Showing 100 open source projects for "ref-n-write"

View related business solutions
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • Application Monitoring That Won't Slow Your App Down Icon
    Application Monitoring That Won't Slow Your App Down

    AppSignal's Rust-based agent is lightweight and stable. Already running in thousands of production apps.

    Full APM with errors, performance, logs, and uptime monitoring. 99.999% uptime SLA on the platform itself.
    Start Free
  • 1
    RufasSlider

    RufasSlider

    Klotsky class block slider puzzles.

    RufaSlider is a collection of 16 different block slider puzzles for kids and casual puzzlers that works on laptops and PCs running Windows, OSX or GNU/Linux. It includes a Klotski-style family, a DirtyDozen family, and a Traffic-Rush family. And now these puzzle families come with AutoSolvers to help you. The Klotski family uses rectangles of 4 sizes: 1x1, 2x2, 1x2, 2x1. The objective in each game is stated near the window top, but usually involves moving a large block to a specified...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Oso

    Oso

    Oso is a batteries-included framework for building authorization

    ...Extend them however you need with Oso’s declarative policy language, Polar. Filter: Go beyond yes/no authorization questions. Implement authorization over collections too - e.g., “Show me only the records that Juno can see.” Test: Write unit tests over your authorization logic now that you have a single interface for it. Use the debugger or tracing to track down unexpected behavior. Oso lets you write policies to control who can do what in your app. Select different policies below to see how they change the permissions in the sample app on the right. Oso's language libraries can be developed without touching the Rust core, but you will still need the Rust stable toolchain installed in order to build the core.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    GmSSL

    GmSSL

    Password toolbox that supports national secret

    ...National secret algorithm and SSL protocol are embedded in existing projects. The default CMake build system can be easily used with default compilation tools such as Visual Studio and Android NDK. Developers can also manually write Makefiles to compile in special environments, tailoring.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    AWS Jupyter Proxy

    AWS Jupyter Proxy

    Jupyter server extension to proxy requests with AWS SigV4 authentican

    A Jupyter server extension to proxy requests with AWS SigV4 authentication. This server extension enables the usage of the AWS JavaScript/TypeScript SDK to write Jupyter frontend extensions without having to export AWS credentials to the browser. A single /awsproxy endpoint is added on the Jupyter server which receives incoming requests from the browser, uses the credentials on the server to add SigV4 authentication to the request, and then proxies the request to the actual AWS service endpoint. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 5
    Openblocks

    Openblocks

    The Open Source Retool Alternative

    It's cumbersome to create a single app. You had to design user interfaces, write code in multiple languages and frameworks, and understand how all of that code works together. Low-code/No-code platforms are fast to get started with but quickly become unmaintainable and inflexible. This creates more problems than it solves. Retool-like solutions are great for their simplicity and flexibility, but they can also be limited in different ways compared to frameworks like React/Vue.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    jsPolicy

    jsPolicy

    Easier & faster Kubernetes policies using JavaScript or TypeScript

    ...Run custom JavaScript controllers that react to any changes to the objects in your cluster (controller policies are reactive, so they are not webhooks and part of a Kubernetes API server request but instead react to Events in your cluster after they have happened). With controller policies you can write resource sync mechanisms, enforce objects in namespaces, garbage collectors or fully functional CRD controllers. Create a functional webhook with a single line of JavaScript or write your own fully blown custom StatefulSet controller in TypeScript with jsPolicy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Shield GraphQL

    Shield GraphQL

    A GraphQL tool to ease the creation of permission layer

    GraphQL Shield helps you create a permission layer for your application. Using an intuitive rule-API, you'll gain the power of the shield engine on every request and reduce the load time of every request with smart caching. This way you can make sure your application will remain quick, and no internal data will be exposed. Implement your server permissions in a clear and deterministic way and let it guard access to your schema. Shield lets you create a handful of rules and compose them into...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Blackbone

    Blackbone

    Windows memory hacking library

    Blackbone is a powerful Windows-focused memory manipulation and process interaction library intended for developers needing deep access to system internals, reverse engineering, or dynamic analysis tools. It provides a comprehensive API in C++ that allows allocation and management of virtual memory in local and remote processes, reading and writing remote process memory, enumerating loaded modules, creating and controlling threads, and performing complex pattern searches—all with support for...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    HiddenWall

    HiddenWall

    hidden firewall, custom firewall in kernel

    ...My beginning purpose at this project is protect my personal server, now is protect the machines of my friends. When i talk "friends", i say peoples that don't know how to write low level code. Using the HiddenWall you can generate your custom kernel module for your firewall configuration. The low level programmer can write new templates for modules etc...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 10
    Portable Apps For Dummies

    Portable Apps For Dummies

    Portable applications development. Makers, creators etc.

    Our site is created to collect in one place information about portable app development. We hope that people who need this information will find it on our site. We are not limited to one method of creating portable applications, we want to write about them all. If you know the methods that we don't have, let us know about them. And we will inform about them our visitors.
    Leader badge
    Downloads: 136 This Week
    Last Update:
    See Project
  • 11
    ThinkTs

    ThinkTs

    Based on koa and typeorm,asynchronous non blocking reactive coding

    Based on koa and Typeform, asynchronous nonblocking reactive coding, and a real MVC web framework, inspired by [ThinkPHP + Nestjs + FastAPI], it is also the fastest development speed and fastest performance.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    MyDiary1000

    MyDiary1000

    Its A Diary/TextEditor that encrypts your text data using images

    This is a diary that allows you to digitally write entries and view them. What makes this a masterpiece from its counterparts is how user data is created and abstracted. User data is protected and stored in PNG images, the image it self is not encrypted but the data inside the image is encrypted. If you open any one of the created PNG images, they look like blank images!. These "normal" looking images protect your information from prying eyes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Windows Defender Central v0.5

    Windows Defender Central v0.5

    Windows Defender Central

    ...It uses PowerShell and SysInternalsSuite(PsExec.exe) to gather the information and it stores the data in a shared network drive (what the computers can access and have write access). It can store the data locally, if needed. What are the "computer name" background colors? -White: idle -Green: querying state -Pink: any other action besides querying -Red: one or more protections are disabled It can't show color on the highlighted row... What is planned? -to see the quarantine -delete from quarantine -whitelist from quarantine What else?
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    CKK Encryption

    Fast and unbreakable encryption

    ...We then take those values and combine with individual 8bit ASCII values of the password/pass phrase. We loop thru the file combining 1 byte with 1 byte from "password phrase" in a continuous loop. We then write all odd results then even results to a file, array or string "your choice". I'm not a mathematician "not even sure what they are" but I think the results equal n exp 256 + n exp 256 + n exp 256 * n exp 2,147,483,647. Again, not a mathematician. This project was written using VS 2019 Community Edition. C# .NET Framework 4.7.2 I have included a sample program or change the source to fit your needs. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Simple Cipher Algorithm

    Simple Cipher Algorithm

    Java Encryption Utility.

    Very simple to use symmetric Java encryption utility. Please write a review. Email me with any questions or problems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Parsley

    Parsley

    Validate your forms, frontend, without writing a line of javascript

    Parsley, the ultimate JavaScript form validation library. Validating forms frontend have never been so powerful and easy. Like no other form validation library, simply write in English your requirements inside your form HTML tags, Parsley will do the rest! No need to write even a single JavaScript line for simple form validation. Parsley is now smarter, it automatically detects your forms' modifications and adapts its validation accordingly. Simply add, remove or edit fields, Parsley validation will follow! ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    A USLESS KEYLOGGER |MZL

    A USLESS KEYLOGGER |MZL

    A keylogger that save your data with yourself and works

    A keylogger that save your data with yourself and works as backup of every text you write
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    GORSK

    GORSK

    Idiomatic Golang Restful Starter Kit

    There are many ways to write a (RESTful) backend in Go. Most of the available tutorials are way too simple, with all the presented content fitting into a single file (or at most two-three). More complex examples are quite rare, and even most of them miss lots of things for the sake of reducing complexity. That’s one of the reasons I wrote Gorsk - to have a fully functional example of a RESTful backend (in Golang) utilizing best practices, idiomatic code, and minimal dependencies. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    dotNet Disk Imager

    dotNet Disk Imager

    Lightweight RAW and ZIP disk images reader and writer to USB or SD

    ...LinkId=671729 ) Supports Windows 7 and newer. If you need older Windows support, use Win32 Disk Imager. Please write a review.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 20

    JKeyLogger

    Java Key Logger

    Java-written keylogger. Can write you key presses/releases to file. Writes in format: 'hour-minute-second: [KEY-PRESS/KEY-RELEASE] keycode (char)'
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    rlink

    ssh-tunnel instead vpn in one exe

    Create ssh-tunnel, run another programm and store settings in self. It is easier than to create a vpn and write instructions for the users.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Utilities
    ...We DON'T SEE you because it's a generator, be quiet!!! Do you want to measure the time of something? We have the running chronometer! Do you have to remember to do something at some time and you don't know where to write it? We have the reminder in which you write the time and in the event section describing what you have to do then start it and you can also leave it in the background until the notification arrives! WARNING,SOFTWARE IS VERSION 1.0,IF YOU HAVE ANSWERED PROBLEMS CONTACTUS
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    OMEN

    OMEN

    OMEN: Ordered Markov ENumerator - Password Guesser

    ...If you are interested in the details on how OMEN improves on existing Markov model-based password guessing approaches, please refer to OMEN: Faster Password Guessing Using an Ordered Markov Enumerator. OMEN consists of two separate program modules: createNG and enumNG. createNG calculates n-gram probabilities based on a given list of passwords and stores them on the hard disk. Based on these probabilities enumNG enumerates new passwords in the correct order (descending). Before one can generate any passwords, the n-gram probabilities have to be estimated using createNG. To calculate the probabilities using the default settings, createNG must be called giving a path to a password list that should be trained.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 24
    Advanced Onion Router
    Advanced Onion Router is a portable client for the OR network and is intended to be an improved alternative for Tor+Vidalia+Privoxy bundle for Windows users. Some of the improvements include UNICODE paths, support for HTTP and HTTPS proxy protocols on the same Socks4/Socks5 port with HTTP header filtering that generates fake identity-dependent headers every time the identity is changed (proxy chains are also supported), support for NTLM proxies, a User Interface that makes Tor's options and...
    Downloads: 123 This Week
    Last Update:
    See Project
  • 25
    Public Intelligence Tool

    Public Intelligence Tool

    Simple Portable Web Browser for Open Source Intelligence

    ...I will be hopefully trying to update this tool weekly with new links and information, making new improvements. I Have the discussions open if you want to add anything new or feel something should change just write it and il research it and add it in. Please use the tool responsibly and give credit where credit is due. This tool is not for criminal uses, it is only for Official use with proper permissions. I do not own any links in here. Be Awesome with a 100% Free Donation :D - http://adf.ly/4228472/free-donation !Contains Ads! ...
    Downloads: 3 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB