[go: up one dir, main page]

Showing 15 open source projects for "content"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • The only CRM built for B2C Icon
    The only CRM built for B2C

    Stop chasing transactions. Klaviyo turns customers into diehard fans—obsessed with your products, devoted to your brand, fueling your growth.

    Klaviyo unifies your customer profiles by capturing every event, and then lets you orchestrate your email marketing, SMS marketing, push notifications, WhatsApp, and RCS campaigns in one place. Klaviyo AI helps you build audiences, write copy, and optimize — so you can always send the right message at the right time, automatically. With real-time attribution and insights, you'll be able to make smarter, faster decisions that drive ROI.
    Learn More
  • 1
    ModSecurity

    ModSecurity

    Cross platform web application firewall (WAF) engine for Apache

    ...The library codebase serves as an interface to ModSecurity Connectors taking in web traffic and applying traditional ModSecurity processing. In general, it provides the capability to load/interpret rules written in the ModSecurity SecRules format and apply them to HTTP content provided by your application via Connectors. Before starting the compilation process, make sure that you have all the dependencies in place.
    Downloads: 20 This Week
    Last Update:
    See Project
  • 2
    Zeek

    Zeek

    Zeek is a powerful network analysis framework

    ...Rather, Zeek sits on a “sensor,” a hardware, software, virtual, or cloud platform that quietly and unobtrusively observes network traffic. Zeek interprets what it sees and creates compact, high-fidelity transaction logs, file content, and fully customized output, suitable for manual review on disk or in a more analyst-friendly tool like a security and information event management (SIEM) system.
    Downloads: 19 This Week
    Last Update:
    See Project
  • 3
    x64dbg

    x64dbg

    An open-source x64/x32 debugger for windows.

    An open-source x64/x32 debugger for windows. Development is done on GitHub (https://github.com/x64dbg/x64dbg). Daily snapshots are uploaded here, snapshots for every commit can be found on http://releases.x64dbg.com
    Leader badge">
    Downloads: 9,686 This Week
    Last Update:
    See Project
  • 4
    Securepoint Squid eCAP Antivirus adapter

    Securepoint Squid eCAP Antivirus adapter

    Antivirus eCAP adapter for Squid 3.1 and above.

    Securepoint Antivirus eCAP adapter for Squid 3.1 and above.
    Downloads: 1 This Week
    Last Update:
    See Project
  • The Apple Device Management and Security Platform Icon
    The Apple Device Management and Security Platform

    For IT teams at organizations that run on Apple

    Achieve harmony across your Apple device fleet with Kandji's unmatched management and security capabilities.
    Learn More
  • 5
    justniffer
    ...It reassembles and reorders packets and displays the tcp flow in a customizable way. It can log network traffic in web server log format. It can also log network services performances (e.g. web server response times) and extract http content (images, html, scripts, etc)
    Downloads: 6 This Week
    Last Update:
    See Project
  • 6

    qpwmc

    A graphical Password Manager Daemon client.

    QPwmc is a full featured graphical pwmd client using the Qt toolkit and libpwmd to edit a pwmd data file. The interface is similar to a file manager but rather than a tree of folders on a filesystem it edits a tree of XML elements and their attributes. It uses a PwmdDialog class to makes it easy to integrate into your own projects.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 7
    ...Developed to demonstrate the usability of OVAL Definitions and to ensure correct syntax and adherence to the OVAL Schemas by definition writers, it is not a fully functional scanning tool nor an enterprise scanning tool. It is a simplistic, command-line application that has the ability to execute OVAL Content on an end system. To learn more about organizations that provide OVAL content and tools or otherwise support the OVAL Language, please see the OVAL Adoption Program (http://oval.mitre.org/adoption/).
    Downloads: 5 This Week
    Last Update:
    See Project
  • 8
    PhishBlock

    PhishBlock

    A program that detects and blocks phishing, pharming, Hacker's C&C.

    PhishBlock is a security program that detects and blocks Phishing, Pharming, Hacker’s C&C(Command and Control) Servers which are located in databases with URLs, DNS hostnames, and IP Addresses. This program detects and blocks Malware URLs, bad Hosts, and bad IP addresses. Recently, most malware codes are delivered covertly to users’ personal computers through Google ads, SNS, Blogs, BBS and so on, which users visit often. And After the malware codes connect the C&C server(or...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9

    ICAP Phrase Filter Daemon

    ICAP Daemon that implements content scanning

    icappfd is an ICAP daemon that can scan and change responses received from an HTTP server. It scans content for phrases, assigns a score to a page and will redirect to a block url for each page with a score that passes a pre-configured limit... It's kinda like a spam filter for the web. icappfd is used with proxy servers (squid3, and probably others) to protect users from certain types of content such as gambling, peer2peer, porn etc etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 10
    collabREate is an Ida Pro plugin and remote server component designed to facilitate collaborative reverse engineering and synchronization of database content across differing versions of Ida Pro.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    SIM Card Manager

    SIM Card Manager

    Windows tool to read SIM card information and content

    SIMCardManager is Windows tool that can read a SIM card information (ICCID, IMSI, Pin states) and SIM card content : phone book (ADN), Fixed dialing (FDN) and SMS messages. It also enables you to authenticate with PIN when activated and export SIM card content to text files. You need to have a PC/SC compatible smart card reader or dongle with SIM slot. You can find other useful tools on my website http://www.idrix.fr
    Leader badge">
    Downloads: 119 This Week
    Last Update:
    See Project
  • 12
    kokla
    Simple tool for file encryption and folder content encryption with AES 256. Files can also be hashed with a SHA1 signature. A command line version is available as well as a GUI version. One other useful feature is to encrypt messages for emails.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    CECID is a PHP script designed to anonymize and cloak HTTP requests on restrictive connections. CECID is run on a remote, unrestricted server, and accesses pages for users, editing the page's source in realtime to evade content filtering software.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Infranet is a system that attempts to circumvent web censorship by allowing clients to surreptitiously request sensitive content via cooperating Web servers distributed across the global Internet.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    SecureShareExample

    SecureShareExample

    EaseFilter File Secure Sharing Example

    ...Digital Rights Management (DRM) enforces how files can be viewed, copied, printed, shared, or modified. Instead of granting blanket access, DRM attaches enforceable usage policies to content. With EaseFilter DRM, you can: Restrict access to authorized users, devices, and applications only. Block forwarding, uploading to unauthorized cloud services, or syncing to personal drives. Apply time-based access (expiration dates) and geo/device restrictions. Maintain tamper-evident audit trails for compliance and forensics.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next