Showing 21 open source projects for "corruption"

View related business solutions
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Repair-CRM Icon
    Repair-CRM

    For small companies that repair and maintenance customer machines

    All-In-One Solution with an Online Booking portal for automating scheduling & dispatching to ditch paperwork and improve the productivity of your technicians!
    Learn More
  • 1
    Velero

    Velero

    Backup and migrate Kubernetes applications and their persistent volume

    ...Velero is an open source tool to safely backup and restore, perform disaster recovery, and migrate Kubernetes cluster resources and persistent volumes. Reduces time to recovery in case of infrastructure loss, data corruption, and/or service outages. Enables cluster portability by easily migrating Kubernetes resources from one cluster to another​. Offers key data protection features such as scheduled backups, retention schedules, and pre or post-backup hooks for custom actions. Backup your Kubernetes resources and volumes for an entire cluster, or part of a cluster by using namespaces or label selectors. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    LunarROMCorruptor

    LunarROMCorruptor

    Corrupt any ROMs/files just by tweaking a few settings.

    Tailor your corruption to perfection with this versatile corruptor. With countless customization options, you have complete control over how the corruptor operates, allowing you to achieve the perfect level of corruption every time. Corruption Engine List: Nightmare Engine Merge Engine Logic Engine Lerp Engine Manual Engine
    Downloads: 10 This Week
    Last Update:
    See Project
  • 3
    SlateDB

    SlateDB

    A cloud native embedded storage engine built on object storage

    Unlike traditional LSM-tree storage engines, SlateDB writes data to object storage to provide bottomless storage capacity, high durability, and easy replication. SlateDB is an embedded storage engine built as a log-structured merge-tree. Unlike traditional LSM-tree storage engines, SlateDB writes data to object storage (S3, GCS, ABS, MinIO, Tigris, and so on). Leveraging object storage allows SlateDB to provide bottomless storage capacity, high durability, and easy replication. The trade-off...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    jfMonitor

    jfMonitor

    Network / Storage Monitoring Solution

    jfMonitor ========= Enterprise Network / Storage Monitoring Solution Features: - Network Monitoring using ARP requests (PING requests can get blocked) - Storage Monitoring - Cisco Network configuration (with MAC table analysis) - email notification - unknown device notification (daily report) Web Interface: - http://your_host_name License: - LGPL - No warranty of any kind is given. Not liable for data loss or corruption. Use at your own risk. Usage: - jfMonitor is a multi-client / server setup - each client will report file system usage to the server - any client (or server) can also ping any locally connected network which requires pcap installed. WebSite : http://jfmonitor.sf.net Source Code : https://github.com/pquiring/javaforce/tree/master/projects/jfmonitor
    Downloads: 11 This Week
    Last Update:
    See Project
  • Create and run cloud-based virtual machines. Icon
    Create and run cloud-based virtual machines.

    Secure and customizable compute service that lets you create and run virtual machines.

    Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
    Try for free
  • 5
    g3fc

    g3fc

    A modern, fast, and secure file archiver with built-in data resilience

    ...G3FC excels with its technical features: blazing-fast Zstandard compression, strong AES-256-GCM authenticated encryption, and optional Forward Error Correction (FEC) to prevent data corruption. Its unique footer design allows for instant file indexing and searching, even in massive archives, eliminating the slow scans required by formats like TAR. G3FC is built for developers and power users, with native, open-source implementations available in Rust, Go, C#, and Python for true cross-platform performance.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    DAR - Disk ARchive

    DAR - Disk ARchive

    For full, incremental, compressed and encrypted backups or archives

    DAR is a command-line backup and archiving tool that uses selective compression (not compressing already compressed files), strong encryption, may split an archive in different files of given size and provides on-fly hashing, supports differential backup with or without binary delta, ftp and sftp protocols to remote cloud storage Archive internal's catalog, allows very quick restoration even a single file from a huge, eventually sliced, compressed, encrypted archive eventually located on...
    Leader badge
    Downloads: 228 This Week
    Last Update:
    See Project
  • 7
    File Corruption Check

    File Corruption Check

    Check if there are corrupted files in a folder

    Check if there are corrupted files in a folder, the following formats are supported: .docx .jpg .png .ods .odt .pdf .pptx .xls .xlsx
    Downloads: 6 This Week
    Last Update:
    See Project
  • 8
    FreeFileSync

    FreeFileSync

    Free data backup software to synchronize files and folders

    FreeFileSync is a free Open Source software that helps you synchronize files and synchronize folders for Windows, Linux and macOS. It is designed to save your time setting up and running data backups while having nice visual feedback along the way. _______________________________________________________________ DOWNLOAD LINKS (official homepage): https://freefilesync.org/
    Downloads: 65 This Week
    Last Update:
    See Project
  • 9
    S2 Recovery Tools for Microsoft Excel

    S2 Recovery Tools for Microsoft Excel

    Makes easy MS recommended Excel recovery methods - adds 5 of its own.

    Microsoft recommends several methods for recovering Excel data from corrupt spreadsheets. S2 Recovery Tools for Microsoft Excel makes it easy to follow these recommended routines by just pressing buttons. The application also adds five methods of its own for recovery. Additionally it has its own native previous file version recovery tool which works in any version of Vista, Windows 7 and Windows 8. Another feature of the program is a preloaded search interface for finding temporary,...
    Downloads: 3 This Week
    Last Update:
    See Project
  • Dun and Bradstreet Connect simplifies the complex burden of data management Icon
    Dun and Bradstreet Connect simplifies the complex burden of data management

    Our self-service data management platform enables your organization to gain a complete and accurate view of your accounts and contacts.

    The amount, speed, and types of data created in today’s world can be overwhelming. With D&B Connect, you can instantly benchmark, enrich, and monitor your data against the Dun & Bradstreet Data Cloud to help ensure your systems of record have trusted data to fuel growth.
    Learn More
  • 10
    Savvy Repair for Microsoft Office

    Savvy Repair for Microsoft Office

    Repairs/Recovers Corrupt MS Office 2007 - 2013 Format Files

    DOCX, XLSX and PPTX files are collections of conventionally zipped mostly XML sub-files. This program first attempts repair any zip based corruption. From there it engages in four different algorithmic attempts at repair or recovery. With the first method using validation, the location of the first XML error is sought. At that point the sub-files are truncated and repaired. The second method works the same way except the XML validation is more lax. With the third, the strict XML validation is returned to and corrupt XML sub-files are truncated and repaired as before however, missing XML sub-files are brought in from blank full healthy docx, xlsx or pptx of the respective correct extension. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    XML Truncator-Fixer

    XML Truncator-Fixer

    Truncates XML at first error-uses the xmllint to add correct end tags.

    ...Additionally some extra text or data may be recoverable by changing the truncation amount to less than 50 characters.The extra truncation is needed in the first place because the XML validator used is not able to perfectly identify where the XML corruption begins and will often not flag the corruption for several characters after it begins.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Savvy DOCX Recovery

    Savvy DOCX Recovery

    Open corrupt Word DOCX files and possibly recover formatting too.

    XML was designed from the beginning to be intolerant of errors. This decision adversely affects MS Word's corruption recovery. With one error in the document.xml subfile where all the DOCX file's text is stored, instead of a partial recovery, Word will stop and throw an error. Savvy DOCX Recovery attempts to do precise surgery on corrupt Word documents to reorder or excise bad XML tags. If this doesn't work, it uses the command line app xmllint first to attempt to repair corrupt XML subfiles of the DOCX. ...
    Leader badge
    Downloads: 183 This Week
    Last Update:
    See Project
  • 13
    The SOSETSUKEN Engine

    The SOSETSUKEN Engine

    Need Vinesauce ROM Corrupter parameters? Yeah, we got that.

    The SOSETSUKEN Engine is a handy tool for generating corruption parameters for use with the Vinesauce ROM Corrupter. You simply feed it the end byte found by Auto End, the level of corruption, and the amount of sets you want to generate. Its only throttle is the speed of your PC and the space left on your hard drive. This thing is fast, simple and small. It even puts out how long it takes to generate the requested sets at the very bottom of "params.txt" (the output file). ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    Corrupt DOCX Salvager

    Corrupt DOCX Salvager

    Extract text from corrupt DOCX files where Word itself fails.

    ...Corrupt DOCX Salvager uses 7Zip, an unzipper that sometimes unzips partially corrupt document.xml files despite reporting an error. XML as a format is unforgiving of data corruption but Corrupt DOCX Salvager uses a Perl routine used to extract the text from the document.xml file which doesn't care about well-formed XML, a recovery stumbling block for Microsoft Word. Recent changes include the pretreatment of docx files with InfoZip's zip.exe -FF repair command, improving success rates. Also added are links to other solutions. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 15
    Dom's Corruptor

    Dom's Corruptor

    A program that corrupts anything you give it

    Corruption program that can be used to test files or programs to see what would happen if it were to be corrupted. Also gives logs and information on what bytes have been changed. Probably has a few bugs too.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    VMware VMDK Recovery via Accurate Result

    Use Professional VMware Recovery Software to Perfect VMDK Recovery

    VMware is one of the best ways for virtualization. But, oftentimes, user wants to recover its VMDK data from corruption cause of Virtual Machine. And here a search for commercial tools started that can easily and safely let the VMDK users restores entire data in workable mode. VMware recovery software is for you to execute proper data revival from corruption/damaged or inaccessible condition. Apart from this VMDK data recovery, this tool is also offering the deleted, lost/missing or formatted files/folders or partition recovery. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    FileScan

    FileScan

    FileScan; MD5, CRC, file monitor.

    FileScan monitors files for corruption or modification using an MD5 database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Excel Recovery Add-In

    Excel Recovery Add-In

    Add-In gathers MS recommended ways for uncorrupting Excel files.

    Update: It is probably wise to try to do a zip repair step on corrupt xlsx files as a first step before trying to invoke other methods. Microsoft recommends several methods for recovering from Excel corruption. This Excel add-in brings into one toolbar these methods while adding four data recovery methods of its own. For MS methods for recovering from Excel file corruption, see: http://office.microsoft.com/en-us/excel-help/repairing-corrupted-files-in-excel-HA001034656.aspx or here: http://office.microsoft.com/en-us/excel-help/repairing-a-corrupted-workbook-HA010097017.aspx. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Reed-Solomon encoder/decoder for Block Devices. Provides methods for enhanced data recovery from corrupted storage media, along with faster methods for reading the data when no corruption is encountered.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Repairs corrupt files by combining the good bytes from multiple corrupt copies. If you have (downloaded) many copies of the same file, and the corruptions are in different places, it is possible to fix the file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Tests quality of connection. I have initially came up with the idea for this program when I had problems in my LAN. The software is designed to diagnose packet losses and packet corruption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next