12 projects for "complex system" with 2 filters applied:

  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    age

    age

    A simple, modern and secure encryption tool (and Go library)

    ...Because of its design philosophy, it avoids the bloat of many older encryption utilities while maintaining strong cryptographic hygiene. It’s especially useful for developers or system administrators who want to adopt encryption without learning a multitude of options.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 2
    OpenZeppelin Contracts

    OpenZeppelin Contracts

    OpenZeppelin Contracts is a library for secure smart contracts

    A library for secure smart contract development. Build on a solid foundation of community-vetted code. OpenZeppelin Contracts uses semantic versioning to communicate backward compatibility of its API and storage layout. To keep your system secure, you should always use the installed code as-is, and neither copy-paste it from online sources nor modify it yourself. The library is designed so that only the contracts and functions you use are deployed, so you don't need to worry about it...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Kubesploit

    Kubesploit

    Kubesploit is a cross-platform post-exploitation HTTP/2 Command

    ...It can help the organization learn how to operate when real attacks happen, see if its other detection system works as expected and what changes should be made.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    d-crypt

    Tweakable 256-bit symmetrical block cipher.

    D-crypt is an symmetrical block cipher operating on 256bit blocks with an key of the same length. The cipher takes 3 inputs: the data to encrypt, the symmetric key and a tweak consisting in a array of 16 integers representing each one of eleven possible keyaddition algorithms. Features a similar structure as AES (uses simpler versions of ShiftRows, MixColumns) and uses AES SBOX. It is an SP network. The Key Schedule is a different from AES's, however the Expansion is partially inspired in...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 5
    Creates true post-admission network access control by regulating network access to admitted users on an as needed basis. Users cannot escalate privileges between micro-perimeters. Manageable, efficient and scalable for complex security environments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    VSL: Virtual Steganographic Laboratory

    VSL: Virtual Steganographic Laboratory

    Steganography and steganalysis software

    VSL is free image steganography and steganalysis software in form of graphical block diagramming tool. It allows complex using, testing and adjusting different steganographic techniques and provides simple GUI along with modular, plug-in architecture
    Downloads: 14 This Week
    Last Update:
    See Project
  • 7
    PacketFlow is a command line utility that processes an XML configuration to generate a set of firewall rules. It is intended to be installed and run directly on the firewall itself. PacketFlow was designed to deal with complex configurations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Sesa is a simple web portal framework for Webmin. The Sesa framework allows to build portals to edit complex system configuration data. Supports role based access control and comes with a configurable workflow engine.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    The Network Simulation Environment (NOSE) has the capability to virtually create complex networks including different types of operation systems very cost-efficient on a single computer.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 10
    Peer Agent is a system that enable a group of users to carry out automated complex interaction via email services without relying on a trusted third party.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    SocketSwitchboard is a virtual proxy, router, or VPN. It uses an XML configuration to map incoming traffic on one or more ports to designated hosts and ports on the LAN or on the Internet. It supports complex boolean access restrictions and SSL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    SystemSpecifyer is used to develop and maintain complex, well structured, systems specifications, in normal language. Using the System Matrix double matrix relation building mechanism specs can be tested for completeness, correctness and consistency.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB