Showing 111 open source projects for "design"

View related business solutions
  • 8 Monitoring Tools in One APM. Install in 5 Minutes. Icon
    8 Monitoring Tools in One APM. Install in 5 Minutes.

    Errors, performance, logs, uptime, hosts, anomalies, dashboards, and check-ins. One interface.

    AppSignal works out of the box for Ruby, Elixir, Node.js, Python, and more. 30-day free trial, no credit card required.
    Start Free
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 1
    syslog proxy daemon

    syslog proxy daemon

    creates an extra socket for syslog (e.g. in a chroot jail)

    Developed for systems that have an older version of syslogd which does not support multiple sockets (e.g. via the '-a' flag). Performs extensive message validation according to RFC 3164
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    Xonet

    Multipurpose network application.

    Xonet is a network application that allow the user to interact with network devices through a graphical interface. You can design your own packets, send them and capture the answers. It also has the functionality to create your own network tools based on network packets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    This java tools design to decrypt and obtain the MS Windows Admin password from encrypted password get from Amazon EC2. It can run as standalone application or embedded as Java applet in HTML.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    HcryptoJ (Historical cryptology in Java) is a Java based programming library for implementing and analyzing historical ciphers. HcryptoJ is designed to support research and teaching in historical cryptography and computer science. Licensed under GPL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 5
    Application proxy toolkit which inherits the ideology of TIS fwtk and maintains API backwards compatibility. The design goal is to make it simple yet powerful; no performance hacks allowed in the code and library dependencies are reduced to minimum.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Slogger is a session keystroke logging utility. The goal of the design is to provide the same features available in many commercial products, but under the GNU license.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Ashutosh Utility is the utility program created to design useful utilities for Windows. This program is in under development stage and now using windows presentation foundation interface. File encrypter, checksum calculator, password generator, os in
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    This simple script is used to make an easy login script without the need for MySql! Perfect for admin accounts, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Computer Aided Design of Security Ontology - master thesis realized at GUT
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 10
    Amnesia.
    Amnesia is a design-rich 'host-proof' web application that encrypts and remembers all sorts of personal information from passwords to private notes. Project now hosted at Google Code: https://code.google.com/p/amnesia-app/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    This project develops a secure P2P framework in Java (SePP). Existing P2P frameworks are not covering security by design but rather implement only some high layer security mechanisms. It has been developed as part of the EU project SMEPP (www.smepp.org)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Orizon is a framework intended to provide tools and facilities to test java sources for security flaws. The main goal is to detect common threats as described in Owasp top 10 vulnerability document.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    BMPE stands for Bitmap Editor and is an cross platform open source application written in java for editing and extracting messages from BMP files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    This project is intended to demonstrate that current popular approaches to software security (e.g. DAC, VMA randomization, etc) are not sufficient and that other approaches should be considered more seriously (e.g. MAC, design by contract).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    An extend version of NuSMV, which supports symbolic model checking of ETL and APSL
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This is a simple app, created around an original sudoku solver based only on heuristics, not brute force. It's coded in Java/SWT(GUI toolkit). It's an example of MVC and of Visitor, Observer, Strategy, Abstract Factory, Singleton Design Patterns.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    ClearPass (formerly BlowPass) is web based password storage system that uses the Blowfish algorithm and a Host-Proof design pattern.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A powerful, provider-based .NET CAPTCHA control with audio challenge and Microsoft Visual Studio design-time support.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    This project aims to develop a prototype system that explores how we should re-invision computer system design based on changes in how people get the software that they run, as well as advances in static analysis of software.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    KCPentrix is liveCD design to be a standalone Penetration testing toolkit for pentesters and security analysts
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    N-Eye is design to help the network administrator, takes advantages of passive fingerprinting(p0f, pads) and active scanning(nmap, nessus), to provide an useful network environment apperceive tool for security administrators
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    This site is intended as a location containing a suite of tools to (1) Aid in the design of db APIs to be utilized in a J2EE environment and (2) generate stubs for the db API, Java classes and SQL DDL necessary to support the MVC pattern and the Data Own
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    This project provides a 'brute-force' search for optimum assembler fragments for Microchip Technology Inc's mid-range PIC processor range.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    The goal of this project is to design and write comercial quality software and aplications with fully respect to free software (like in "free speach"). The software designed by us will target various fields: from scientific applications to multimedia an
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Execution monitor for Java Applications.<br/> BERSERK implements the Intercepting Filter design pattern. <br/> Allows composing and runtime editing of execution flow and intercept services with access control, logging or any user-defined filters.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB