Showing 19 open source projects for "data structure"

View related business solutions
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • Rent Manager Software Icon
    Rent Manager Software

    Landlords, multi-family homes, manufactured home communities, single family homes, associations, commercial properties and mixed portfolios.

    Rent Manager is award-winning property management software built for residential, commercial, and short-term-stay portfolios of any size. The program’s fully customizable features include a double-entry accounting system, maintenance management/scheduling, marketing integration, mobile applications, more than 450 insightful reports, and an API that integrates with the best PropTech providers on the market.
    Learn More
  • 1
    Cryptomator

    Cryptomator

    Multi-platform transparent client-side encryption for your cloud files

    Cryptomator is a free and open source project that offers multi-platform, transparent client side encryption of your files in the cloud. It works with just about any cloud storage service; is totally transparent so you can work with your files how you normally would; and secure with a 256-bit key length AES encryption. It’s also simple and easy to use with no need for different accounts, key management, cloud access grants or cipher configurations.
    Downloads: 86 This Week
    Last Update:
    See Project
  • 2
    Permify

    Permify

    Permify is an open-source authorization service

    Permify is an open source authorization service for creating fine-grained and scalable authorization systems. With Permify, you can easily structure your authorization model, store authorization data in your preferred database, and interact with the Permify API to handle all authorization queries from your applications or services. Permify is inspired by Google’s consistent, global authorization system, Google Zanzibar. Our goal is to make Google's Zanzibar available to everyone and help them to build robust, flexible, and easily auditable authorization system that establishes a natural linkage between permissions across the business units, functions, and entities of an organization.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    BadUSB

    BadUSB

    Flipper Zero badusb payload library

    This project explores USB device emulation attacks—commonly called BadUSB—by demonstrating how commodity USB hardware can impersonate keyboards, network adapters, or storage devices to perform scripted actions on a host. It typically contains firmware examples, payloads, and explanations showing how a device presenting as a Human Interface Device (HID) can inject keystrokes, open shells, or orchestrate data exfiltration when plugged into a machine. The codebase is frequently intended for...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 4
    PCSecrets

    PCSecrets

    Encrypt and manage secret text data

    PCSecrets is a PC application that holds secret text data - protected by a master password and strong encryption. Use it as a password manager or just somewhere to hold any text data securely in one place. It can hold a second, hidden set of secrets that is undetectable and plausibly deniable. The program is also a PC counterpart of the Secrets for Android app. It uses the same data structure and provides synchronization that allows easy transfer of secrets between the two. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight Icon
    Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight

    Lock Down Any Resource, Anywhere, Anytime

    CLEAR by Quantum Knight is a FIPS-140-3 validated encryption SDK engineered for enterprises requiring top-tier security. Offering robust post-quantum cryptography, CLEAR secures files, streaming media, databases, and networks with ease across over 30 modern platforms. Its compact design, smaller than a single smartphone image, ensures maximum efficiency and low energy consumption.
    Learn More
  • 5
    CSZ CMS

    CSZ CMS

    CSZ CMS is a open source content management system. With Codeigniter.

    CSZ CMS is an open source web application that allows to manage all content and settings on the websites. CSZ CMS was built on the basis of Codeigniter and design the structure of Bootstrap, this should make your website fully responsive with ease. CSZ CMS is based on the server side script language PHP and uses a MySQL or MariaDB database for data storage. CSZ CMS is open-source Content Management System. And all is free under the Astian Develop Public License (ADPL).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    RufasSlider

    RufasSlider

    Klotsky class block slider puzzles.

    ...The objective in each game is stated near the window top, but usually involves moving a large block to a specified location within the window. The DirtyDozen family is similar except there are L-shaped puzzle pieces. The Traffic-Rush family uses data, with 2x1, 1x2, 3x1, 1x3 rectangles. Here, the long rectangles represent cars or trucks that can only move [roll] lengthwise...the goal being to move the red car toward the shaded "exit door". The proper command to extract the archive and maintain the directory structure is "7z x filename".
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    AnubisCrypt

    AnubisCrypt

    Anubis Involutional 128-bit SPN Block cipher Encryption Tool

    Barreto & Rijmen 128-bit block cipher with GCM Mode (RFC 5288) provides both authenticated encryption (confidentiality and authentication) and the ability to check the integrity and authentication of additional authenticated data (AAD) that is sent in the clear. Whirlpool-based PBKDF2. Anubis is a block cipher with SP-network structure designed by Vincent Rijmen and Paulo S. L. M. Barreto in 2000. This project is licensed under the ISC License. Source code: https://github.com/pedroalbanese/anubiscrypt Visit: http://albanese.atwebpages.com/projects.php
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    ArkID

    ArkID

    Enterprise IDaaS/IAM platform system

    ...You can flexibly and quickly add new functions to the main program without changing the main program. Achieve centralized and safe storage of corporate organizational structure and identity information of massive personnel. Establish a correspondence in multiple dimensions and securely integrate enterprise identity data sources. To achieve efficient and unified management of enterprise personnel, organizational structure, and application of information on a platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    kraken.js

    kraken.js

    An express-based Node.js web application bootstrapping module

    Give your node.js express apps some extra arms. Kraken is a secure and scalable layer that extends express by providing structure and convention. Though kraken is the main pillar of our framework, several modules can also be used independently. Kraken builds upon express and enables environment-aware, dynamic configuration, advanced middleware capabilities, security, and app lifecycle events. kraken-js is used just like any normal middleware, however it does more than just return a function;...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Payments you can rely on to run smarter. Icon
    Payments you can rely on to run smarter.

    Never miss a sale. Square payment processing serves customers better with tools and integrations that make work more efficient.

    Accept payments at your counter or on the go. It’s easy to get started. Try the Square POS app on your phone or pick from a range of hardworking hardware.
    Learn More
  • 10
    goRBAC

    goRBAC

    goRBAC provides a lightweight role-based access control (RBAC) in Go

    ...Although you can adjust the RBAC instance anytime and it's absolutely safe, the library is designed for use with two phases, preparing and checking. Also, you can implement gorbac.Role and gorbac.Permission for your own data structure.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    IDA ClassInformer PlugIn

    IDA Pro plug-in to fix/extract/view RTTI information

    * April 2025: This project has moved to GitHub! The latest version can now be found at: https://github.com/kweatherman/IDA_ClassInformer_PlugIn. An IDA Pro Windows object RTTI vftable finder, fixer, and lister plug-in. Places structure defs, names, labels, and comments to make more sense of class and structure vftables ("Virtual Function Table"). Lists found RTTI structures and C++ classes in a window for browsing. Mentioned in Chris Eagle's: "The IDA Pro book":...
    Leader badge
    Downloads: 36 This Week
    Last Update:
    See Project
  • 12
    Bias :: Versatile Information Manager
    Bias is a cross-platform versatile information management application / Organizer
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    BoarderZone ASNalyzer
    A 100% pure Java Swing ASN.1 analysis utility for inspecting arbitrary BER-encoded data files. It allows inspection of data with unknown structure, can drill down to any nesting level and allows to interpret embedded OCTET STRING data recursively.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 14

    d-crypt

    Tweakable 256-bit symmetrical block cipher.

    D-crypt is an symmetrical block cipher operating on 256bit blocks with an key of the same length. The cipher takes 3 inputs: the data to encrypt, the symmetric key and a tweak consisting in a array of 16 integers representing each one of eleven possible keyaddition algorithms. Features a similar structure as AES (uses simpler versions of ShiftRows, MixColumns) and uses AES SBOX. It is an SP network. The Key Schedule is a different from AES's, however the Expansion is partially inspired in AES. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    Selective Data Backup (DoS App)

    Select the files you want backed up.

    This program was made because windows backup isn't enough if the size of your hard drive changes. This program directly copies any files/folders you list, to an empty folder. It copies the entire folder structure, so you know exactly where your files and everything backed up, are/were. Now, also included in this is my Password Safe program. Store all your passwords in 1 convenient location. But, wait "wouldn't that be dangerous?", NOPE! It's all encrypted useing my special Cypher Encryption Algorithm: basically, you have to have the password, or you'll never see your data again! ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    IOS6 and recent iTunes updates have broken a few features. We have made some partial fixes, but they are not complete. If you'd like to help support our development, or take over the development please let us know. Explore the internal file structure of your iphone (or of a seized phone in the case of forensic teams) using either the iphone's own backup files or (for jail broken iphones) ssh. Viewing of plist, sqlite, and hex are supported. IOS 5 is now supported iOS 6 only partially...
    Leader badge
    Downloads: 40 This Week
    Last Update:
    See Project
  • 17

    Multi File Fuzzer

    Multi File Fuzzer aims to facilitate the discovery of vulnerability

    Multi File Fuzzer aims to facilitate the discovery of vulnerability "FileFormat" in applications. Multi File Fuzzer keeps the structure of the format while injecting corrupted data to try to crash the target application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    WinSync
    Backup script for Windows based on robocopy Fast backup, syncs changed files only. Space efficient, all duplicate files are Hardlinked. Easy Overview of destination folder Structure: Computer Name > Date_Time > Drive > Folder > File
    Downloads: 3 This Week
    Last Update:
    See Project
  • 19
    Forensic Registry File Reader(FRFR) - Is a 100% C# .NET project aimed to provide full forensic analysis of an offline registry file, no windows API being used, all of the registry structure been reconstructed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next