Showing 8 open source projects for "corruption"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Cloud tools for web scraping and data extraction Icon
    Cloud tools for web scraping and data extraction

    Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.

    Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
    Explore 10,000+ tools
  • 1
    WCDB

    WCDB

    Cross-platform database framework developed by WeChat

    ...ORM/persistence solution via Room from Android Architecture Components. Concurrent access via connection pooling from modern Android framework. Repair toolkit for database corruption recovery.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Git

    Git

    Fast, scalable, distributed revision control system

    Git is a free, distributed version control system created by Linus Torvalds in 2005 to manage the development of the Linux kernel. It emphasizes speed, data integrity, and support for non-linear workflows, and remains the most popular VCS for collaborative software development. Git is an Open Source project covered by the GNU General Public License version 2 (some parts of it are under different licenses, compatible with the GPLv2). It was originally written by Linus Torvalds with help of a...
    Downloads: 14 This Week
    Last Update:
    See Project
  • 3
    Ccache

    Ccache

    A fast compiler cache

    ...Supports fast "direct" and "depend" modes that don't rely on using the preprocessor. Supports compression using Zstandard. Checksums cache content using XXH3 to detect data corruption. Keeps statistics on hits/misses. Automatic cache size management. Easy installation.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4
    Benthos

    Benthos

    Fancy stream processing made operationally mundane

    ...Benthos processes and acknowledges messages using an in-process transaction model with no need for any disk persisted state, so when connecting to at-least-once sources and sinks it's able to guarantee at-least-once delivery even in the event of crashes, disk corruption, or other unexpected server faults. This behaviour is the default and free of caveats, which also makes deploying and scaling Benthos much simpler.
    Downloads: 4 This Week
    Last Update:
    See Project
  • Lightspeed golf course management software Icon
    Lightspeed golf course management software

    Lightspeed Golf is all-in-one golf course management software to help courses simplify operations, drive revenue and deliver amazing golf experiences.

    From tee sheet management, point of sale and payment processing to marketing, automation, reporting and more—Lightspeed is built for the pro shop, restaurant, back office, beverage cart and beyond.
    Learn More
  • 5
    Bull

    Bull

    Queue package for handling distributed jobs and messages in NodeJS

    ...Metrics and statistics, and many more features. Queues are robust and can be run in parallel in several threads or processes without any risk of hazards or queue corruption.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Core Analyzer

    Core Analyzer

    A power tool to debug core dump, memory corruption, optimized code.

    ...However, the task is boring, prone to error and usually fruitless. By parsing a core dump file or a live process's memory, core analyzer is able to scan the target's heap data for memory corruption, search the whole address space for data object's references, or analyze memory pattern. It is thorough, labor-free, and insightful. I use the tool on daily basis and it is proved to be invaluable to debug many tough issues. The tool supports x86_64 architecture including Windows/RedHat/SUSE/MacOSX (32-bit and 64-bit). For more information, please see the project's web site
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    EPOLSIG

    EPOLSIG

    command line source code hash stamps

    EPO LSIG is a simple command line tool which puts a single signature line in your source code file. Thus it allows checking files against data corruption and eases version identification. This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, version 3. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    memwatch is an ANSI C fault tolerant memory leak and corruption detection tool. Basically, you add a header file to your souce code files, and compile with MEMWATCH defined or not. Check the README and USING files for more instructions.
    Downloads: 3 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next