Showing 121 open source projects for "input"

View related business solutions
  • Ship AI Apps Faster with Vertex AI Icon
    Ship AI Apps Faster with Vertex AI

    Go from idea to deployed AI app without managing infrastructure. Vertex AI offers one platform for the entire AI development lifecycle.

    Ship AI apps and features faster with Vertex AI—your end-to-end AI platform. Access Gemini 3 and 200+ foundation models, fine-tune for your needs, and deploy with enterprise-grade MLOps. Build chatbots, agents, or custom models. New customers get $300 in free credit.
    Try Vertex AI Free
  • Cut Data Warehouse Costs up to 54% with BigQuery Icon
    Cut Data Warehouse Costs up to 54% with BigQuery

    Migrate from Snowflake, Databricks, or Redshift with free migration tools. Exabyte scale without the Exabyte price.

    BigQuery delivers up to 54% lower TCO than cloud alternatives. Migrate from legacy or competing warehouses using free BigQuery Migration Service with automated SQL translation. Get serverless scale with no infrastructure to manage, compressed storage, and flexible pricing—pay per query or commit for deeper discounts. New customers get $300 in free credit.
    Try BigQuery Free
  • 1
    OpenH264

    OpenH264

    Open Source H.264 Codec

    Cisco has taken their H.264 implementation and open-sourced it under BSD license terms. Development and maintenance will be overseen by a board from the industry and the open-source community. Furthermore, we have provided a binary form suitable for inclusion in applications across a number of different operating systems and made this binary module available for download from the Internet. We will not pass on our MPEG-LA licensing costs for this module, and based on the current licensing...
    Downloads: 84 This Week
    Last Update:
    See Project
  • 2
    RustScan

    RustScan

    The Modern Port Scanner

    ...Automatically pipe results into Nmap, or use our scripts (or write your own) to do whatever you want. Adaptive learning. RustScan improves the more you use it. No bloated machine learning here, just basic maths. The usuals you would expect. IPv6, CIDR, file input and more. Automatically pipes ports into Nmap. RustScan is a modern take on the port scanner. Sleek & fast. All while providing extensive extendability to you. Not to mention RustScan uses Adaptive Learning to improve itself over time, making it the best port scanner for you. Speed is guaranteed via RustScan. However, if you want to run a slow scan due to stealth that is possible too. ...
    Downloads: 53 This Week
    Last Update:
    See Project
  • 3
    PentestGPT

    PentestGPT

    Automated Penetration Testing Agentic Framework Powered by LLMs

    PentestGPT is an AI-powered autonomous penetration testing agent designed to perform intelligent, end-to-end security assessments using large language models. Published at USENIX Security 2024, it combines advanced reasoning with an agentic workflow to automate tasks traditionally handled by human pentesters. The platform supports multiple penetration testing categories, including web security, cryptography, reversing, forensics, privilege escalation, and binary exploitation. PentestGPT runs...
    Downloads: 598 This Week
    Last Update:
    See Project
  • 4
    SCAP Security Guide

    SCAP Security Guide

    Security automation content in SCAP, Bash, Ansible, and other formats

    The purpose of this project is to create security policy content for various platforms, Red Hat Enterprise Linux, Fedora, Ubuntu, Debian, SUSE Linux Enterprise Server (SLES), as well as products, Firefox, Chromium, JRE. We aim to make it as easy as possible to write new and maintain existing security content in all the commonly used formats. "SCAP content" refers to documents in the XCCDF, OVAL and Source DataStream formats. These documents can be presented in different forms and by...
    Downloads: 151 This Week
    Last Update:
    See Project
  • Deploy Apps in Seconds with Cloud Run Icon
    Deploy Apps in Seconds with Cloud Run

    Host and run your applications without the need to manage infrastructure. Scales up from and down to zero automatically.

    Cloud Run is the fastest way to deploy containerized apps. Push your code in Go, Python, Node.js, Java, or any language and Cloud Run builds and deploys it automatically. Get fast autoscaling, pay only when your code runs, and skip the infrastructure headaches. Two million requests free per month. And new customers get $300 in free credit.
    Try Cloud Run Free
  • 5
    Respect\Validation

    Respect\Validation

    The most awesome validation engine ever created for PHP

    ...The process of creating an Exception is similar to creating a rule but there are no methods in the Exception class. On oldest versions of Respect\Validation all validators treat input as optional and accept an empty string input as valid. Even though a useful feature that caused a lot of troubles for our team and neither was an obvious behavior. Also there was some people who likes to accept null as optional value, not only an empty string.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    windows_hardening

    windows_hardening

    HardeningKitty and Windows Hardening Settings

    This repository, also known as HardeningKitty, is a comprehensive Windows hardening checklist for personal and enterprise environments. It translates security benchmarks (e.g., CIS, Microsoft Security Baselines) into actionable Group Policy and registry recommendations. Though designed primarily for Windows 10, it includes workaround modes such as “HailMary” for Windows Home users lacking the Group Policy Editor.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 7
    Wfuzz

    Wfuzz

    Web application fuzzer

    ...Wfuzz it is based on a simple concept: it replaces any reference to the FUZZ keyword by the value of a given payload. A payload in Wfuzz is a source of data. This simple concept allows any input to be injected in any field of an HTTP request, allowing to perform complex web security attacks in different web application components such as: parameters, authentication, forms, directories/files, headers, etc.
    Downloads: 18 This Week
    Last Update:
    See Project
  • 8
    Awesome Privacy

    Awesome Privacy

    A curated list of privacy & security-focused software and services

    Awesome Privacy is a curated directory of privacy-respecting alternatives to mainstream apps and services, organized across many categories like browsers, search, email, messaging, cloud storage, and operating systems. It aims to help you choose tools that reduce tracking, fingerprinting, and data collection without sacrificing usability. Each entry highlights the project’s core properties—such as open source status, end-to-end encryption, and platform availability—so you can evaluate...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 9
    LiquidHaskell

    LiquidHaskell

    Liquid Types For Haskell

    ...LiquidHaskell (LH) refines Haskell's types with logical predicates that let you enforce important properties at compile time. LH warns you that head is not total as it is missing the case for [] and checks that it is total on NonEmpty lists. The input contract propagates to uses of head which are verified by ensuring the arguments are NonEmpty. LH lets you avoid off-by-one errors that can lead to crashes or buffer overflows. Dependent contracts let you specify, e.g. that dotProduct requires equal-sized vectors. LH checks that functions terminate and so warns about the infinite recursion due to the missing case in fib.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Managed MySQL, PostgreSQL, and SQL Databases on Google Cloud Icon
    Managed MySQL, PostgreSQL, and SQL Databases on Google Cloud

    Get back to your application and leave the database to us. Cloud SQL automatically handles backups, replication, and scaling.

    Cloud SQL is a fully managed relational database for MySQL, PostgreSQL, and SQL Server. We handle patching, backups, replication, encryption, and failover—so you can focus on your app. Migrate from on-prem or other clouds with free Database Migration Service. IDC found customers achieved 246% ROI. New customers get $300 in credits plus a 30-day free trial.
    Try Cloud SQL Free
  • 10
    PDFRip

    PDFRip

    A multi-threaded PDF password cracking utility

    A multi-threaded PDF password cracking utility equipped with commonly encountered password format builders and dictionary attacks. pdfrip is a fast multithreaded PDF password cracking utility written in Rust with support for wordlist-based dictionary attacks, date and number range bruteforcing, and a custom query builder for password formats. You can write your own queries like STRING{69-420} with the -q option which would generate a wordlist with the full number range. You can pass in an year as the input with the -d option which would bruteforce all 365 days of the year in DDMMYYYY format which is a pretty commonly used password format for PDFs. Just give a number range like 5000-100000 with the -n option and it would bruteforce with the whole range.
    Downloads: 22 This Week
    Last Update:
    See Project
  • 11
    Hash Calculator Farm

    Hash Calculator Farm

    Hash Calculator

    Hash Farm is a hash calculator that calculate hash of any files and input text.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 12
    Secure Password Manager

    Secure Password Manager

    Application to generate, store, and manage passwords with encryption

    ...To learn more, visit our website at https://securepassapp.netlify.app/ Key features include: Robust Password Generation: Create strong passwords using a combination of letters, numbers, and special characters. Custom Password Input: Choose and manage your own secure passwords. Master Password Protection: A modifiable master password protects access to your stored passwords. Advanced Encryption: Your data is safeguarded with advanced encryption to ensure its confidentiality. Password Export: Export your passwords in Excel format for backup or transfer. ...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 13

    Java-Enigma

    Enigma Encryption Simulator in Java

    This program is an offline and stand-alone Java application which simulates the Enigma encryption machine that was used during World War II.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 14
    BIP39-XOR

    BIP39-XOR

    Encrypt or decrypt 12, 15, 18, 21 or 24 BIP39 codewords array ("seed")

    Encrypt or decrypt 12, 15, 18, 21 or 24 BIP39 codewords array (so-called "seed phrase") using exclusive OR (XOR)/Vernam cipher (a.k.a. One Time Pad). If not input by a user, an encryption key is automatically generated at random. Encryption with such a key preserves integrity of BIP-39 checksums of all keys (that's distinct while also compatible with SeedXOR implementation).
    Downloads: 11 This Week
    Last Update:
    See Project
  • 15
    Vigenère

    Vigenère

    A powerful tool for cracking the Vigenère cipher

    Vigenère is a program for encrypting and decrypting text using the Vigenère cipher. Built-in cryptanalysis tools make it possible to crack the cipher without needing the key — or even knowing its length.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 16

    SDigest

    File hashing tool using MD5, SHA1, SHA256, SHA512

    Most file hashing utils involve specifying a file in a dialog, or dragging a file to an input box, SDigest simply resides in the file context menu, and will display a pop-up showing MD5, SHA1, SHA256, and SHA512 message digests of the selected file
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Secure Password Manager

    Portable app designed to securely manage and protect passwords.

    Secure Password Manager is a portable application designed to help you securely manage your passwords with advanced encryption. It offers an intuitive interface, making it simple to store, manage, and retrieve your passwords securely. The software includes a password generator to create strong, unique passwords, minimizing the risk of unauthorized access. With no installation required, the application can be run directly from any location. Additionally, Secure Password Manager supports a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    File Encoder Application

    File Encoder Application

    Java application for encryption

    Java application for encryption with a GUI. It is based in the XOR symetric encryption combined with a pseudorandom resorting of the bytes. Strenth and time to encrypt/decyrpt per MB adapted to size of input file. Multithread. zoom Multilanguage Dark mode JDK-17 compatibility It includes detailed documentation in English, Spanish and Catalan.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Secure VPC Network Generator

    Secure VPC Network Generator

    Deploys a secure VPC on AWS with public/private subnets using Terraform. This tool provides a calculator and generator for AWS VPC Terraform configurations. It allows you to quickly scaffold a secure VPC with multiple subnets. Quick Start To use this tool, run the generator: bash # Generate a VPC with 3 subnets python lab_runner.py vpc-gen --cidr 10.10.0.0/16 --subnets 3 --output my_vpc.tf
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    4gen

    4gen

    a password generator for windows

    4gen is a secure, offline, lightweight password generator for windows packaged in hta. it offers cool features like mouse-movement entropy, full charset control (lowercase, uppercase, digits, symbols, unicode), and character exclusions. you can save and reuse multiple custom generation profiles with persistent local storage to quickly generate passwords for anything. it can be used as a portable app or as an installed program.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Sobelow

    Sobelow

    Security-focused static analysis for the Phoenix Framework

    ...A finding is typically marked "low confidence" if it looks like a function could be used insecurely, but it cannot reliably be determined if the function accepts user-supplied input. That is to say, if a finding is marked green, it may be critically insecure, but it will require greater manual validation. This project is in constant development, and additional vulnerabilities will be flagged as time goes on. If you encounter a bug, or would like to request additional features or security checks, please open an issue!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    MATTA

    MATTA

    Morse Code Utilitiies to convert text messages to & from sound files.

    This is a commandline utility that converts a WAV sound file containing morse code to English text. Pre-built binaries run on OSX, MsWindows, & GNU/linux. It is written in Ada, so can be rebuilt on any platform with an Ada compiler. The input wav file must be monaural, with a 16-bit signed integer encoding, and a sample rate of 8000 Hz. Either sox or audacity can easily transform to this format. The wav file is expected to be international morse code, preferrably clean and properly spaced. Tonal frequency or wpm-speed does not seem to matter. Now includes an inverse commandline app, txt2wav that creates a morse code WAV file from English text. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    audit2rbac

    audit2rbac

    Autogenerate RBAC policies based on Kubernetes audit logs

    audit2rbac takes a Kubernetes audit log and username as input, and generates RBAC role and binding objects that cover all the API requests made by that user.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 24
    Shennina

    Shennina

    Automating Host Exploitation with AI

    ...Shennina is integrated with Metasploit and Nmap for performing the attacks, as well as being integrated with an in-house Command-and-Control Server for exfiltrating data from compromised machines automatically. Shennina scans a set of input targets for available network services, uses its AI engine to identify recommended exploits for the attacks, and then attempts to test and attack the targets. If the attack succeeds, Shennina proceeds with the post-exploitation phase. The AI engine is initially trained against live targets to learn reliable exploits against remote services. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25
    Bayes Anti-Spam

    Bayes Anti-Spam

    Anti Spam AddIn / Plugin for Outlook

    For Outlook I had been using the SpamBayes plugin for years in order to remove spam e-mails. However, with Outlook 365 the addin stopped working for me. This reimplementation enables you to mark e-mails as spam or valid. Based on your input the addin learns how to classify e-mails. If the addin detects spam then it will move the e-mail to a configurable folder in Outlook. E-mails for which the decision is uncertain will be moved to another configurable folder.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB
Gen AI apps are built with MongoDB Atlas
Atlas offers built-in vector search and global availability across 125+ regions. Start building AI apps faster, all in one place.
Try Free →