Showing 680 open source projects for "python-dateutil"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Context for your AI agents Icon
    Context for your AI agents

    Crawl websites, sync to vector databases, and power RAG applications. Pre-built integrations for LLM pipelines and AI assistants.

    Build data pipelines that feed your AI models and agents without managing infrastructure. Crawl any website, transform content, and push directly to your preferred vector store. Use 10,000+ tools for RAG applications, AI assistants, and real-time knowledge bases. Monitor site changes, trigger workflows on new data, and keep your AIs fed with fresh, structured information. Cloud-native, API-first, and free to start until you need to scale.
    Try for free
  • 1
    ExploitMyUnion
    ExploitMyUnion is a tool written in Python with a PyQt user interface made to automate sql injection exploitation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    The Simple Ubuntu Vulnerability Scanner lets you check an Ubuntu system for vulnerabilities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    PythonSafe's goal is to produce an easy-to-use password manager, to store all your security data with only a single password to remember. PythonSafe will be developed with multiple front ends and will run on multiple platforms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Cia project tries to develop an all-purpose security tool. It's composed by ctools, the security tool; cfs, the app and cfs-server, a file & key server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place. Icon
    Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place.

    For healthcare Providers and Facilities

    Incredable streamlines and simplifies the complex process of medical credentialing for hospitals and medical facilities, helping you save valuable time, reduce costs, and minimize risks. With Incredable, you can effortlessly manage all your healthcare providers and their credentials within a single, unified platform. Our state-of-the-art technology ensures top-notch data security, giving you peace of mind.
    Learn More
  • 5
    Virtual NetManager WAS a GTK frontend for VDE and QEMU. This project has been recently merged with Qemulator, and became Check the home page for the new project!!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Honeypots for servers, VoIP, social networks and web applications
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    A MD5/SHA1/SHA-256 hasher written in wxPython 2.8 and python
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    WSFuzzer
    WSFuzzer is a fuzzing penetration testing tool used against HTTP SOAP based web services. It tests numerous aspects (input validation, XML Parser, etc) of the SOAP target. It is only to be used against targets that have granted permission to be teste
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    BlindElephant
    A generic web application fingerprinter that produces results by examining a small set of static files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-First Supply Chain Management Icon
    AI-First Supply Chain Management

    Supply chain managers, executives, and businesses seeking AI-powered solutions to optimize planning, operations, and decision-making across the supply

    Logility is a market-leading provider of AI-first supply chain management solutions engineered to help organizations build sustainable digital supply chains that improve people’s lives and the world we live in. The company’s approach is designed to reimagine supply chain planning by shifting away from traditional “what happened” processes to an AI-driven strategy that combines the power of humans and machines to predict and be ready for what’s coming. Logility’s fully integrated, end-to-end platform helps clients know faster, turn uncertainty into opportunity, and transform the supply chain from a cost center to an engine for growth.
    Learn More
  • 10
    Automatise l'utilisation des suites iw et airckrack-ng...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Squid redirector written in python implements a dynamic whitelisting scheme. Users add new websites to the whitelist via a webform, which is user-friendly and sysadmin-friendly, but mitigates compromise and data exfiltration over the web.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    RABBIT Vulnerability Scanner
    RABBIT is a black-box vulnerability scanner framework. Designed to make it easy to program your own plugins in order to satisfy your scanning needs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    yaSSL, or yet another SSL, is an embedded ssl library for programmers building security functionality into their applications and devices. yaSSL is highly portable, and runs on standard as well as embedded platforms(QNX, ThreadX, VxWorks, Tron) yaSSL is still available but no longer being developed. Current development on the same project continues under wolfSSL. Visit yaSSL Home above for the latest stable release.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    voidssh
    ssh bruteforce authentification with multiprocessing, string generator and dictionary attack
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    This is a simple encryption tool to work with home-grown encryption algorithms. It can run as either a GUI, a command-line application, or a network proxy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Python module for secure file erase as the DoD 5220.22-M standard
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    APG UI is a simple GTK+ GUI for the "Automated password generator"
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Honey IRC Drone is an IRC bot/drone (written in python) that sits on a botnet's IRC command and control server. The purpose is to simulate an actual bot from the botnet and monitor activities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    RSA Public Cryptosystem in Python
    RSA Public cryptosystem with efficient scaling with big prime numbers and thus secure keys..
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    This project automates the reporting of improper Internet use by the X-ARF format. The two schemas specified abuse_login-attack and abuse_malware are currently implemented. Fixing a Bug and the Date / Timestamp issues. Now it should work fine :)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    A wardriver for the Linux Operating System specifically written in Python to work with Garmin devices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Kadna is a small curses program written in Python that creates a secure and synchronizable database. This is intended for distributed password and small file (e.g. cryptographic keys) storage. This project in not longer maintained.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Flexible password manager, with focus on quick and easy creation and retrieval of passwords, and simple extensibility.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    A pure python module which implements the DES and Triple-DES encryption algorithms. Triple DES is either DES-EDE3 with a 24 byte key, or DES-EDE2 with a 16 byte key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    DWIP is short for Disk Wiping and Imaging Tool. This tool is being built for Mississippi State Universities National Forensics Training Center for use on a live cd to give out to it's students.
    Downloads: 0 This Week
    Last Update:
    See Project