Showing 8 open source projects for "windows command line"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    Balancing Load Across Systems (Ballast)
    Ballast is a tool for balancing user load across SSH servers that supports user-specific policies as well as traditional policies based on metrics such as CPU load. It includes a simple client, a lightweight data server, and a data collection agent.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Middleware for Existing SSH Hosts (Mesh)

    Middleware for Existing SSH Hosts (Mesh)

    Fine-grained authorizations and single sign-on for SSH remote commands

    Mesh is a secure, lightweight grid middleware that is based on the addition of a single sign-on capability to the built-in public key authentication mechanism of SSH using system call interposition.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Self-Healing Ind. File Transfer (Shift)

    Self-Healing Ind. File Transfer (Shift)

    Fast reliable local/remote file transfers, sync, tar create/extract

    Shift is a lightweight framework for high performance local and remote file transfers that provides resiliency across a wide variety of failure scenarios through various techniques. These include end-to-end integrity via cryptographic hashes, throttling of transfers to prevent resource exhaustion, balancing transfers across resources based on load and availability, and parallelization of transfers across multiple source and destination hosts for increased redundancy and performance.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    SSH Interruption Mitigator (SSHIM)

    SSH Interruption Mitigator (SSHIM)

    Allow remote ssh commands to survive connection failures

    Downloads: 1 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 5
    Bash-Accessible SSH FileSystem (BASSHFS)

    Bash-Accessible SSH FileSystem (BASSHFS)

    SSHFS-like functionality via bash

    BASSHFS is similar to the existing SSHFS utility except it is does not require FUSE kernel support. Instead, BASSHFS uses the aliasing and function mechanisms of the bash shell to intercept program invocations and remap those that are supported to its own versions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    FuTTY

    FuTTY

    FireEgl's PuTTY -- FuTTY!

    FuTTY is a fork of PuTTY and PuTTYTray.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 7

    ssh_ninja

    SSH Protector

    ssh_ninja will watch the secure or auth log file depending on distribution for a configured number of login attempts to accounts and issue an IPTables drop statement to block and IP
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Compassh

    the OpenSSH VPN, without the VPN

    Compassh is an helper for the popular OpenSSH remote connection software, focused on providing near-VPN service without the complexity and the setup required by a real VPN. Using a VPN software may require an ad-hoc firewall setup, the generation of a key (pair) and the installation of the VPN software on a host that is not under your control. Compassh try to solve as much of this problems with a smart use of OpenSSH.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB