9 projects for "order" with 2 filters applied:

  • Compliant and Reliable File Transfers Backed by Top Security Certifications Icon
    Compliant and Reliable File Transfers Backed by Top Security Certifications

    Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.

    Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
    Start Free Trial
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    Zerocopy

    Zerocopy

    Zerocopy makes zero-cost memory manipulation effortless

    Zerocopy is a Rust library designed to make zero-cost memory manipulation both safe and effortless. It allows developers to reinterpret or convert raw byte sequences into structured types—and vice versa—without writing unsafe code directly. The crate provides safe abstractions for transmuting data while preserving Rust’s strict safety guarantees, removing the need for manual memory manipulation. Zerocopy introduces a suite of conversion traits such as TryFromBytes, FromBytes, IntoBytes, and...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Hiper

    Hiper

    A statistical analysis tool for performance testing

    Hiper is an open-source command-line tool designed for statistical analysis of web performance and page load behavior during performance testing. The tool repeatedly loads a specified webpage multiple times and gathers detailed timing metrics in order to produce more reliable performance measurements than single-run benchmarks. By averaging data across multiple page loads, Hiper helps developers understand whether performance optimizations actually improve real-world page loading behavior. The tool relies on browser performance timing data to capture metrics such as DNS lookup time, TCP connection time, time to first byte, download duration, DOM readiness, and total page load time. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    LittleDarwin

    Mutation Analysis Framework for Java

    Mutation testing has been proven to be a reliable method to estimate the quality of a test suite. Most of current mutation tools require the architecture of their target system to be in a certain way in order to apply the technique; thus making it impossible to use them in complex build environments. LittleDarwin is a mutation testing tool designed primarily with the premise of easy deployment in complex systems; in order to provide mutation testing where other tools fail.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    fastest

    Automate your software testing, the fastest way!

    ...* Currently implemented in Java * Test Automation is not just about writing test cases in a particular programming language. There are a lot more activities that need to be accomplished in order to make the test automation really become automatic. * Fastest helps automate all the necessary, but difficult test automation tasks like 'Mapping the test case execution with test plan document, updating centralized test management database, reporting, setup of automated nightly regressions in Continuous Integration (CI) environments, Running code / commands on remote hosts, Interacting with Web services, browser based automation using Selenium, SSH access, Sending Email notifications
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 5
    Stand alone Java application used simulate a memory leak in order to generate profile signatures. The application has the ability to generate system (CPU) load in order to observe profile signature changes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    The csvdatamix project aims to randomize CSV input data files in order to conceal the original state of the data. Similar to data masking or data transformation. Also has mapping abilities to translate back to the original state of the data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    "Java log viewer" is a GUI to easily view the java application logs generated by the "java.util.logging" package. The log must be formatted by the XMLFormatter class. It provides facilities in order to filter, to sort and to find log records.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    PUT is a unit-testing framework that builds on the standard python unittest framework in order to provide extra features including: aggregate fixtures, suite heirarchial naming, customisable output, logging, suite level fixtures and more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    MockHTTP is a little Java project used to simulate the behavior of J2EE HTTP classes in order to easily run unit tests of servlets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB