Showing 19 open source projects for "void based linux"

View related business solutions
  • Context for your AI agents Icon
    Context for your AI agents

    Crawl websites, sync to vector databases, and power RAG applications. Pre-built integrations for LLM pipelines and AI assistants.

    Build data pipelines that feed your AI models and agents without managing infrastructure. Crawl any website, transform content, and push directly to your preferred vector store. Use 10,000+ tools for RAG applications, AI assistants, and real-time knowledge bases. Monitor site changes, trigger workflows on new data, and keep your AIs fed with fresh, structured information. Cloud-native, API-first, and free to start until you need to scale.
    Try for free
  • Dun and Bradstreet Risk Analytics - Supplier Intelligence Icon
    Dun and Bradstreet Risk Analytics - Supplier Intelligence

    Use an AI-powered solution for supply and compliance teams who want to mitigate costly supplier risks intelligently.

    Risk, procurement, and compliance teams across the globe are under pressure to deal with geopolitical and business risks. Third-party risk exposure is impacted by rapidly scaling complexity in domestic and cross-border businesses, along with complicated and diverse regulations. It is extremely important for companies to proactively manage their third-party relationships. An AI-powered solution to mitigate and monitor counterparty risks on a continuous basis, this cutting-edge platform is powered by D&B’s Data Cloud with 520M+ Global Business Records and 2B+ yearly updates for third-party risk insights. With high-risk procurement alerts and multibillion match points, D&B Risk Analytics leverages best-in-class risk data to help drive informed decisions. Perform quick and comprehensive screening, using intelligent workflows. Receive ongoing alerts of key business indicators and disruptions.
    Learn More
  • 1
    OpenH264

    OpenH264

    Open Source H.264 Codec

    Cisco has taken their H.264 implementation and open-sourced it under BSD license terms. Development and maintenance will be overseen by a board from the industry and the open-source community. Furthermore, we have provided a binary form suitable for inclusion in applications across a number of different operating systems and made this binary module available for download from the Internet. We will not pass on our MPEG-LA licensing costs for this module, and based on the current licensing...
    Downloads: 124 This Week
    Last Update:
    See Project
  • 2
    AuthPass.app

    AuthPass.app

    Password Manager based on Flutter for all platforms

    Password Manager based on Flutter for all platforms. Keepass 2.x (kdbx 3.x) compatible. Load/Decrypt kdbx using password and/or key file. Search through stored credentials. Organize passwords using groups. Desktop (Mac, Linux, Windows): Keyboard shortcuts for Search, Copy, Navigation, etc. Desktop & Mobile: Copy & paste support. Store master password in the KeyStore/KeyChain secured with biometric data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    YoungerSibling

    YoungerSibling: Cross-platform OSINT tool for quick data gathering.

    YoungerSibling is a Python-based terminal utility script designed for educational purposes. It provides a set of useful tools to perform tasks like searching the web, performing lookups (Google search, IP lookup, username lookup, etc.), and extracting metadata from images, directly from the terminal. This project aims to help students, developers, and hobbyists learn about web scraping, API usage, and terminal interaction with Python.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 4
    Plum Harbor

    Plum Harbor

    An open-source file sharing app built using Next.js and Perplexity.

    An open-source file sharing app built using Next.js and Perplexity. The app employs ML-KEM-1024, ChaCha20, Serpent-256, and HMAC-SHA512 to ensure data confidentiality and integrity. The app is also equipped with a dedicated password vault. Check it out at https://plum-harbor.netlify.app/ GitHub page: https://github.com/Northstrix/plum-harbor Codeberg page: https://codeberg.org/Northstrix/plum-harbor The app is available in English and Hebrew. German version is available...
    Downloads: 2 This Week
    Last Update:
    See Project
  • AI-First Supply Chain Management Icon
    AI-First Supply Chain Management

    Supply chain managers, executives, and businesses seeking AI-powered solutions to optimize planning, operations, and decision-making across the supply

    Logility is a market-leading provider of AI-first supply chain management solutions engineered to help organizations build sustainable digital supply chains that improve people’s lives and the world we live in. The company’s approach is designed to reimagine supply chain planning by shifting away from traditional “what happened” processes to an AI-driven strategy that combines the power of humans and machines to predict and be ready for what’s coming. Logility’s fully integrated, end-to-end platform helps clients know faster, turn uncertainty into opportunity, and transform the supply chain from a cost center to an engine for growth.
    Learn More
  • 5
    wolfSSL
    The wolfSSL embedded SSL library (formerly CyaSSL) is a lightweight, portable, C-language-based SSL/TLS library targeted at IoT, embedded, and RTOS environments primarily because of its size, speed, and feature set. It works seamlessly in desktop, enterprise, and cloud environments as well. wolfSSL supports industry standards up to the current TLS 1.2 and DTLS 1.2, is up to 20 times smaller than OpenSSL, offers a simple API, an OpenSSL compatibility layer, OCSP and CRL support, is backed by...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 6
    BWTC32Key

    BWTC32Key

    A file compressor with AES256CTR and Base32768 binary-to-text encoding

    BWTC32Key is a program I wrote that compresses data, then optionally encrypts it, and then outputs a Base32768 representation as the final output
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Lakhash

    Lakhash

    An experimental cloud storage service featuring client-side encryption

    An experimental cloud storage service built with Next.js, featuring client-side file encryption, a dedicated password vault, advanced integrity verification functionality, and a convenient UI. Lakhash is also equipped with the password vault. Check it out at https://lakhash.netlify.app GitHub repository: https://github.com/Northstrix/Lakhash Codeberg repository: https://codeberg.org/Northstrix/Lakhash/ The related Medium article can be found at...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Plum Harbor Deutsch

    Plum Harbor Deutsch

    German version of the "Plum Harbor" file sharing app.

    Eine experimentelle Dateifreigabe App, die mit Next.js und Perplexity entwickelt wurde und es den Nutzern ermöglicht, Dateien einfach zu teilen, zu empfangen, zu senden und erneut zu senden. Die App verwendet ML-KEM-1024, ChaCha20, Serpent-256 und HMAC-SHA512, um die Vertraulichkeit und Integrität der Daten zu gewährleisten. Außerdem ist die App mit einem speziellen Passwortspeicher ausgestattet. Schau es dir an unter: https://plum-harbor-deutsch.netlify.app/ GitHub:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
     In-Browser-File-Encrypter

    In-Browser-File-Encrypter

    The source code of the In-Browser-File-Encrypter web app

    The In-Browser File Encrypter is a simple web application that enables you to securely encrypt your files directly in your browser using the AES-256 encryption algorithm in CBC mode. Check it out at: https://codepen.io/Northstrix/pen/xxvXvJL and https://northstrix.github.io/In-Browser-File-Encrypter/V1.0/web-app.html GitHub page: https://github.com/Northstrix/In-Browser-File-Encrypter The download shortcut:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Create and run cloud-based virtual machines. Icon
    Create and run cloud-based virtual machines.

    Secure and customizable compute service that lets you create and run virtual machines.

    Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
    Try for free
  • 10
    PetoronHash-System

    PetoronHash-System

    PHASH | post-quantum XOF hashing algorithm | C++20

    PHASH is a self-contained, dependency-free, post-quantum XOF hashing algorithm implemented in modern C++20. This release delivers the first fully stable production implementation of the PetoronHash-System — a 1600-bit sponge-based hash function with domain separation, extendable output, and deterministic behavior. Key Features No external dependencies — pure C++20 implementation. Extendable Output (XOF) — supports arbitrary output length (256–8192+ bits). Post-quantum oriented design...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Smoke Crypto Chat Messenger for Android

    Smoke Crypto Chat Messenger for Android

    Smoke: Android Crypto Chat Messenger

    Smoke is an encrypting chat messenger for Android written in Java. Please read the Web site for more information: https://textbrowser.github.io/smoke/ (original, current) https://www.amazon.com/dp/3752691999/ https://smokeappope.sourceforge.io/ (old, third party archive) Smoke App OPE - Open Personal Encryption Download Android APK Installer: https://sourceforge.net/projects/smokeappope/files/ Smoke Source: https://github.com/textbrowser/smoke SmokeStack Source:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Passky Desktop Application

    Passky Desktop Application

    Simple, modern, lightweight and open-source password manager

    Passky is a free and open source password manager that is both powerful and easy to use. It is available in multiple languages as an application for Windows, macOS, Linux and Android, but also as an extension for Chrome, Firefox, Edge and Opera web browsers. This password manager helps you keep all your passwords safe : e-commerce sites, applications, social networks, games, etc. With Passky, you can create, manage and store up to 1000 passwords for free in a secure and encrypted...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    KeexyBox

    KeexyBox

    The box to keep the Internet under your control

    KeexyBox allows you to do parental control, block ads, limit telemetry, and browse the Internet anonymously from your home network without installing any software on your devices. It also can be used to create a public wireless access point with the captive portal. It is a software program which requires a Raspberry PI box and which is installed on Raspbian. It constitutes a cut-off point between your devices (computers, tablets, smartphones, etc.) and your router or Internet box....
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    shadowsocks-libev

    shadowsocks-libev

    Bug-fix-only libev port of shadowsocks

    ...Snap is the recommended way to install the latest binaries. You can build shadowsocks-libev and all its dependencies by script. The latest shadowsocks-libev has provided a redir mode. You can configure your Linux-based box or router to proxy all TCP traffic transparently, which is handy if you use an OpenWRT-powered router. Although shadowsocks-libev can handle thousands of concurrent connections nicely, we still recommend setting up your server's firewall rules to limit connections from each user. We strongly encourage you to install shadowsocks-libev from jessie-backports-sloppy.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 15

    TOTP Database

    TOTP server side algorithm

    calculate TOTP using database stored procedures allowing you to validate a user's entered TOTP with a stored secret. Cooperates with all authorization apps that calculate a TOTP using SHA1 encryption
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    goim

    goim

    goim is a im server writen by golang

    GOIM is a IM and push notification server cluster. Supports single push, multiple push and broadcasting. Supports one key to multiple subscribers (Configurable maximum subscribers count). Supports heartbeats (Application heartbeats, TCP, KeepAlive, HTTP long pulling). Supports authentication (Unauthenticated user can’t subscribe). Scalable architecture (Unlimited dynamic job and logic modules). You can view the comments in target/comet.toml,logic.toml,job.toml to understand the meaning of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Defa Protect HTML5 Video From Download

    Defa Protect HTML5 Video From Download

    Prevent and Protect Your HTML5 Video, Music , Audio From Download Free

    Defa Protector is A Simple PHP and Wordpress Plugin To Protect and Prevent Video Save As From Browser and Some Video Grabber. There is 100% Guaranteed Protection and There might be some tradeoff but If you care about Digital Rights Management of Your Video and Music Content. This Project is for you. Defa Protector 6.7.1 Revamp Code For Better Performance To The Bone. We almost rewritten this project from scratch.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Wordpie Python Based Brute Force

    Wordpie Python Based Brute Force

    Python Based Brute Force Password Cracking Assistant By Clownsec

    A python script used to generate all possible password combinations for cracking WAP and other logins or password files. This program is open source. If you see the need to repair or change something by all means do so, but share your findings. *HONK* Usage: wordpie.py [-h] [-o OUTPUT] [-min MIN_SIZE] [-max MAX_SIZE] [-N] [-L] [-U] [-S] [-A] [-v] Generate a wordlist with all possible combinations of letters including: -L (Lowercase Letters) -U (Uppercase Letters) -N...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    SMScryptor encrypts and decrypts messages sent from any mobile phones using : - AES 256 encryption - J2ME MIDP2.0 CLDC1.1 - ECMAScript - Apache / PHP / mysql
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next