Showing 16 open source projects for "clone"

View related business solutions
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • Total Network Visibility for Network Engineers and IT Managers Icon
    Total Network Visibility for Network Engineers and IT Managers

    Network monitoring and troubleshooting is hard. TotalView makes it easy.

    This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
    Learn More
  • 1
    SoftEther VPN

    SoftEther VPN

    Cross-platform multi-protocol VPN software

    ...SoftEther VPN ("SoftEther" means "Software Ethernet") is one of the world's most powerful and easy-to-use multi-protocol VPN software. It runs on Windows, Linux, Mac, FreeBSD and Solaris. SoftEther VPN is an optimum alternative to OpenVPN and Microsoft's VPN servers. SoftEther VPN has a clone-function of OpenVPN Server. You can integrate from OpenVPN to SoftEther VPN smoothly. SoftEther VPN is faster than OpenVPN. SoftEther VPN also supports Microsoft SSTP VPN for Windows Vista / 7 / 8. No more need to pay expensive charges for Windows Server license for Remote-Access VPN function.
    Downloads: 113 This Week
    Last Update:
    See Project
  • 2
    ConsoleMe

    ConsoleMe

    A central control plane for AWS permissions and access

    ...Cross-account resource policies will be automatically generated and can be applied with a single click for certain resource types. Weep (ConsoleMe’s CLI) supports 5 different ways of serving AWS credentials locally. Cloud administrators can create/clone IAM roles and natively manage IAM roles, users, inline/managed policies, S3 Buckets, SQS queues, and SNS topics across hundreds of accounts in a single interface. Users can access most of your cloud resources in the AWS Console with a single click. Cloud administrators can configure ConsoleMe to authenticate users through ALB Authentication, OIDC/OAuth2, or SAML.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Chronograf

    Chronograf

    Open source monitoring and visualization UI for the TICK stack

    ...Chronograf offers a complete dashboarding solution for visualizing your data. Over 20 pre-canned dashboards are available to allow you to get started very quickly. You can easily clone one of this pre-canned dashboard to create customized dashboards or build them from scratch — either way, you can build the perfect dashboard to fulfill your visualization needs! Chronograf is the administrative tool for all your InfluxData deployments, the open source instances of InfluxData as well as InfluxDB Enterprise and InfluxDB Cloud instances.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    WordPress Hardened

    WordPress Hardened

    Secure and performant Wordpress installation on Kubernetes cluster

    ...You can skip installation wizard by installing WordPress on container startup. This container uses wp-cli to install WordPress and plugins allowing you to prepare a fully automated website. git-clone-controller is a Kubernetes controller allowing to clone a GIT repository before a Pod is launched, can be used to automatically fetch your website theme within just few seconds before Pod starts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Run applications fast and securely in a fully managed environment Icon
    Run applications fast and securely in a fully managed environment

    Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.

    Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
    Try for free
  • 5
    ReconSpider

    ReconSpider

    Most Advanced Open Source Intelligence (OSINT) Framework

    ReconSpider is most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Addresses, Emails, Websites, and Organizations and find out information from different sources. ReconSpider can be used by Infosec Researchers, Penetration Testers, Bug Hunters, and Cyber Crime Investigators to find deep information about their target. ReconSpider aggregate all the raw data, visualize it on a dashboard, and facilitate alerting and monitoring on the data. Recon Spider also combines the...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 6
    PyExfil

    PyExfil

    A Python Package for Data Exfiltration

    ...Although most techniques and methods should be easily ported and compiled to various operating systems, some stable some experimental, the transmission mechanism should be stable on all techniques. Clone it, deploy on a node in your organization and see which systems can catch which techniques.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Xorin

    Xorin

    Xorin data erase & clone software

    Xorin is a secure drive erase program that provides the perfect solution to anyone who wants to secure their private data before selling or utilization their PC or drive storage. Xorin is also good in all situations where you want to ensure that deleted data stays deleted and that it can never be recovered. Xorin operates from its own Linux-based bootable environment, Linux or Windows operation system. Xorin supports all popular security methods and standards including DoD...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Scrollout F1

    Scrollout F1

    An easy-to-use anti-spam email gateway

    • Designed for Linux and Windows email system administrators, Scrollout F1 is an easy to use, already adjusted email firewall (gateway) offering free anti-spam and anti-virus protection aiming to secure existing email servers, old or new, such as Microsoft Exchange, Lotus Domino, Postfix, Exim, Sendmail, Qmail and others. • Built-in multilayer security levels make configuration effort equal to a car radio. • It combines simplicity with effective protection using powerful open source...
    Leader badge
    Downloads: 105,392 This Week
    Last Update:
    See Project
  • 9
    Flashbang

    Flashbang

    Project "Flashbang" - An open-source Flash-security helper

    ...It works in modern browsers via HTML/JS, can also be run locally, and does not upload SWFs to servers (processing stays local). It is still considered alpha quality. Clone the repo using the --recursive flag, so that all necessary submodules are cloned as well. Ideally, clone it into an Apache web-root (or any other web server). Prepare the environment for Shumway to work properly.
    Downloads: 5 This Week
    Last Update:
    See Project
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 10
    Stealth VM For Ubuntu & All Derivatives

    Stealth VM For Ubuntu & All Derivatives

    Run Windows XP & 7 Virus Free Inside Ubuntu & All Derivatives

    ...Stealth VM Software has solved your Windows to Linux migration dilemma already! You don't need to worry about viruses or malware infecting Windows & its data because Stealth VM Software invented by Robolinux keeps a protected clone of Windows and mirrors your data in a secure Ubuntu Linux partition.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 11
    Stealth VM For Linux Mint

    Stealth VM For Linux Mint

    Run Windows XP & 7 Virus Free Inside Linux Mint

    ...Stealth VM has solved your Windows to Linux migration dilemma already! You don't need to worry about viruses or malware infecting Windows & its data because the Stealth VM Software invented by Robolinux keeps a protected clone of Windows and mirrors your data in a secure Linux Mint partition.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12

    RDonasco Security

    A security application that can be used as a shared service

    For full details of this application, please visit https://bitbucket.org/rdonasco/rdonasco-lib/wiki/Home The source codes for this project can be downloaded by cloning its repository which uses mercurial. ** Use the following clone command: ** hg clone https://bitbucket.org/rdonasco/rdonasco-lib
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    SPyMap Portscanner

    A python based portscanner, using scapy

    A portscanner written in python, using the scapy libraries. Originally intended to be a clone of Nmap, it is growing into its own creation, intended to be a part of a much larger project later on.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    myPGP is an experimental PGP clone. It can be used to encrypt, decrypt and sign messages in a public key system, as well as to manage the keyrings. It's main goal is to fully implement the standard OpenPGP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Md5some aims to be a clone of the Gnu md5sum utility, which the additional (and seemingly unique) feature of being able to directly calculate the md5sum of a CD under Windows. It's written in C and builds on Gnu/Linux and Cygwin/Windows.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 16
    GAIM encryption plugin using GPG (PGP clone). It works transparently and smoothly. Automatically establishes secure conversations with other enabled users, passes keys (if enabled) and eventually will allow you to specify your own keys to use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next