Showing 619 open source projects for "python-dateutil"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • AI-First Supply Chain Management Icon
    AI-First Supply Chain Management

    Supply chain managers, executives, and businesses seeking AI-powered solutions to optimize planning, operations, and decision-making across the supply

    Logility is a market-leading provider of AI-first supply chain management solutions engineered to help organizations build sustainable digital supply chains that improve people’s lives and the world we live in. The company’s approach is designed to reimagine supply chain planning by shifting away from traditional “what happened” processes to an AI-driven strategy that combines the power of humans and machines to predict and be ready for what’s coming. Logility’s fully integrated, end-to-end platform helps clients know faster, turn uncertainty into opportunity, and transform the supply chain from a cost center to an engine for growth.
    Learn More
  • 1
    KillDisk

    KillDisk

    Disk Wiping Software

    KillDisk is a program written in python for Unix based systems for wiping a hard drive. It can wipe a hard drive using all zeroes or random data, and as many times as you want to specify. If you'd like to donate there's several ways to do so: PayPal: https://paypal.me/gerowen Bitcoin (BTC): bc1q86c5j7wvf6cw78tf8x3szxy5gnxg4gj8mw4sy2 Monero (XMR): 42ho3m9tJsobZwQDsFTk92ENdWAYk2zL8Qp42m7pKmfWE7jzei7Fwrs87MMXUTCVifjZZiStt3E7c5tmYa9qNxAf3MbY7rD LiberaPay: https://liberapay.com/gerowen
    Downloads: 14 This Week
    Last Update:
    See Project
  • 2

    PyEvcs

    Extended Visual Cryptography Schemes in Python

    ...In an Extended Visual Cryptography Scheme, both the secret image and the shares are meaningful images like a landscape, a building or a beautiful girl, hiding the very intention to conceal a secret. PyEvcs is a command line Python application allowing you to experiment with Extended Visual Cryptography Schemes for "natural" continuous tone images.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Pombo

    Pombo

    Pombo can help you recover your computer in the event it's stolen.

    Pombo works silentely in the background, hidden, and sends tracking information to a webserver of your choice. If your computer is stolen, just log into your webserver to get the lastest file uploaded by Pombo, decrypt and hand it to the police. They will have all they need to catch the thief: IP address, date/time, nearby routers, screenshot, and even a photo of his/her face if you have a webcam ! Pombo protects your privacy: Tracking information is encrypted with rock-solid GnuPG and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    tickets

    pythonic kerberosish ticket system: easy to use, easy to subclass

    A SecureTicket, or Ticket, consists of salt, hash, valid_until, public_flags, flags, data and "invisible" hashed entropy. Tickets are symmetrically signed using SHA256-HMAC. Fields 'valid_until', 'flags' and 'data' may be optionally encrypted using AES128-CBC or TripleAES128-CBC. Values 'data' and 'entropy' may consist of arbitrary objects which are transparently pickled(serialized), optionally gzipped and of course securely signed. Specific implementations are included: FormTicket:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Dun and Bradstreet Risk Analytics - Supplier Intelligence Icon
    Dun and Bradstreet Risk Analytics - Supplier Intelligence

    Use an AI-powered solution for supply and compliance teams who want to mitigate costly supplier risks intelligently.

    Risk, procurement, and compliance teams across the globe are under pressure to deal with geopolitical and business risks. Third-party risk exposure is impacted by rapidly scaling complexity in domestic and cross-border businesses, along with complicated and diverse regulations. It is extremely important for companies to proactively manage their third-party relationships. An AI-powered solution to mitigate and monitor counterparty risks on a continuous basis, this cutting-edge platform is powered by D&B’s Data Cloud with 520M+ Global Business Records and 2B+ yearly updates for third-party risk insights. With high-risk procurement alerts and multibillion match points, D&B Risk Analytics leverages best-in-class risk data to help drive informed decisions. Perform quick and comprehensive screening, using intelligent workflows. Receive ongoing alerts of key business indicators and disruptions.
    Learn More
  • 5
    SuStorID is an advanced Intrusion Detection System (IDS) for web services, based on machine learning. Its name comes from the term “Su Stori”, which in Sardinian language means “The Falcon”. It’s version is experimental, but demonstrates a number of interesting features, that can be readily exploited to detect and act against web attacks. SuStorID can be coupled with modsecurity, the well known web application firewall, to gather training data and provide for real-time counteractions. So,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Nixory
    Nixory is a light and handy antispyware tool aimed at removing malicious tracking cookies. It currently supports Mozilla Firefox, Google Chrome and Internet Explorer and it runs on all major OS including Windows, Linux and MacOSx.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    The Netbios Share Samba Scanner scan C classes and reveal all open shares. It will tell you all the information and even show the content of the shares. It will also show you shares that are not accessible.Also provide a username and password to it. To know more about SecPoint IT security solutions visit us at www.secpoint.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    This is where web developers can get tools that can make their life easier. Web technologies and languages used contain but are not limited to HTML, XHTML, CSS, JavaScript, PHP, and AJAX. All code is extremely slim, fast running, and is W3C compliant.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Malybuzz is a multiprotocol and stateful network fuzzer to check the security of applications. Thanks to Malybuzz some new vulnerabilities have been discovered.
    Downloads: 1 This Week
    Last Update:
    See Project
  • eProcurement Software Icon
    eProcurement Software

    Enterprises and companies seeking a solution to manage all their procurement operations and processes

    eBuyerAssist by Eyvo is a cloud-based procurement solution designed for businesses of all sizes and industries. Fully modular and scalable, it streamlines the entire procurement lifecycle—from requisition to fulfillment. The platform includes powerful tools for strategic sourcing, supplier management, warehouse operations, and contract oversight. Additional modules cover purchase orders, approval workflows, inventory and asset management, customer orders, budget control, cost accounting, invoice matching, vendor credit checks, and risk analysis. eBuyerAssist centralizes all procurement functions into a single, easy-to-use system—improving visibility, control, and efficiency across your organization. Whether you're aiming to reduce costs, enhance compliance, or align procurement with broader business goals, eBuyerAssist helps you get there faster, smarter, and with measurable results.
    Learn More
  • 10
    The PKI Framework (PKIF) is a cross-platform library for performing PKIX-compliant certificate processing. It includes support for SCVP, OCSP, CMS and Timestamps. It uses Windows CAPI, NSS or Crypto++ for cryptographic services and hardware support.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    The csvdatamix project aims to randomize CSV input data files in order to conceal the original state of the data. Similar to data masking or data transformation. Also has mapping abilities to translate back to the original state of the data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    An Enterprise level Password Management solution, written in 100% Python with the GPL-2 license.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    XSSAlert
    Penetration Testing tool for detecting XSS Attack
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Insidias is a next-generation intrusion detection engine, with a focus on speed, efficiency, advanced pattern matching, parallel-processing, modularity, and expandability.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    umit
    UMIT is the new nmap frontend, intended to be cross plataform, easy to use, fast and highly customizable. This project is developed with Python and PyGTK and run with minimal dependencies.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 16
    pyshot, windows session recorder/auditor
    pySHOT is a session recorder for windows. (soon linux session recorder also) It's a client/server python app using gearman. To use pyshot you must install pyshot-client from https://sourceforge.net/projects/pyshot-client/ on monitored server
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Ked password manager helps to manage large amounts of passwords and related information and simplifies tasks of searching and entering password data. Kedpm can read data from existing password managers. Written as extensible framework in python
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    ScardFace is a python3k library for interfacing with smart cards, which supports Plug-and-Play readers inclusion and threading. It also offers classes for manipulating APDU cmds and resps, and use them in a transport-protocol-independent fashion.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 19
    TMDA is an open source anti-spam system and local mail delivery agent written in 100% pure Python. TMDA combines whitelists, blacklists, a challenge/response system, and special-purpose e-mail addresses called "tagged addresses" to thwart spam.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Proxy server that performs proof of concept session hijacking by receiving cookies from one or more NomNom Agents. It then offers the user an option to switch to any intercepted session. More features and site specific options later.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Pyano is web interface for the mixmaster remailer written for mod_python
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Firewall Configuration Made Easy
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Incoming Activity Monitor

    Incoming Activity Monitor

    DEPRECATED! Project is now hosted on GITHUB

    ...Project is now hosted on GITHUB Monitors conspicuous activity on the net. Consists of a daemon watching for incoming packets and a client for user desktop notifications. Being coded in python and ubuntu compat.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    malmon
    Hosting exploit/backdoor detection daemon.It's written in python , and uses inotify (pyinotify) to monitor file system activity.It checks files smaller then some size,compares their md5sum and hex signatures against DBs with known exploits/backdoor.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    A cryptographically secure random password generator for Linux written in python and GTK 2.0.
    Downloads: 1 This Week
    Last Update:
    See Project