Showing 23 open source projects for "cpp set up"

View related business solutions
  • 99.99% Uptime for Your Most Critical Databases Icon
    99.99% Uptime for Your Most Critical Databases

    Sub-second maintenance. 2x read/write performance. Built-in vector search for AI apps.

    Cloud SQL Enterprise Plus delivers near-zero downtime with 35 days of point-in-time recovery. Supports MySQL, PostgreSQL, and SQL Server.
    Try Free
  • $300 in Free Credit Across 150+ Cloud Services Icon
    $300 in Free Credit Across 150+ Cloud Services

    VMs, containers, AI, databases, storage | build anything. No commitment to start.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale with Google Cloud.
    Start Building Free
  • 1
    UFW Docker

    UFW Docker

    To fix the Docker and UFW security flaw without disabling iptables

    UFW is a popular iptables front end on Ubuntu that makes it easy to manage firewall rules. But when Docker is installed, Docker bypasses the UFW rules and the published ports can be accessed from outside. Almost all of these solutions are similar. It requires disabling docker's iptables function first, but this also means that we give up docker's network management function. This causes containers will not be able to access the external network. It is also mentioned in some articles that you...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    AWS IAM Authenticator for Kubernetes

    AWS IAM Authenticator for Kubernetes

    Tool to use AWS IAM credentials to authenticate to Kubernetes clusters

    A tool to use AWS IAM credentials to authenticate to a Kubernetes cluster. A tool to use AWS IAM credentials to authenticate to a Kubernetes cluster. The initial work on this tool was driven by Heptio. The project receives contributions from multiple community engineers and is currently maintained by Heptio and Amazon EKS OSS Engineers. If you are an administrator running a Kubernetes cluster on AWS, you already need to manage AWS IAM credentials to provision and update the cluster. By using...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3
    Proxyman

    Proxyman

    Web Debugging Proxy for macOS, iOS, and Android

    ...With Proxyman's native macOS app, you can capture, inspect, and manipulate HTTP(s) traffic with ease. Intuitive, thoughtful, built with meticulous attention to detail. Comprehensive Guideline to set up with iOS simulator and iOS and Android devices. Proxyman acts as a man-in-the-middle server that capture the traffic between your applications and SSL Web Server. With built-in macOS setup, so you can inspect your HTTP/HTTPS Request and Responses in plain text with just one click. Narrow down your search with Proxyman's Multiple Filters. ...
    Downloads: 12 This Week
    Last Update:
    See Project
  • 4
    passff

    passff

    zx2c4 pass manager extension for Firefox, Chrome and Opera

    zx2c4 pass management extension for Mozilla Firefox. Pending Chrome port. Official signed version can be found on the Mozilla add-on page. This extension will allow you to access your zx2c4 pass repository directly from your web browser. You can choose to automatically fill and submit login forms if a matching password entry is found. Add-on that allows users of the unix password manager 'pass' to access their password store from Firefox. PassFF allows users of the unix password manager pass...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go From Idea to Deployed AI App Fast Icon
    Go From Idea to Deployed AI App Fast

    One platform to build, fine-tune, and deploy. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 5
    Oso

    Oso

    Oso is a batteries-included framework for building authorization

    The Oso Library is a batteries-included framework for building authorization in your application. With Oso, you can. Model: Set up common permissions patterns like RBAC and relationships using Oso’s built-in primitives. Extend them however you need with Oso’s declarative policy language, Polar. Filter: Go beyond yes/no authorization questions. Implement authorization over collections too - e.g., “Show me only the records that Juno can see.” Test: Write unit tests over your authorization logic now that you have a single interface for it. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    wolfSSL
    The wolfSSL embedded SSL library (formerly CyaSSL) is a lightweight, portable, C-language-based SSL/TLS library targeted at IoT, embedded, and RTOS environments primarily because of its size, speed, and feature set. It works seamlessly in desktop, enterprise, and cloud environments as well. wolfSSL supports industry standards up to the current TLS 1.2 and DTLS 1.2, is up to 20 times smaller than OpenSSL, offers a simple API, an OpenSSL compatibility layer, OCSP and CRL support, is backed by the robust wolfCrypt cryptography library, and much more. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 7
    Metlo

    Metlo

    Metlo is an open-source API security platform

    Metlo is an open source API security tool you can set up in < 15 minutes that inventories your endpoints, detects bad actors, and blocks malicious traffic in real time. Metlo passively listens to your API traffic and tags every malicous request. Our models are built on patterns of malicous requests to detect bad actors and API attacks.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    SecretManager

    SecretManager

    FR : Outil de partage des mots de passe, EN : Sharing tool passwords

    * SecretManager V2 started. *New design and new features ************************************ This tool allows you to store (AES 256) and share passwords. Passwords are placed in groups. Groups are associated with user profiles. Finally, we associate user porfiles with users. So users have access to passwords for which they are authorized. In addition, it is possible to supervise the access to secrets (alarm and all access).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Gophish

    Gophish

    Open-Source Phishing Framework

    Gophish is a powerful open-source phishing toolkit that makes it easy to test an organization’s exposure to phishing. Designed for businesses and penetration testers, Gophish lets you quickly and easily set up and launch phishing campaigns, track results and set up security awareness training. Gophish works on most platforms, including Windows, Mac OS X and Linux.
    Downloads: 48 This Week
    Last Update:
    See Project
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 10
    Atricore’s JOSSO is an open source and commercially supported Internet Single Sign-On (FSSO) solution for point-and-click and standards-based (SAML2) Internet-scale SSO implementations. For more information contact us at : http://www.josso.org
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Tamper Dev

    Tamper Dev

    Extension that allows you to intercept and edit HTTP/HTTPS requests

    ...This extension provides functionality similar to Burp Proxy, MITM Proxy, OWASP ZAP, Tamper Data, and Postman Proxy, but without the need of additional software, with full support of HTTPS connections, and trivial to set-up (just install).
    Downloads: 28 This Week
    Last Update:
    See Project
  • 12
    DevHub

    DevHub

    Filter issues, activities and notifications

    ...Create columns for the repositories and people that matters to you; receive desktop push notifications; manage notifications, issues, pull requests and activities; bookmark things for later. Choose between two modes, desktop or menubar; enable push notifications only for the columns you want. All columns support a common set of filters, like bot, label, issue status, text, etc. The Issues & Pull Requests columns are special: they give you all the power of GitHub Advanced Search on your hands (filter by assignee, number of comments, etc. Create a column for each person and see what they are up to commits, comments, issues, pull requests, tags, releases, etc.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13

    GentleGPG II

    PGP encrypt/decrypt data with easy drag and drop data handling.

    ...GentleGPG II makes encrypting and decrypting your email (or any other) messages easy by enabling you to drag a cursor to Retreive the data you wish to decrypt from another program's window, such as an email client. You can also drag a cursor to Send encrypted data from GentleGPG II to another program. GentleGPG II is very easy to set up, automatically creating your public/secret key. Instructional video: http://youtu.be/cP8kCd8wdZc See Wiki for changes between GentleGPG and GentleGPG II.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Evilgrade

    Evilgrade

    Framework that allows the user to take advantage of implementations

    Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates. It comes with pre-made binaries (agents), a working default configuration for fast pentests, and has it's own WebServer and DNSServer modules. Easy to set up new settings, and has an autoconfiguration when new binary agents are set. Evilgrade works with modules, in each module there's an implemented structure which is needed to emulate a fake update for an specific application/system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    react-native-login

    react-native-login

    An example React Native project for client login authentication

    ...While not a full production app, it provides sufficient structure for mobile developers to learn the foundation of login/registration, token handling, and basic navigation after login. The repository is aimed at developers who already know React or React Native and want to see how authentication can be set up cleanly. It complements discussions and blog posts around mobile login flows and best practices in token-based mobile setups.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Vulnerawa
    ...To know more about Vulnerawa, go here https://www.hackercoolmagazine.com/vulnerawa-vulnerable-web-app-for-practice/ See how to setup Vulnerawa in Wamp server. https://www.hackercoolmagazine.com/how-to-setup-vulnerawa-in-wamp-server/ To see how to set up a web app pen testing lab with Vulnerawa. https://www.hackercoolmagazine.com/how-to-create-a-web-application-pentest-lab/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    An Open Source Knowledge Base System

    An open source, web based, platform independent knowledge base system.

    Free open source knowledge base software. Extensively search-able, Versatile and easy to use. easy to set up and administer. Comment hover links let you read in an AJAX generated hover window, the comments to an article in the main list view without having to go to the comments page. Password protected user accounts, and group support, with read only guest user, full control admin, power user/moderator, and default data entry user with restricted privileges.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Limiter (botnet & overload protection)

    Simple web protection against botnet attack

    If your web is attacked by botnet, you can include this script into it and prevent server crash. Just set up a number of allowed approaches and controled time. (for ex. 1000 users/1 min) If there were connected 1001 users in 1 minute, web will be shuted down by generated htaccess file. There is a second file(you should execute it with cron) to automaticly remove htaccess file if there will be less than 1001 users per minute. You can add in htaccess generator your public IP address, or address of the server to leave open access.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    SimpleSiteAudit Multisite

    SimpleSiteAudit Multisite

    Detect file changes on remote web sites

    Combat the hackers with ‘Simple Site Audit Multisite’ website protection. With SSAM installed, you will be notified by email of any file changes that occur on your monitored sites. SSAM will detect files that have been added, removed or modified and if file permissions are changed. You will be able to automatically monitor all your sites from one ‘Master’ web site. Your sites can be monitored for hacker activity without any detectable monitoring system on the sites themselves. The...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    PFL can either operate as a stand-alone firewall log parser or set up to run and configure ipfw. The major focus is parsing, compressing, and filtering *NIX (to include Mac OSX) firewall logs generated by IPFW for quick and easy admin review.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    EasyVote is a new easy to use, secure and transparent cryptographic online voting scheme for small elections (up to 500 voters). The project contains the PHP files necessary to set up the server as well as the management tools.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    The Bro Re-usable Architecture (BRA) is a project by Christopher Jay Manders that will allow one, with minimal effort, to set up a working Bro (real-time intrusion detection) environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    A Java Swing application to 'securely' store passwords using symmetric encryption. A user can set up one or many 'datastores' of password/username combinations and commit them to disk. They are stored on the file system using PBE Blowfish.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB