulate Channels, Cryptography algorithms, Coding algorithms, Noise analysis, Information sources and destinations, etc. It supports both Classical and Quantum Information Theory fields. It also allows to design a new Information Scheme from scratch. It has a big Math library which supports Abstract and Linear Algebra objects e.g Hilbert spaces.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    DDOS Deflate - El Guapo Edition

    ddos_deflate, el Guapo Edition is network trench defense!

    ... effectively be thwarted if your pipe (internet connection) is large. Running on a short cycle (such as 1 minute), ddos_delfate ege can detect nefarious IP's that have bombarded a port with a tremendous number of connections (in a soho environment, 100 connections from a single IP that is not in your LAN constitutes a 'big red warning flag', but you can set this connection limit to your liking in the config file).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    inKey

    inKey - small & strong encryption utility (> 800 000 bit).

    inKey - small encryption utility with big encryption block (> 800 000 bit). This program can protect very sensitive data, such e-mail, which has size up to 100 kilobytes, but processing speed might be too small with the bigger size of source data. ProcessingTime(data) = O(data ^ 2); USE IT ONLY TO PROTECT SMALL FILES (~ 100 Kb or a bit bigger). You can use "PaperBack" to print your 100 Kb encrypted *.iK file to A4 paper and get strong encrypted digital letter. https://sourceforge.net...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    PiShare

    PiShare

    RetroShare binaries compiled for Raspberry Pi

    compiled RetroShare binaries, and packaged for Raspberry Pi using Debian 7.0 Wheezy ARMHF known Raspbian If you want to compile it yourself, download the source-tarball, it is only ~7MB big, or pull the code repository with SubVersioN. compiling takes up to 2-3 hours. or install the .deb files with dpkg -i "retrosharefilename".deb if necessary make a "apt-get update && apt-get upgrade" to update your system for all how to start it in a detached screen session: screen...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    MathX

    MathX

    Fixed-length Arithmetic-types library

    MathX is a fixed-length arithmetic-types written in pure c++ templates. The goal is to provide signed-integer, unsigned-integer, IEEE-754 float-point and fixed-point types, all with specific number of bits. To this moment, only signed-integer and unsigned-integer are completed for little-endain architecture. Any compiler that support c++03 or c++11 can successfully compile MathX. Refer to README for more information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    CAILogin (Counter AI Login) is an image-based user verification program for web-page logins. It's written in plain C with no special dependencies, and hence it's very suitable for embedded systems which lack "big" interpreted languages, such as PHP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    FAB DNS Snooper
    This project focuses on a tool development, FAB DNS Snooper, which allows extract information from the company's DNS cache, to get the technological and social behavior patterns of any Domain Name System. DNS Cache Snooping is used technique.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    CincoSecurity module offers big flexibility to protect EJB3 methods, and JSF page elements.It associates a role to each EJB method (fine role) defining a security profile as a set of roles; its use cases manage security profiles and users.Java EE 5 Seam
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Proxy Glue lets users glue together socks5, socks4, connect, http, and cgi proxies into one big field of potential paths, with configuration done right from the browser.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Multiprecision unsigned number template library (MUNTL). The program is intended for the organization of calculations with the big precision for unsigned numbers. Program is very fast because do not use any heap call (new, malloc etc.)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    The goal of this project is to develop a network protocol (Peer Instant Messenger Protocol, PIMP) that creates a distributed, peer-to-peer network for the transmission of instant messages, along with a graphical client that will allow users to access the
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next