[go: up one dir, main page]

Showing 71 open source projects for "automated"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Evertune | Improve Your Brand's Visibility in AI Search Icon
    Evertune | Improve Your Brand's Visibility in AI Search

    For enterprise marketing teams looking for a platform to understand and influence how AI models like ChatGPT recommend their products or services.

    Evertune is the Generative Engine Optimization (GEO) platform that helps brands improve visibility in AI search across ChatGPT, AI Overview, Gemini, Claude and more.
    Learn More
  • 1
    Algo VPN

    Algo VPN

    Set of Ansible scripts that simplifies the setup of a personal VPN

    Introducing Algo, a self-hosted personal VPN server designed for ease of deployment and security. Algo automatically deploys an on-demand VPN service in the cloud that is not shared with other users, relies on only modern protocols and ciphers, and includes only the minimal software you need. And it’s free. For anyone who is privacy conscious, travels for work frequently, or can’t afford a dedicated IT department, this one’s for you. Really, the paid-for services are just commercial...
    Downloads: 42 This Week
    Last Update:
    See Project
  • 2
    Oxidized

    Oxidized

    Oxidized is a network device configuration backup tool

    Oxidized is a network device configuration backup and management tool that automates the process of collecting, storing, and versioning configurations from various networking hardware. Inspired by RANCID, it provides a scalable and Git-based approach to network configuration management, making it easier to track and roll back changes.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 3
    Netdata

    Netdata

    Open-source systems performance monitor

    Netdata is a well-crafted real time performance monitor to detect anomalies in your system infrastructure. Visualize many types of data including disk activity, SQL queries, website visitors and more. This tool is useful to monitor linux servers.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    VirtualBox

    VirtualBox

    Virtualization software for x86_64 hardware

    ...This flexibility makes VirtualBox ideal for developers, testers, sysadmins, or hobbyists who need different OS environments, want to test software across systems, or need isolation for development, sandboxing, or security experiments. VirtualBox offers both a user-friendly GUI as well as a command-line interface and headless mode, making it useful for desktop usage as well as server or automated environments.
    Downloads: 59 This Week
    Last Update:
    See Project
  • Securely stream and govern industrial data to power intelligent operations with agentic insights. Icon
    Securely stream and govern industrial data to power intelligent operations with agentic insights.

    For IoT Developers, Solution Architects, Technical Architects, CTOs, OT/IT Engineers

    Trusted MQTT Platform — Fully-managed and cloud-native MQTT platform for bi-directional IoT data movement.
    Learn More
  • 5
    Tsunami

    Tsunami

    Network security scanner for detecting severity vulnerabilities

    ...This poses a significant challenge for large organizations with thousands or even millions of internet-connected systems. In such hyperscale environments, security vulnerabilities must be detected and ideally remediated in a fully automated fashion. To do so, information security teams need to have the ability to implement and roll out detectors for novel security issues at scale in a very short amount of time. Furthermore, it is important that the detection quality is consistently very high.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    CapRover

    CapRover

    Scalable PaaS (automated Docker+nginx), aka Heroku on Steroids

    CapRover is an extremely easy-to-use app/database deployment & web server manager for your NodeJS, Python, PHP, ASP.NET, Ruby, MySQL, MongoDB, Postgres, WordPress (and etc...) applications! It's blazingly fast and very robust as it uses Docker, Nginx, LetsEncrypt and NetData under the hood behind its simple-to-use interface. For a developer who does not like spending hours and days setting up a server, building tools, sending code to the server, building it, getting an SSL certificate,...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 7
    Alibaba iLogtail

    Alibaba iLogtail

    Fast and Lightweight Observability Data Collector

    iLogtail was born for observable scenarios and has many production-level features such as lightweight, high performance, and automated configuration, which are widely used internally by Alibaba Group and tens of thousands of external Alibaba Cloud customers. You can deploy it in physical machines, Kubernetes and other environments to collect telemetry data, such as logs, traces and metrics. Supports a variety of Logs, Traces, and Metrics data collection, and is friendly to container and Kubernetes environment support. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 8
    Fabio

    Fabio

    Consul Load-Balancing made simple

    ...Traditional load balancers and reverse proxies need to be configured with a config file. The configuration contains the hostnames and paths the proxy is forwarding to upstream services. This process can be automated with tools like consul-template that generate config files and trigger a reload. Fabio works differently since it updates its routing table directly from the data stored in Consul as soon as there is a change and without restart or reloading. When you register a service in Consul all you need to add is a tag that announces the paths the upstream service accepts, e.g. urlprefix-/user or urlprefix-/order and fabio will do the rest. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9

    Linpac

    Amateur Radio AX.25 chat and PBBS program using Linux's AX.25 stack

    A modular console-oriented amateur radio AX.25 keyboard to keyboard chat and PBBS program using Linux's AX.25 stack. Includes support for multiple concurrent connected sessions, a unconnected (UI) message screen, and an automated packet message client
    Leader badge">
    Downloads: 9 This Week
    Last Update:
    See Project
  • The CRM you will want to use every day Icon
    The CRM you will want to use every day

    With CRM, Sales, and Marketing Automation in one, Act! gives you everything you need for happier clients, more revenue, and less stress.

    Act! Premium is perfect for small and midsize businesses looking to market better, sell more, and create customers for life. With unparalleled flexibility and freedom of choice, Act! Premium accommodates the unique ways you do business. Whether it’s customizations to fit your specific business or industry processes or your preferences for deployment and access, the possibilities with Act! Premium are limitless.
    Learn More
  • 10
    GestioIP IPAM - IP address management
    An automated, Web based IP address management (IPAM) software. It features powerful search and filter functions for both networks and host, as well as many tools (e.g. a subnet calculator) helping Administrators to plan and handle complex IP networks
    Leader badge">
    Downloads: 81 This Week
    Last Update:
    See Project
  • 11

    Network Enumeration Tool

    Network Enumeration Tool for Host Exploration and Recon

    N-ETHER (Network Enumeration Tool for Host Exploration and Reconnaissance) is a robust and highly automated Python script designed to streamline the critical initial phases of network security auditing and penetration testing. It’s core purpose is to perform fast, comprehensive, and consistent host and port discovery across single targets or large lists of IP addresses. N-ETHER functions as an intelligent, opinionated wrapper around the powerful nmap tool, bundling best-practice scanning techniques—including service versioning, NSE scripting, and intelligent port selection—into a single, easy-to-use utility. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 12
    MrFish

    MrFish

    A anti-phishing Python script with headers and proxies!

    MrFish is a powerful tool designed to automate the creation of fake account submissions for phishing tests and vulnerability assessments. With the ability to generate random usernames, passwords, and even credit card data, it simulates real user behavior to help test the security of online forms. Featuring customizable settings for proxy support, user inputs (email or username), and multiple threads for speed, MrFish provides an efficient way to stress-test web servers and form-handling...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    NagiosQL - Nagios configuration tool
    NagiosQL is a professional, web based configuration tool for Nagios 2.x/3.x/4.x. It is designed for large enterprise requirements as well as small environments. Any Nagios functionalities are supported.
    Leader badge">
    Downloads: 41 This Week
    Last Update:
    See Project
  • 14
    NDW - Network Data Wiping Hard Disks HDD

    NDW - Network Data Wiping Hard Disks HDD

    Wipe erase data from hdds on the network, unlimited hard disks

    Automated network based hard disk drives / storage devices erasure is server based software which installs on a central server. Server is connected to network switches and several PXE boot enabled workstations are attached to the network. As soon as the workstation is powered on, it boots off the network via the server and begins wiping all the attached hard disk drives.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 15
    RemoteSploit

    RemoteSploit

    Automated exploitation tool for SSH and RDP

    Automated exploitation tool for SSH and RDP
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    Free Ping Network Checker

    Free Ping Network Checker

    This application can test internal and external addresses

    This application can test internal and external addresses and provide you with alerts to let you know if and when it has failed. There are also log files produced for each pinger of which you can have 3 at any one time with the free application. https://blog.itshass.uk/development/vb-net/pinger/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Integrated packet generator and sniffer for Ethernet, but also works with blocks of data over TCP connection. Enables you to use scripts for automated testing, monitoring, imitating of various network objects, creating custom network tools.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Origin

    Origin

    Community Distribution of Kubernetes

    Origin, also known as OKD is the community distribution of Kubernetes that has been optimized for continuous application development and multi-tenant deployment. It adds developer and operations-centred tools to Kubernetes to speed up application development and simplify deployment, scaling, as well as long-term lifecycle maintenance. It also makes it easier to launch Kubernetes on any cloud or bare metal and run and update clusters, while providing all the necessary tools for creating...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    DOClever

    DOClever

    The best interface management platform

    DOClever is a commercial open-source product that is completely free. Whether you are a front-end engineer or a back-end engineer, the interface is always the bridge for the interaction between the two, so DOClever is specially designed for small and medium-sized teams, aiming to solve interface management, testing and data generation, and achieve a truly integrated solution plan. Can edit and manage interface information, support five methods of getting, post, put, delete, patch, support...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 20
    Scrollout F1

    Scrollout F1

    An easy-to-use anti-spam email gateway

    • Designed for Linux and Windows email system administrators, Scrollout F1 is an easy to use, already adjusted email firewall (gateway) offering free anti-spam and anti-virus protection aiming to secure existing email servers, old or new, such as Microsoft Exchange, Lotus Domino, Postfix, Exim, Sendmail, Qmail and others. • Built-in multilayer security levels make configuration effort equal to a car radio. • It combines simplicity with effective protection using powerful open source...
    Leader badge">
    Downloads: 103,575 This Week
    Last Update:
    See Project
  • 21
    Chrome-Cut

    Chrome-Cut

    Python3 tool to scan, detect and control chromecast devices

    ...It gives you the ability to detect, scan and send some useful HTTP requests "Commands" to endless amount of chromecast devices. As well as the ability to loop the commands so the process of repeating it will be automated with a set duration in-which the looping will be done.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    lua-resty-waf

    lua-resty-waf

    High-performance WAF built on the OpenResty stack

    lua-resty-waf is a web application firewall implemented in Lua for OpenResty/NGINX, designed to run inline at the edge with low overhead. It inspects requests and responses during NGINX phases, applying rule logic and anomaly scoring to detect patterns like SQL injection, cross-site scripting, and protocol abuse. Rules are organized into policies with configurable actions—block, log, or allow—and can leverage shared dictionaries for counters, rate limits, and caching decisions. Because it...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    RC-EXPLOITER

    RC-EXPLOITER

    Brute-forcing WAN/LAN services

    The author does not hold any responsibility about the bad use of this script remember that attacking targets without prior consent is illegal and punish by law, this script as build to show how msf resource files can automated tasks. Scanning WAN networks In search of targets may take 10 to 15 minutes depending of your network connection, and will search In 1024 random hosts For the selected service/port, also the File 'brute.txt' may be edited to insert new entrys, or we can provide the full path to another dicionary File to be used In brute-forcing services. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    ARRIS Cloud Platform

    ARRIS Cloud Platform

    ARRIS Cloud Platform IaaS/PaaS Platform & Services

    ARRIS Cloud Platform (ACP) is a container-centric suite of common services for general use, such as a database server, log aggregator, and load balancer. Each service is HA and monitored, with an automated deployment process. Validation and testing of ACP is presently done primarily in VMware; however, ACP is designed to be agnostic to the virtualization infrastructure wherever possible.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    LLDP Generator

    The project is a valid Link Layer Discovery Protocol frame generator

    ...The ussage mode is a combination between a classic CLI command(e.g. ping, traceroute) and a command issued on a Cisco device where the user can interogate everytime the application for possible commands. The purpose of this project is to test the behavior of different LLDP agents in difficult situations. Based on this application, mutiple automated tests can be made for testing the behavior of a LLDP neighbor. Example of tests: 1. Sending a large number of LLDP frames each containing all TLVs, each TLV having a large amount of informations. 2. Sending a large number of LLDP frames at a short interval and inspect the LLDP neighbor's database. 3. Try to overload some TLVs(adding more information than is permited) and inspect neighbor's database.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next