4 projects for "open source faceswap" with 2 filters applied:

  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 1
    The Bash Programming Environment (BPE) is a set of useful shell/CGI scripting functions for the GNU Bash shell. Each group of functions is sorted into a separate library. Libraries include a hashmap, MySQL API, XML Parsing, CGI manipulation & more.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    The Heirloom Project provides standard Unix utilities.
    Leader badge
    Downloads: 347 This Week
    Last Update:
    See Project
  • 3
    OS based on Agent based Security with a new type of split kernel and agents platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    BeastieBox is an attempt to create a "BusyBox"-like software under the BSD License. The target of this project is to be able to run a functionnal BSD UNIX system with a very limited amount of memory.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Criminal IP: Cybersecurity Search Engine Icon
    Criminal IP: Cybersecurity Search Engine

    Criminal IP is a comprehensive threat intelligence search engine that detects vulnerabilities of personal and corporate cyber assets in real time

    Originated from the idea that individuals and corporations would be able to strengthen their cyber security by proactively acquiring information about IP addresses attempting to access your network, Criminal IP uses its big data of more than 4.2 billion IP addresses to provide threat-relevant information on malicious IPs and links, phishing sites, certificates, industrial control systems, IoTs, servers, security cameras, and so forth.
    Learn More
  • Previous
  • You're on page 1
  • Next