Showing 2 open source projects for "projet web"

View related business solutions
  • Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure Icon
    Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure

    Native application identity and user-based security for your Azure cloud

    Gain integrated visibility across all traffic in a single pass. Deploy Palo Alto Networks VM-Series to determine application identity and content while automating security policy updates via rich APIs.
    Get a free trial
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
     Loi 25 Quebec Cookie Consent

    Loi 25 Quebec Cookie Consent

    Free WordPress plugin for Quebec's Law 25. Bilingual cookie banner

    The only FREE, open-source WordPress plugin fully compliant with Quebec’s Law 25 (Bill 64). Blocks tracking scripts (Google Analytics, Meta Pixel) until user consent. KEY FEATURES • Automatic Script Blocking: Paste scripts into the “Vault” — they run only after “Accept.” • Google Consent Mode v2: Supports ad_storage & analytics_storage. • Bilingual (FR/EN): Auto-detects WordPress language. • 3 Display Styles: Bar, Popup, or Corner Widget. • Lightweight: Vanilla JS (<10KB), no...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Z bigets Open source

    Z bigets Open source

    #Web site : http://zbigets.wordpress.com/

    #Donwload Server.rar And Client.rar Z bigets est un programme comme prorat avec plusieurs options.Le projet est open source pour but d'aider les gens qui débutent dans le monde de la programmation. [Changelog] -Connection victimes pour cela il faux lancer la fenetre victime . et lancer le trojan -Bloquer le sysyteme -Capture ecran -Change ip -shut down et restart -Keylogger -Sauvegarde des images. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB