Showing 4 open source projects for "full stack framework"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 1
    SKUDONET

    SKUDONET

    SKUDONET Open Source Load Balancer and Web Application Firewall

    SKUDONET Community Edition is an Open Source Load Balancer and Web Application Firewall (WAF) designed for Linux server environments. Formerly known as Zevenet, it is based on Debian 12.8, providing a stable and secure foundation for reliable application delivery and cybersecurity. This edition is suitable for Linux and Windows server deployments (not for mobile platforms), offering advanced Layer 4 and Layer 7 traffic management with support for up to 250,000 TCP requests per second (L4)...
    Leader badge
    Downloads: 661 This Week
    Last Update:
    See Project
  • 2
    FullAuto

    FullAuto

    Fully Automate ANY Process with *Persistent* SSH/SFTP from One Host

    FullAuto is a groundbreaking secure programming framework that enables FULL API access to any number of simultaneous persistent SSH and SFTP connections to remote resources and devices. With FullAuto, connections are PERSISTANT enabling state preservation of file system navigations, environment manipulations, and user context shifting. Output and error messages from remote commands are returned accurately from both STDOUT and STDERR channels.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    IT KASM

    IT KASM

    IT Management Tool for managing IT operational functions

    Throw IT in the KASM - LIVE DEMO is online - http://demo.itkasm.com The IT KASM is a management tool (and framework) to manage almost anything in an IT organization. If you can think it, IT KASM can probably manage it. In the fast pace world of IT as a service organization, IT Professionals need to provide quick and accurate information, support, and service. IT KASM is extremely easy to use, full UI, easy to set up in minutes. The IT KASM is all about speed, functionality, ease of use, ease of administration, and accessing quality data quickly. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Debian Unstable/testing alpha.

    Pre-Alpha Console distro for high performance Linux computing.

    Basic Debian INTEL/AMD HPC console/desktop multi purpose. Linux for software devs/QA and thin laboratory clusters. MIC hardware, NUMA and live network memory and full IPv6 are supported. Final alpha release features: ======== * Usb image * General debian repos * VM optimizations * Hugepages by default * CGROUPs optimized by default * ALSA * Latest Debugging / Baremetal kernels * Full Haswell and MIC support in test * Full optimized python support * Full optimized perl support * Java compliance * IPv6 full stack with IPsets * Multipath storage * Overclocking tools * Student/Developer scripts. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Criminal IP: Cybersecurity Search Engine Icon
    Criminal IP: Cybersecurity Search Engine

    Criminal IP is a comprehensive threat intelligence search engine that detects vulnerabilities of personal and corporate cyber assets in real time

    Originated from the idea that individuals and corporations would be able to strengthen their cyber security by proactively acquiring information about IP addresses attempting to access your network, Criminal IP uses its big data of more than 4.2 billion IP addresses to provide threat-relevant information on malicious IPs and links, phishing sites, certificates, industrial control systems, IoTs, servers, security cameras, and so forth.
    Learn More
  • Previous
  • You're on page 1
  • Next