Showing 37 open source projects for "clear"

View related business solutions
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 1
    Vault

    Vault

    Tool for secrets management and encryption as a service

    ...The shift from static, on-premise infrastructure to dynamic, multi-provider infrastructure changes the approach to security. Security in static infrastructure relies on dedicated servers, static IP addresses, and a clear network perimeter. Security in dynamic infrastructure is defined by ephemeral applications and servers, trusted sources of user and application identity, and software-based encryption. Datacenters with inherently high-trust networks with clear network perimeters. Multiple clouds and private datacenters without a clear network perimeter. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    Merlin HTTP/2

    Merlin HTTP/2

    Merlin is a cross-platform post-exploitation HTTP/2 Command

    Merlin is a cross-platform post-exploitation Command & Control server and agent written in Go. The Merlin server is a self-contained command line program that requires no installation. You just simply download it and run it. The command-line interface only works great if it will be used by a single operator at a time. The Merlin agent can be controlled through Mythic, which features a web-based user interface that enables multiplayer support, and a slew of other features inherent to the project.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    windows_hardening

    windows_hardening

    HardeningKitty and Windows Hardening Settings

    This repository, also known as HardeningKitty, is a comprehensive Windows hardening checklist for personal and enterprise environments. It translates security benchmarks (e.g., CIS, Microsoft Security Baselines) into actionable Group Policy and registry recommendations. Though designed primarily for Windows 10, it includes workaround modes such as “HailMary” for Windows Home users lacking the Group Policy Editor.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    age

    age

    A simple, modern and secure encryption tool (and Go library)

    age is a security-oriented tool and library by Filo Sottile. age is a simple, modern, secure encryption utility (and Go library) that emphasizes minimal configuration and strong defaults. It provides small explicit keys, no complex options, and is designed for UNIX-style composability; you can pipe into it, integrate it into scripts, etc. It supports a clearly defined format and promotes interoperability across implementations (there are Rust, TypeScript, etc). The project is well-suited for...
    Downloads: 3 This Week
    Last Update:
    See Project
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 5
    Personal Security Checklist

    Personal Security Checklist

    A compiled checklist of 300+ tips for protecting digital security

    Personal Security Checklist is a comprehensive, plain-language checklist for improving personal digital security and privacy across devices, accounts, and everyday workflows. It’s organized so that complete beginners can make quick, high-impact changes, while advanced users can dig into deeper hardening steps. The guidance spans topics like passwords, 2FA, device encryption, browser hygiene, network safety, backups, and incident response planning. Each section breaks recommendations into...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    Swift Crypto

    Swift Crypto

    Open-source implementation of a substantial portion of the API

    ...By matching CryptoKit’s surface, it reduces portability friction between Apple platforms and server environments. The package slots cleanly into SwiftPM builds and is widely adopted across the Swift server ecosystem. Its goal is practical cryptography: safe defaults, clear APIs, and predictable performance.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    Windows Super God Mode

    Windows Super God Mode

    Creates shortcuts to virtually every special location or action built

    ...The intent is to put power-user features—tweaks for privacy, appearance, power management, and system behavior—within quick reach so administrators and enthusiasts can configure machines consistently. Because many of the actions touch system settings, the collection emphasizes clear instructions and reversible steps so users can roll back changes if needed. It’s valuable for technicians who want a reproducible baseline for customizing Windows installs, or for home users curious about otherwise-obscure controls.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 8
    GTFOBins

    GTFOBins

    GTFOBins is a curated list of Unix binaries

    GTFOBins is a curated catalog of Unix / POSIX system binaries and how they can be misused to bypass restrictions, escalate privileges, exfiltrate data, spawn shells, or otherwise act as “living off the land” tools in a compromised environment. It collects documented techniques for how everyday binaries (e.g. awk, bash, tar, scp) can be abused under constrained conditions. Indexed list of Unix binaries and documented misuse techniques. Examples of command invocations to exploit...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    vRain

    vRain

    Chinese Ancient eBooks Generator

    ...It encapsulates login, session management, and request sequencing so repetitive actions can be executed reliably on a schedule. A configuration-driven approach lets users store multiple accounts, adjust intervals, and toggle features without modifying code. The program surfaces clear logs and result summaries so you can verify outcomes or spot failures that need manual intervention. Deployment is intentionally lightweight, making it suitable for laptops, low-power servers, or containers. While it removes the drudgery from daily online routines, it’s designed to be used responsibly in accordance with platform policies and local regulations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10
    Scout Suite

    Scout Suite

    Multi-cloud security auditing tool

    ...Using the APIs exposed by cloud providers, Scout Suite gathers configuration data for manual inspection and highlights risk areas. Rather than going through dozens of pages on the web consoles, Scout Suite presents a clear view of the attack surface automatically. Scout Suite was designed by security consultants/auditors. It is meant to provide a point-in-time security-oriented view of the cloud account it was run in. Once the data has been gathered, all users may be performed offline. Our self-service cloud account monitoring platform, NCC Scout, is a user-friendly SaaS providing you with the ability to constantly monitor your public cloud accounts, allowing you to check they’re configured to comply with industry best practice.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Clair

    Clair

    Vulnerability Static Analysis for Containers

    ...Our goal is to enable a more transparent view of the security of container-based infrastructure. Thus, the project was named Clair after the French term which translates to clear, bright, transparent.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    System Informer

    System Informer

    View and manage processes, services and more with this powerful tool

    System Informer is a free and open source process viewer. This multi-purpose tool will assist you with debugging, malware detection and system monitoring.
    Leader badge
    Downloads: 18,218 This Week
    Last Update:
    See Project
  • 13
    PureBasic Shamir Secret Sharing

    PureBasic Shamir Secret Sharing

    Open-source PureBasic implementation of the Shamir Secret Sharing

    ...Main Features Complete implementation of Shamir Secret Sharing Arithmetic over GF(257) Compatible with all character strings Robust Lagrange interpolation Safe modular inverse computation Shares encoded in hexadecimal (3 characters per byte) Clear, well-commented source code ⚠️ Disclaimer This project is intended for educational and demonstration
    Downloads: 4 This Week
    Last Update:
    See Project
  • 14
    SecureDel

    SecureDel

    Secure File Deletion

    SecureDel is a small utility that does not require installation and can be used directly from a USB drive. The program is very lightweight, very easy to use, very fast, and uses six different deletion algorithms. It does not leave any trace in the system where it acts and performs deletions in such a way that deleted files can no longer be recovered. It generates a report after each deletion to display the processing times. SecureDel 1.2.3 Released. Good Deletion!
    Downloads: 8 This Week
    Last Update:
    See Project
  • 15
    PasswordGen

    PasswordGen

    Yet another password generator, but this one works.

    After trying some password generator, it became clear either they don't have the features that i wanted or they worked but not all to good. Some others nagged you to death that you really should donate.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 16
    AnubisCrypt

    AnubisCrypt

    Anubis Involutional 128-bit SPN Block cipher Encryption Tool

    Barreto & Rijmen 128-bit block cipher with GCM Mode (RFC 5288) provides both authenticated encryption (confidentiality and authentication) and the ability to check the integrity and authentication of additional authenticated data (AAD) that is sent in the clear. Whirlpool-based PBKDF2. Anubis is a block cipher with SP-network structure designed by Vincent Rijmen and Paulo S. L. M. Barreto in 2000. This project is licensed under the ISC License. Source code: https://github.com/pedroalbanese/anubiscrypt Visit: http://albanese.atwebpages.com/projects.php
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Shield GraphQL

    Shield GraphQL

    A GraphQL tool to ease the creation of permission layer

    ...Using an intuitive rule-API, you'll gain the power of the shield engine on every request and reduce the load time of every request with smart caching. This way you can make sure your application will remain quick, and no internal data will be exposed. Implement your server permissions in a clear and deterministic way and let it guard access to your schema. Shield lets you create a handful of rules and compose them into meaningful structures using logical operators. To prevent recalculation of rules, every rule caches its result based on selected caching mechanism and speeds up query execution. Shield generates a type-map from your schema to make sure you have assigned your rules to the right places.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Project Bangladesh

    Project Bangladesh

    Let's clear this topic

    I don't make these stuffs Myself And I don't Take any Credits . Credits are mentioned in posts. Actually I collect lot of modules from different channels, github, pling, XDA and many more source. Finding them manually is hard so I do it for you . Here you can find many stuffs like mods , thermals , modules , wallpaper zip and etc. So please stay with me . ***Near future I will publish my own projects here ( ROMs , kernels etc ) And again thank you ☺️
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Bilibili Helper

    Bilibili Helper

    Auxiliary tool that can replace the player, push notifications, etc.

    Bilibili (bilibili.com) Auxiliary tool that can replace the player, push notifications and perform some shortcut operations. Bilibili (bilibili.com) is an auxiliary tool that can download videos, query the sender of the barrage, and some very useful live broadcast area functions. An auxiliary extension for Bilibili (bilibili.com) which allows users to bypass playback restrictions, replace video players and use shortcuts. Starting from a certain version, Bilibili Assistant uses special...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 20
    Firing Range

    Firing Range

    Firing Range is a test bed for web application security scanners

    Firing Range is an intentionally vulnerable web application designed to evaluate the real-world effectiveness of web security scanners and training exercises. Deployed as a cloud-friendly app, it aggregates dozens of vulnerability patterns in repeatable, labeled routes so tools can be benchmarked on coverage and noise. The project doesn’t just include simple XSS forms; it spans variants such as DOM-based issues, context-sensitive sinks, template mishandling, CSRF, open redirects, and mixed...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    [C#] Secure Shredder Console

    A console file shredder that supports many algorithms.

    ...The program supports Zero Data 1 Pass, British HMG IS5-Baseline 1 Pass, Russian GOST P50739-95 2 Passes, British HMG IS5-Enhanced 3 Passes, US DoD 5220.22-M / Canadian RCMP DSX 3 Passes, German VSITR 7 Passes, Bruce Schneier's 7 Passes, Canadian RCMP TSSIT OPS-II 7 Passes, and Peter Gutmann 35 Passes. The program is written in C# .NET. The source code is also available for download and you may contribute to the development here. If you want a clear explanation on how each of the algorithms work, please refer here: http://www.phoebekwok.com/publications/GJY_SecureDataShredder.pdf
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    Process Hacker

    Process Hacker

    View and manage processes, services and more with this powerful tool.

    Process Hacker is a free and open source process viewer. This multi-purpose tool will assist you with debugging, malware detection and system monitoring.
    Leader badge
    Downloads: 16,020 This Week
    Last Update:
    See Project
  • 23

    jellyphish

    Don't get phished!

    ...(use ctrl+v to paste) 3) Select the site which you think that the webpage belongs from the drop down list. 4) Now click on the check Button. :P 5) Now after it shows you a popup that the site is safe or dangerous you can click on the clear button to use it again. 6) Click on help button to get a quick tutorial.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Killtrojan Syslog

    Killtrojan Syslog

    Tool to detect malware activity on a system.

    ...Also useful for more advanced users who want to analyze a computer. With the support logs with BBCode mode, you can paste the log generated in any forum (SMF, PHPBB, Invision ...) which will be detailed with clear colors for your reading.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    ClearLogs

    ClearLogs

    Clear All Windows System Logs - AntiForensics

    # clearlogs Clear All Windows System Logs - AntiForensics -- ------------------------------------------------------------------------- # wevtutil Enables you to retrieve information about event logs and publishers. You can also use this command to install and uninstall event manifests, to run queries, and to export, archive, and clear logs.
    Downloads: 11 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB