Showing 237 open source projects for "ids"

View related business solutions
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 1
    iCn3D

    iCn3D

    Web-based protein structure viewer and analysis tool

    ...The complete package of iCn3D including Three.js and jQuery is in the directory "dist" after you get the source code with the "Code" button. View a 3D structure in iCn3D, input a PDB ID, and click "Load". You can also click the "File" menu to "Open File" or input other IDs. You can open a browser in your Virtual Reality (VR) headset and view a 3D structure in iCn3D. Then click the button "Enter VR" at the bottom center of your browser to enter the VR view. You can select residues with the trigger button.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    Tiktoken

    Tiktoken

    tiktoken is a fast BPE tokeniser for use with OpenAI's models

    tiktoken is a high-performance, tokenizer library (based on byte-pair encoding, BPE) designed for use with OpenAI’s models. It handles encoding and decoding text to token IDs efficiently, with minimal overhead. Because tokenization is a fundamental step in preparing text for models, tiktoken is optimized for speed, memory, and correctness in model contexts (e.g. matching OpenAI’s internal tokenization). The repo supports multiple encodings (e.g. “cl100k_base”) and lets users switch encoding names to match different model contexts. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    AWS Secrets Manager JDBC Library

    AWS Secrets Manager JDBC Library

    The AWS Secrets Manager JDBC Library for Java developers

    The AWS Secrets Manager JDBC Library enables Java developers to easily connect to SQL databases using secrets stored in AWS Secrets Manager. We provide database drivers that intercept calls to real database drivers and swap out secret IDs for actual login credentials. This prevents hard-coding database credentials into your application code. This can be integrated into your app through a few configuration file changes. Change the jdbc url to one that our driver will intercept (starting with jdbc-secretsmanager), Change the c3p0 user to be the secret ID of the secret in secrets manager that has the username and password, and change the driverClass to be our driver wrapper. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    Live-Forensicator

    Live-Forensicator

    A suite of Tools to aid Incidence Response and Live Forensics

    Live-Forensicator is a toolkit intended for live forensic collection and initial triage on Windows machines. It automates the capture of volatile information—running processes, network connections, loaded drivers, account sessions, and in-memory artifacts—into a consistent artifact set that investigators can analyze offline. The tool tries to be non-invasive while collecting sensitive data quickly and logs the collection steps to preserve chain-of-custody details and to help auditors...
    Downloads: 3 This Week
    Last Update:
    See Project
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 5
    Network Flight Simulator

    Network Flight Simulator

    A utility to safely generate malicious network traffic patterns

    flightsim is a lightweight utility used to generate malicious network traffic and help security teams to evaluate security controls and network visibility. The tool performs tests to simulate DNS tunneling, DGA traffic, requests to known active C2 destinations, and other suspicious traffic patterns.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6
    MiniOneRec

    MiniOneRec

    Minimal reproduction of OneRec

    ...The framework provides an end-to-end pipeline for building generative recommender systems, including semantic identifier construction, supervised fine-tuning, and reinforcement learning-based optimization. Semantic IDs are created using techniques such as quantized variational autoencoders to convert item features into token sequences that can be modeled by transformer architectures. Developers can train and evaluate recommendation models using different backbone language models while benefiting from the generative framework’s parameter efficiency and scalability.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    SOFA

    SOFA

    The best way to create REST APIs

    ...The idea behind Models is to not expose full objects in every response, especially if it's nested, not first-level data. For example, when fetching a list of chats you don't want to include all messages in the response, you want them to be just IDs (or links). Those messages would have to have their own endpoint. We call this type of data, a Model. In REST you probably call them Resources.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    GraphQL Batch

    GraphQL Batch

    A query batching executor for the graphql gem

    ...Although this library doesn't have a dependency on active record, the examples directory has record and association loaders for active record which handles edge cases like type-casting ids. GraphQL::Batch::Loader#load returns a Promise using the promise.rb gem to provide a promise-based API, so you can transform the query results using .then.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Ansible Automation Platform Workshops

    Ansible Automation Platform Workshops

    Training course for Ansible automation platform

    The Red Hat Ansible Automation Workshops project is intended for effectively demonstrating Ansible's capabilities through instructor-led workshops or self-paced exercises. These interactive learning scenarios provide you with a pre-configured Ansible Automation Platform environment to experiment, learn, and see how the platform can help you solve real-world problems. The environment runs entirely in your browser, enabling you to learn more about our technology at your pace and time. The...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 10
    PeerJS

    PeerJS

    Simple peer-to-peer with WebRTC

    PeerJS wraps the browser's WebRTC implementation to provide a complete, configurable, and easy-to-use peer-to-peer connection API. Equipped with nothing but an ID, a peer can create a P2P data or media stream connection to a remote peer. To broker connections, PeerJS connects to a PeerServer. Note that no peer-to-peer data goes through the server. The server acts only as a connection broker. If you don't want to run your own PeerServer, we offer a free cloud-hosted version of PeerServer....
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    SecretScanner

    SecretScanner

    Find secrets and passwords in container images and file systems

    ...Secrets are any kind of sensitive or private data that gives authorized users permission to access critical IT infrastructure (such as accounts, devices, networks, cloud based services), applications, storage, databases, and other kinds of critical data for an organization. For example, passwords, AWS access IDs, AWS secret access keys, Google OAuth Key etc. are secrets. Secrets should be strictly kept private. However, sometimes attackers can easily access secrets due to flawed security policies or inadvertent mistakes by developers. Sometimes developers use default secrets or leave hard-coded secrets such as passwords, API keys, encryption keys, SSH keys, tokens, etc. in container images, especially during rapid development and deployment cycles in CI/CD pipeline. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    Tarsier

    Tarsier

    Vision utilities for web interaction agents

    ...In the video below, we use Tarsier to provide webpage perception for a minimalistic GPT-4 LangChain web agent. Tarsier visually tags interactable elements on a page via brackets + an ID e.g. [23]. In doing this, we provide a mapping between elements and IDs for an LLM to take actions upon (e.g. CLICK [23]). We define interactable elements as buttons, links, or input fields that are visible on the page; Tarsier can also tag all textual elements if you pass tag_text_elements=True. Furthermore, we've developed an OCR algorithm to convert a page screenshot into a whitespace-structured string (almost like ASCII art) that an LLM even without vision can understand. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    panicparse

    panicparse

    Crash your app in style (Golang)

    ...HTTP web server that serves a very tight and swell snapshot of your goroutines, much more readable than net/http/pprof. >50% more compact output than original stack dump yet more readable. Deduplicates redundant goroutine stacks. Useful for large server crashes. Arguments as pointer IDs instead of raw pointer values. Pushes stdlib-only stacks at the bottom to help focus on important code. Parses the source files if available to augment the output. Works on any platform supported by Go, including Windows, macOS, linux. Full go module support.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Amazon EC2 Spot Interrupter

    Amazon EC2 Spot Interrupter

    CLI tool that triggers Amazon EC2 Spot Interruption Notifications

    Amazon EC2 Spot Instances let you run flexible, fault-tolerant, or stateless applications in the AWS Cloud at up to a 90% discount from On-Demand prices. Spot instances are regular EC2 capacity that can be reclaimed by AWS with a 2-minute notification called the Interruption Notification. Applications that are able to gracefully handle this notification and respond by check pointing or draining work can leverage Spot for deeply discounted compute resources! In addition to Interruption...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Selenium-python Helium

    Selenium-python Helium

    Selenium-python but lighter: Helium is the best Python library

    Under the hood, Helium forwards each call to Selenium. The difference is that Helium's API is much more high-level. In Selenium, you need to use HTML IDs, XPaths and CSS selectors to identify web page elements. Helium on the other hand lets you refer to elements by user-visible labels. As a result, Helium scripts are typically 30-50% shorter than similar Selenium scripts. What's more, they are easier to read and more stable with respect to changes in the underlying web page. Selenium-python is great for web automation. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    OpenSign

    OpenSign

    🔥 The free & Open Source DocuSign alternative

    The premier open source document signing solution (DocuSign alternative). Welcome to OpenSign, the premier open source docusign alternative - document e-signing solution designed to provide a secure, reliable and free alternative to commercial esign platforms like DocuSign, PandaDoc, SignNow, Adobe Sign, Smartwaiver, SignRequest, HelloSign & Zoho sign. Our mission is to democratize the document signing process, making it accessible and straightforward for everyone.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 18

    Hardware Serial Spoofer

    An open-source tool for managing and modifying hardware ID

    Hardware Identity Manager (HIM) is a powerful utility designed for advanced users, developers, and security researchers to manage the hardware identification values of their Windows-based systems.
    Downloads: 50 This Week
    Last Update:
    See Project
  • 19
    Optimus id transformation

    Optimus id transformation

    Id obfuscation based on Knuth's multiplicative hashing method for PHP

    With this library, you can transform your internal IDs to obfuscated integers based on Knuth's integer hash. It is similar to Hashids but will generate integers instead of random strings. It is also super fast. If you will be running your code on a 32-bit system or will be working with large prime numbers it is suggested that you install the GMP extension.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Process Monitor

    Process Monitor

    Advanced monitoring tool for Windows

    ...It merges the capabilities of the older Filemon and Regmon utilities while adding powerful enhancements like non-destructive filtering and detailed event properties. Users can capture comprehensive data including session IDs, user names, thread stacks, and process details such as image paths and command lines. The tool supports highly configurable views with movable columns and filters applicable to any event field without losing captured data. It can log tens of millions of events with an architecture that scales to gigabytes of log data, enabling in-depth system troubleshooting and malware hunting. ...
    Downloads: 451 This Week
    Last Update:
    See Project
  • 21
    Bridge L2 ETH from a testnet to your own chain using Nethereum and chain IDs
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    HWID Spoofer - Hardware ID Changer

    HWID Spoofer - Hardware ID Changer

    The best HWID Spoofer in 2025.

    TraceX is a powerful and advanced HWID Spoofer designed to bypass anti-cheat systems in games like Valorant, Apex Legends, Warzone, Fortnite, and more. It spoofs critical system identifiers such as disk serials, MAC addresses, BIOS UUIDs, motherboard and GPU IDs, and even EFI boot variables. This HWID Spoofer also includes a full system cleaner that removes traces of game activity, browser data, event logs, Xbox and Discord accounts, and network fingerprints. With deep spoofing of CPU, motherboard, and SCSI disk data, plus built-in VPN setup and game uninstallation tools, HWID Spoofer offers one of the most complete spoofing solutions available. ...
    Leader badge
    Downloads: 1,175 This Week
    Last Update:
    See Project
  • 23

    Suricata Anti-DDoS Lab

    Suricata VMware VM dor IDS practicing

    Suricata Anti-DDoS Security Lab (Debian 13 VMware Virtual Machine): Preconfigured VMware virtual machine for educational network security monitoring and intrusion detection using Suricata. Designed for hands-on IDS and SOC-style training in a controlled lab environment. Includes the following integrated services: + Suricata – network intrusion detection and traffic inspection + EveBox – alert visualisation and event analysis + DVWA – vulnerable web application for traffic generation and testing + phpMyAdmin – database management and inspection Default setup demonstrates DDoS-related detection scenarios, but the lab is fully customisable for other network-based attacks. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 24
    Request TLE

    Request TLE

    Request TLE for given satellites and save it to the file

    ...It's strongly recommended register on the website "n2yo(dot)com/api/" and get your own key due to limitations of amount requests. To personalize list of the satellites, add your desired satellite IDs at line 3 and further. As an example, there are three satellite IDs added by default.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 25
    Cerberix Linux
    A security-focused, desktop-ready Arch Linux derivative. Hardened by default with XFCE, firewall, IDS, and VPN tooling preconfigured.
    Downloads: 327 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB