Showing 14 open source projects for "order"

View related business solutions
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 1
    EMAGNET

    EMAGNET

    Automated hacking tool to find leaked databases with 97.1% accuracy

    Automated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password. Before using Emagnet, please remember that with great power comes great responsibility. Pastebin patched the vulnerability I previously used in order to get recent uploads, so at the moment it is not possible to get recently uploaded files, you are now limited to all syntaxes exempt the default one (95% get's uploaded as 'text' and this is removed from all recent upload lists). Bruteforce support for Spotify accounts, Instagram accounts, ssh servers, Microsoft RDP clients and Gmail accounts. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 2
    multiOTP open source

    multiOTP open source

    PHP strong authentication library, web interface & CLI, OATH certified

    multiOTP is a PHP class, a powerful command line utility and a web interface developed by SysCo systèmes de communication sa in order to provide a completely free and easy operating system independent server side implementation for strong two factors authentication solution. multiOTP supports hardware and software tokens with different One-Time Password algorithms like OATH/HOTP, OATH/TOTP and mOTP (Mobile-OTP). QRcode generation is also embedded in order to support provisioning of Google Authenticator software tokens. ...
    Leader badge
    Downloads: 13 This Week
    Last Update:
    See Project
  • 3
    Naeon

    Naeon

    The safest way to store private data in untrusted (cloud) environments

    ...The payload is then sharded into one private chunk — holding the encryption key and part of the data — and multiple equal-sized public chunks, each renamed to its SHA-512 hash and given a uniform timestamp to prevent metadata inference. A private filename conversion table preserves the concatenation order needed for restoration. Together these measures guarantee confidentiality, integrity, and availability regardless of storage provider trustworthiness. Threshold Key Sharing extends this further by splitting the private key, eliminating the single point of failure.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    CSRmanage

    CSRmanage

    Centralized vetting and records of Certificate Signing Requests (CSRs)

    CSRmanage is an application that can be used to validate CSRs (Certificate Signing Requests) and store them along with anciliary information about the personnel involved with CSRs and certificate installations and approvals. CSR evaluation is configurable/very strict. With adequate configuration, CSRmanage may save organizations time and money by ensuring that CSRs to be submitted are formatted corrrectly and conform to organizational network/I.T/DNS naming conventions. It can also...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 5
    Docker Bench For Security

    Docker Bench For Security

    A script that checks for dozens of common best-practices around Docker

    The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production. The tests are all automated, and are based on the CIS Docker Benchmark v1.3.1. We are making this available as an open-source utility so the Docker community can have an easy way to self-assess their hosts and docker containers against this benchmark. We packaged docker bench as a small container for your convenience. Note that this container is being...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    [LINUX] Pwnagotchi Connection Share

    [LINUX] Pwnagotchi Connection Share

    Simple bash script for connection sharing.

    ...You have to run this script every time you connect your Pwnagotchi to your PC and want to share your internet connection. Useful for let the gotchi able to upload handshakes to online cracking services like OnlineHashCrack. HOW TO USE: In order to make that script working you need to follow the commented instructions inside code. For more info: https://pwnagotchi.ai/configuration/#connecting-to-pi0w-with-microusb-cable-on-linux-host *designed for pwnagotchi but works on any raspberry. Telegram: @xNigredo Pwnagotchi Italia: https://t.me/pwnagotchiitalia
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Mpge

    Mpge

    Mpge

    Mpge is a wrapper of meterpreter (msfconsole, msfpayload and msfencode) of Metasploit Framework directly integrated with Mac OS X Snow Leopard 10.6.8 and with OS X Mavericks 10.9. With Mpge is possible make trojan horse files for Microsoft Windows, Linux and Mac OS X 10.3 Panther, OS X 10.4 Tiger, OS X 10.5 Leopard and OS X Montain Lion 10.8.1 for all Mac OS X is possible make a trojan horse files contains a reverse shell into files .pkg and files .app. I used three real Mac OS X: Attacker:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    HexaFind

    HexaFind

    HexaFind - The Unix & Linux network attack tool detection project.

    The continued and growing trend of the frequency and severity of network attacks against corporations, private individuals in addition to countries has prompted the development of network attack detection tools. In order to defend against threats – security is not only required in a pre-emptive scenario, but also ex post facto; whereby the criminal/ civil act has been detected and the acquisition of evidence has begun in order to provide a conviction. This project and its scripted application have been created in response to these escalating movements towards network vulnerability enumeration and distributed denial of service attacks (DDoS). ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    thad0ctor's Backtrack 5 toolkit

    thad0ctor's Backtrack 5 toolkit

    thad0ctor's BT5 toolkit streamlines word list creation and other tasks

    ...The script is constantly updated with multiple revisions to include new cutting edge features and improvements in order to provide full spectrum wordlist creation capabilities.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 10
    BPass Manager

    BPass Manager

    Simple Bash password manager using GPG and SQLite

    Bash Password Manager (BPass) is a shell script that create a SQLite database in which you can store your passwords with the maximum security! In fact it uses GPG (or GPG+OpenSSL) to encrypt and decrypt your database. Now i'm developing the version 2.0 of this script and it will take me some times because i'm busy with my study! Please note that this project is in beta version so please use it only for testing purpose! I've tested this script on: - Ubuntu 11.10 x32/x64 - Ubuntu 12.04...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    An open, all-in-one SMTP gateway, scanning your email traffic in order to prevent spam and viruses, using several anti-spam technologies. Based on Ubuntu Server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Project Naranja will uses Padlock Security of VIA EPIA mini-ITX motherboards in order to provide a toolkit to set up and use encrypted filesystems with Linux. NOTE: Files are now hosted at Google Code: http://code.google.com/p/naranja/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Getwifi allows Linux users to join wireless networks easily by joining available networks in an order specified by the user. Getwifi is configured using a single file which specifies networks, optional WEP keys, and the order in which to join networks.
    Leader badge
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    A shell script which determines by brute force the best compression format (bzip2, gzip, Z, zip, etc.) and which compression level to use in order to archive a file the smallest possible.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB