Showing 301 open source projects for "liblpsolve55.so"

View related business solutions
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 1
    Google APIs Node.js Client

    Google APIs Node.js Client

    Google's supported Node.js client library

    ...Support for authorization and authentication with OAuth 2.0, API Keys and JWT (Service Tokens) is included. The full list of supported APIs can be found on the Google APIs Explorer. The API endpoints are automatically generated, so if the API is not in the list, it is currently not supported by this API client library. These client libraries are supported by Google. However, these libraries are considered complete and are in maintenance mode. This means that we will address critical bugs and security issues but will not add any new features. For Google Cloud Platform APIs, we recommend using google-cloud-node which is under active development. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    MemGuard

    MemGuard

    Secure software enclave for storage of sensitive information in memory

    ...The effort is taken to prevent sensitive data from touching the disk. This includes locking memory to prevent swapping and handling core dumps. Kernel-level immutability is implemented so that attempted modification of protected regions results in an access violation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Tsunami

    Tsunami

    Network security scanner for detecting severity vulnerabilities

    ...This poses a significant challenge for large organizations with thousands or even millions of internet-connected systems. In such hyperscale environments, security vulnerabilities must be detected and ideally remediated in a fully automated fashion. To do so, information security teams need to have the ability to implement and roll out detectors for novel security issues at scale in a very short amount of time. Furthermore, it is important that the detection quality is consistently very high.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    lynis

    lynis

    Security auditing tool for Linux, macOS, and UNIX-based system

    Lynis is a battle-tested security tool for systems running Linux, macOS, or Unix-based operating system. It performs an extensive health scan of your systems to support system hardening and compliance testing. The project is open source software with the GPL license and available since 2007. Since Lynis is flexible, it is used for several different purposes. Typical use cases for Lynis include security auditing, compliance testing (e.g. PCI, HIPAA, SOx), penetration testing, vulnerability...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • 5
    Google Authenticator PAM Library

    Google Authenticator PAM Library

    Example PAM module demonstrating two-factor authentication

    ...Administrators can tune skew tolerance, rate limiting, emergency scratch codes, and which PAM control flags enforce 2FA for specific users or groups. The project’s design favors simplicity and auditability, keeping the runtime small and the configuration explicit so it’s easy to review in production change control.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Tomb

    Tomb

    the Crypto Undertaker

    ...Keys can be protected with passphrases and even hidden via steganography inside innocuous files, giving you options for concealment and off-device storage. The interface is deliberately simple—dig a tomb, forge a key, lock it, and open it—yet provides hooks to bind directories or run scripts on open/close so you can tailor behavior to your workstation. Permissions and ownership hygiene are emphasized to avoid leaking metadata, and the tool favors auditable shell operations that experienced users can inspect. Tomb’s model suits people who want encrypted containers with Unix-friendly ergonomics, keeping secrets safe while integrating cleanly into everyday scripts and workflows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    passff

    passff

    zx2c4 pass manager extension for Firefox, Chrome and Opera

    zx2c4 pass management extension for Mozilla Firefox. Pending Chrome port. Official signed version can be found on the Mozilla add-on page. This extension will allow you to access your zx2c4 pass repository directly from your web browser. You can choose to automatically fill and submit login forms if a matching password entry is found. Add-on that allows users of the unix password manager 'pass' to access their password store from Firefox. PassFF allows users of the unix password manager pass...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Rack::Attack

    Rack::Attack

    Rack middleware for blocking & throttling

    ...Rack::Attack can also track requests without blocking them. We rely on Rack::Attack to let developers quickly track and throttle requests. It helps keep our site reliable, so we can spend more energy building better features. We’re glad to make it publicly available to the open-source community.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Live-Forensicator

    Live-Forensicator

    A suite of Tools to aid Incidence Response and Live Forensics

    Live-Forensicator is a toolkit intended for live forensic collection and initial triage on Windows machines. It automates the capture of volatile information—running processes, network connections, loaded drivers, account sessions, and in-memory artifacts—into a consistent artifact set that investigators can analyze offline. The tool tries to be non-invasive while collecting sensitive data quickly and logs the collection steps to preserve chain-of-custody details and to help auditors...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 10
    MaxKey

    MaxKey

    MaxKey SSO ,Leading-Edge IAM-IDaas(Identity and Access Management)

    Maxkey Single Sign On System, which means the Maximum key, Leading-Edge IAM/IDaas Identity and Access Management product, supports OAuth 2.x/OpenID Connect, SAML 2.0, JWT, CAS, SCIM, and other standard protocols, and provide Secure, Standard and Open Identity management (IDM), Access management (AM), Single Sign On (SSO), RBAC permission management and Resource management. MaxKey focuses on performance, security, and ease of use in enterprise scenarios, is widely used in industries such as...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    authentik

    authentik

    The authentication glue you need

    ...It can be seamlessly integrated into existing environments to support new protocols. authentik is also a great solution for implementing sign-up, recovery, and other similar features in your application, saving you the hassle of dealing with them. authentik is an open-source Identity Provider focused on flexibility and versatility. You can use authentik in an existing environment to add support for new protocols, implement sign-up/recovery/etc. in your application so you don't have to deal with it, and many other things. You can adopt authentik to your environment, regardless of your requirements. Need an Active-Directory integrated SSO Provider? Do you want to implement a custom enrollment process for your customers? Are you developing an application and don't want to deal with User verification and recovery? ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Redwood

    Redwood

    The App Framework for Startups

    ...We’ve chosen the world’s most popular rendering engine to power Redwood’s web frontend. With React, you’ll have your pick of learning materials, design systems, and trained employees. As your project grows, so will the number of client apps that need to talk to your backend. With a GraphQL API as your foundation, you can live in a multi-client world with ease. Interacting with your database has never been easier. Prisma’s extremely popular ORM allows you to focus more on your business logic and less on the intricacies of SQL. Optional TypeScript support gives you the best of JavaScript AND the best of a type system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    transcrypt git

    transcrypt git

    transparently encrypt files within a git repository

    ...Files that you choose will be automatically encrypted when you commit them, and automatically decrypted when you check them out. The process will degrade gracefully, so even people without your encryption password can safely commit changes to the repository's non-encrypted files. transcrypt protects your data when it's pushed to remotes that you may not directly control (e.g., GitHub, Dropbox clones, etc.), while still allowing you to work normally on your local working copy. You can conveniently store things like passwords and private keys within your repository and not have to share them with your entire team or complicate your workflow. transcrypt is in the same vein as existing projects like git-crypt and git-encrypt, which follow Git's documentation regarding the use of clean/smudge filters for encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    KeePass

    KeePass

    A lightweight and easy-to-use password manager

    KeePass Password Safe is a free, open source, lightweight, and easy-to-use password manager for Windows, Linux and Mac OS X, with ports for Android, iPhone/iPad and other mobile devices. With so many passwords to remember and the need to vary passwords to protect your valuable data, it’s nice to have KeePass to manage your passwords in a secure way. KeePass puts all your passwords in a highly encrypted database and locks them with one master key or a key file. As a result, you only have to remember one single master password or select the key file to unlock the whole database. ...
    Leader badge
    Downloads: 216,442 This Week
    Last Update:
    See Project
  • 15

    Antivirus Live CD

    4MLinux fork including ClamAV scanner

    ...Ethernet, WiFi, PPP and PPPoE are supported by Antivirus Live CD to enable automatic updates of its virus signature databases. All partitions are mounted during the boot process so that they can be scanned by ClamAV. The Antivirus Live CD ISO images are fully compatible with UNetbootin, which can be used to create an easy-to-use Antivirus Live USB.
    Leader badge
    Downloads: 269 This Week
    Last Update:
    See Project
  • 16
    Emojis of Death
    Emojis of Death is a down and dirty browser app, written in HTML. It's HTML, so it will work on anything a web browser can run on. It's purpose is to hide text strings in emojis, which you can then text or email. An encoded emoji can hold quite a bit of text. The receiver will need Emojis of Death as well, to decode the emoji. The file's small size makes it perfect for your phone. Some email and text services don't work with this, so try it.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 17
    BIP39-XOR

    BIP39-XOR

    Encrypt or decrypt 12, 15, 18, 21 or 24 BIP39 codewords array ("seed")

    Encrypt or decrypt 12, 15, 18, 21 or 24 BIP39 codewords array (so-called "seed phrase") using exclusive OR (XOR)/Vernam cipher (a.k.a. One Time Pad). If not input by a user, an encryption key is automatically generated at random. Encryption with such a key preserves integrity of BIP-39 checksums of all keys (that's distinct while also compatible with SeedXOR implementation).
    Downloads: 18 This Week
    Last Update:
    See Project
  • 18
    PVPLE
    VPLE (Linux) Vulnerable Pentesting Lab Environment VPLE is an Intentionally Vulnerable Linux Virtual Machine. This VM can be used to conduct security training, test security tools, and practice common penetration testing Labs. In VPLE bunch of labs are Available. NOTE:- "Only run in VMWare Pls Don’t run in VirtualBox" Will also run on the ProxMox server to understand how to do it pls refer to the doc in the zip named "Cybersecurity Lab Deployment on Proxmox" The default login...
    Downloads: 20 This Week
    Last Update:
    See Project
  • 19
    WPAGen

    WPAGen

    Wifi Password Generator

    ...I digitally sign some files in my releases. If you'd like to verify those signatures, you can find my PGP/GPG keys at: https://marcusadams.me/keys.html If you'd like to donate there's several ways to do so: PayPal: https://paypal.me/gerowen Bitcoin (BTC): bc1q86c5j7wvf6cw78tf8x3szxy5gnxg4gj8mw4sy2 Monero (XMR): 42ho3m9tJsobZwQDsFTk92ENdWAYk2zL8Qp42m7pKmfWE7jzei7Fwrs87MMXUTCVifjZZiStt3E7c5tmYa9qNxAf3MbY7rD
    Leader badge
    Downloads: 12 This Week
    Last Update:
    See Project
  • 20
    RufasSok

    RufasSok

    Sokoban with many families of puzzles provided.

    This is a minimalist version of the Sokoban puzzle game that runs on Windows, OSX, and Linux. The best thing about this game that is different: you can use the built-in solvers a little bit.. Sometimes I want to know the best next move or two, but no more. Other times I want to solve part way and watch the solver step thru the remainder of the solution at whatever speed I choose.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 21
    Cherrybomb

    Cherrybomb

    Cherrybomb is a CLI tool that helps you avoid undefined user behaviour

    ...Then, it tests your API for common issues and vulnerabilities. If any problems are found, Cherrybomb gives you a detailed report with the exact location of the problem so you can fix it easily. With a configuration file, you can easily edit, view, Cherrybomb's options. The config file allows you to set the running profile, location of the oas file, the verbosity and ignore the TLS error. Config also allows you to override the server's URL with an array of servers, and add security to the request.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    USB Paranoiac

    USB Paranoiac

    USB Security Scanner on Linux

    This program allows you to examine suspicious USB storage devices before plugging them into your Windows computer. This is not an antivirus; it does not have heuristic or automatic detection-cleanup features. Just so you know, executable files are worth your attention. You decide whether they're dangerous or not. https://github.com/shampuan/USB-Paranoiac
    Downloads: 3 This Week
    Last Update:
    See Project
  • 23
    mpass

    mpass

    Minimal TUI Password Mananger for GNU/Linux

    Mpass is a lightweight TUI Password Manager for GNU/Linux systems. It delivers a fast, distraction-free text user interface so you can store, and retrieve credentials without the bloat of a GUI or the headaches of a CLI.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Textcryption

    Textcryption

    Tiny application which allows encrypting basic text.

    ...I think it is a very strong way to encrypt, specially if the text has more than 1 KB. The application reads encrypted bytes from disk, and writes encyrpted bytes to disk, so it never is saved in the hard disk decrypted. JDK-17 compatibility
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    garysfm

    garysfm

    An advanced file manager with qss themes and iso and folder previews

    garysfm which stands for Gary's File Manager is a file manager with some advanced features. Those features include bulk renaming and folder image previews. I has rather advanced search functions, tab browsing with persistence between launches. It remembers your folder sorting and view options in icon view. It also remembers your active tabs between sessions. It has progress dialog while doing large operations like copying large files, and folders with many files. python version works on...
    Downloads: 7 This Week
    Last Update:
    See Project