Showing 16 open source projects for "no code"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • 1
    Claude Code

    Claude Code

    Claude Code is an agentic coding tool that lives in your terminal

    Claude Code is an intelligent agentic coding assistant that lives in your terminal and understands your entire codebase. It helps developers code faster by executing routine tasks, explaining complex code snippets, and managing git workflows—all via natural language commands. Claude Code integrates seamlessly into your terminal, IDE, or GitHub by tagging @claude to interact with your code context.
    Downloads: 30 This Week
    Last Update:
    See Project
  • 2
    windsurf.vim

    windsurf.vim

    Free, ultrafast Copilot alternative for Vim and Neovim

    windsurf.vim is a plugin for Vim and Neovim by Exafunction (formerly part of the Codeium project) that brings in AI-driven code completion and assistance capabilities. The aim is to provide a “free, ultrafast” alternative to other AI code assistants (such as GitHub Copilot) directly within Vim/Neovim. Once installed and configured, windsurf.vim can suggest code completions, generate multi-line snippets based on comments or invitation in code, and make the editing experience more predictive and context-aware. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Go Cursor Help

    Go Cursor Help

    Cursor Free Trial Reset Tool

    A small CLI utility written in Go to reset free trial restrictions of the Cursor AI code assistant on local machines. It automates machine‑ID resets and environment cleanups so users can bypass "Too many free trial accounts" limitations across platforms.
    Downloads: 16 This Week
    Last Update:
    See Project
  • 4
    GitHub Actions Runner Images

    GitHub Actions Runner Images

    GitHub Actions runner images

    This repository contains the source code used to create the VM images for GitHub-hosted runners used for Actions, as well as for Microsoft-hosted agents used for Azure Pipelines. To build a VM machine from this repo's source, see the instructions.
    Downloads: 10 This Week
    Last Update:
    See Project
  • All-in-one security tool helps you prevent ransomware and breaches. Icon
    All-in-one security tool helps you prevent ransomware and breaches.

    SIEM + Detection and Response for IT Teams

    Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.
    Learn More
  • 5
    Pester

    Pester

    Pester is the ubiquitous test and mock framework for PowerShell

    ...It integrates with CI systems easily—returning standard exit codes and generating NUnit/JUnit-style test reports—so PowerShell codebases can be validated in automated pipelines. The framework evolves with PowerShell itself, adding features for parallel execution, code coverage measurement, and test discovery to meet production needs. For teams, Pester encourages test-driven development and makes PowerShell deliverables more maintainable and trustworthy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    PowerHub

    PowerHub

    A post exploitation tool based on a web application

    ...The project places emphasis on discoverability and reuse: scripts are organized into reusable modules and functions with clear parameter contracts so teams can compose higher-level workflows without duplicating glue code. Authentication and remoting are handled idiomatically via PowerShell remoting or credential stores, enabling both interactive and scheduled runs. Built-in reporting features aggregate results into human-readable summaries and machine-friendly outputs (CSV/JSON) for pipeline consumption or ticketing integration.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    PoshC2

    PoshC2

    C2 framework used to aid red teamers with post-exploitation

    ...PoshC2 is primarily written in Python3 and follows a modular format to enable users to add their own modules and tools, allowing an extendible and flexible C2 framework. Out-of-the-box PoshC2 comes PowerShell/C# and Python2/Python3 implants with payloads written in PowerShell v2 and v4, C++ and C# source code, a variety of executables, DLLs and raw shellcode in addition to a Python2/Python3 payload. These enable C2 functionality on a wide range of devices and operating systems, including Windows, *nix and OSX. Shellcode containing in-build AMSI bypass and ETW patching for a high success rate and stealth. Auto-generated Apache Rewrite rules for use in a C2 proxy, protecting your C2 infrastructure and maintaining good operational security. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 8
    Testimo

    Testimo

    Testimo is a PowerShell module for running health checks for AD

    ...Designed for operations and platform engineers, Testimo focuses on verifying infrastructure state (configuration settings, service availability, registry keys) rather than purely unit-level code, making it useful for smoke tests, image validations, and deployment gates. Test runs can emit structured reports, integrate with CI systems, and be scheduled as part of regular compliance checks to ensure environments remain in expected states. Because it’s built on PowerShell, Testimo reuses native cmdlets and objects directly in assertions, reducing the impedance mismatch between tests and target systems.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    MSP Programs & Scripts

    MSP Programs & Scripts

    Programs and PowerShell Scripts for MSP/RMM Admins

    Just a place to collect & share the scripts I've developed as an MSP for my various software systems, like PSA & RMM... and more from other like-minded MSPs who wanted to help others! No guarantee that everything is in PowerShell, C#, or even the latest version, so be sure to read the code comments and other documentation, as well as ask the community. You may even find discussions. -pat
    Downloads: 0 This Week
    Last Update:
    See Project
  • Payments you can rely on to run smarter. Icon
    Payments you can rely on to run smarter.

    Never miss a sale. Square payment processing serves customers better with tools and integrations that make work more efficient.

    Accept payments at your counter or on the go. It’s easy to get started. Try the Square POS app on your phone or pick from a range of hardworking hardware.
    Learn More
  • 10
    windows-development-environment

    windows-development-environment

    Turning Windows into an environment ready for modern development

    ...Instead of piecing together individual tutorials, the repository provides curated scripts, recommended tooling configurations, and step-by-step instructions that cover everything from PowerShell and Windows Subsystem for Linux (WSL) to code editors like VS Code, and from package managers (e.g., Scoop/Chocolatey) to Docker and Git workflows. By codifying these patterns, it reduces onboarding time and ensures consistency in dev setups — especially valuable for teams that want standardized tooling across Windows boxes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    PoshBot

    PoshBot

    Powershell-based bot framework

    ...PoshBot currently supports connecting to Slack to provide you with awesome ChatOps goodness. PoshBot executes functions or cmdlets from PowerShell modules. Use PoshBot to connect to servers and report status, deploy code, execute runbooks, query APIs, etc. If you can write it in PowerShell, PoshBot can execute it.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 12
    Blazor

    Blazor

    Build client web apps with C#

    Blazor lets you build interactive web UIs using C# instead of JavaScript. Blazor apps are composed of reusable web UI components implemented using C#, HTML, and CSS. Both client and server code is written in C#, allowing you to share code and libraries. Blazor is a feature of ASP.NET, the popular web development framework that extends the .NET developer platform with tools and libraries for building web apps. Blazor can run your client-side C# code directly in the browser, using WebAssembly. Because it's real .NET running on WebAssembly, you can re-use code and libraries from server-side parts of your application. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    git-secrets

    git-secrets

    Prevents you from committing secrets and credentials into git

    ...Teams often deploy it as part of their developer toolchain to enforce a security guardrail: you catch leaks early rather than discovering them later. It is also often used in CI pipelines or continuous code quality checks to detect in-flight vulnerabilities. While git-secrets is not a full secrets management system, it plays a key role in defense-in-depth by preventing accidental exposure in source.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    epyunit

    epyunit

    PyUnit and PyDev extensions for arbitrary Executables

    The package 'epyunit' provides extensions for PyUnit and PyDev. * Extensions for PyUnit - Unittests for arbitrary executables. * Extensions for PyDev - Automation of search and load of pydevd.py The extensions are applicable from commandline and/or within Eclipse. Online manuals: - https://pythonhosted.org/epyunit/ PyPi repository: - https://pypi.python.org/pypi/epyunit Current application examples are: - bash-core - http://bash-core.sourceforge.net Nickname -...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    PowerSploit

    PowerSploit

    A PowerShell Post-Exploitation Framework

    PowerSploit is a PowerShell-based post‑exploitation framework widely used by penetration testers, red‑teamers, and security researchers. It includes modules for code execution, introspection, lateral movement, persistence, and data exfiltration—deeply integrated into Windows environments.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 16
    PowerSploit PowerShell

    PowerSploit PowerShell

    A PowerShell Post-Exploitation Framework

    PowerSploit is a collection of PowerShell modules that historically served as a toolkit for post-exploitation tasks, red-team exercises, and offensive-security research—covering areas like reconnaissance, lateral movement, persistence, and situational awareness. The repository bundles many focused scripts: code to enumerate system and Active Directory information, payload generation helpers, in-memory execution utilities, and modules to interact with credentials and services. Because the modules can be used to both demonstrate weaknesses and to exploit them, the project is typically referenced in threat emulation, penetration testing, and defensive research to understand attacker capabilities. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next