[go: up one dir, main page]

Showing 41 open source projects for "metadata"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Cortex: Boost Developer Coding Skills Icon
    Cortex: Boost Developer Coding Skills

    Cortex makes coding easier and faster for developers. See how our portal connects tools and cuts busywork.

    Cortex is a simple portal that helps developers work smarter by linking all your tools, setting clear rules, and slashing repetitive tasks. It speeds up onboarding, updates old code, and fixes issues fast. Over 100 big companies use it to save time and get better results.
    Try it now!
  • 1
    kube2iam

    kube2iam

    Provides different AWS IAM roles for pods running on Kubernetes

    ...Traditionally in AWS, service level isolation is done using IAM roles. IAM roles are attributed through instance profiles and are accessible by services through the transparent usage by the aws-sdk of the ec2 metadata API. When using the aws-sdk, a call is made to the EC2 metadata API which provides temporary credentials that are then used to make calls to the AWS service. The problem is that in a multi-tenanted containers based world, multiple containers will be sharing the underlying nodes. Given containers will share the same underlying nodes, providing access to AWS resources via IAM roles would mean that one needs to create an IAM role which is a union of all IAM roles. ...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 2
    SLSA GitHub Generator

    SLSA GitHub Generator

    Language-agnostic SLSA provenance generation for Github Actions

    This repository contains free tools to generate and verify SLSA Build Level 3 provenance for native GitHub projects using GitHub Actions. Developers can build their software using a secure process that protects against many supply chain attacks and tampering. Users of their software can verify a tamper-proof statement of the process to know how the software was created.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 3
    Detect It Easy

    Detect It Easy

    Program for determining types of files for Windows, Linux and MacOS

    Detect It Easy (DiE) is a tool for determining the type and internal features of binary and other file formats. It is widely used by malware analysts, digital forensics investigators, reverse engineers, and security researchers to quickly inspect unknown files and infer their type, architecture, compiler/packer used, and internal structure. DiE supports a large variety of file formats — from common executables (Windows PE, Linux ELF, macOS Mach-O) to archives, mobile packages (APK, IPA),...
    Downloads: 155 This Week
    Last Update:
    See Project
  • 4
    Asciinema Server

    Asciinema Server

    Platform for hosting and sharing terminal session recordings

    asciinema-server is the backend component of the asciinema suite. Built with Elixir and Phoenix, it provides an API and web UI for hosting, sharing, and managing terminal session recordings (asciicasts). It allows you to self-host your own instance or use the public asciinema.org.
    Downloads: 6 This Week
    Last Update:
    See Project
  • Globalscape Enhanced File Transfer (EFT) is a best-in-class managed file transfer (MFT) solution Icon
    Globalscape Enhanced File Transfer (EFT) is a best-in-class managed file transfer (MFT) solution

    For Windows-Centric Organizations Looking for Secure File Transfer solutions

    Globalscape’s Enhanced File Transfer (EFT) platform is a comprehensive, user-friendly managed file transfer (MFT) software. Thousands of Windows-Centric Organizations trust Globalscape EFT for their mission-critical file transfers.
    Learn More
  • 5
    malware-samples

    malware-samples

    A collection of malware samples and relevant dissection information

    This repo is a public collection of malware samples and related dissection/analysis information, maintained by InQuest. It gathers various kinds of malicious artifacts, executables, scripts, macros, obfuscated documents, etc., with metadata (e.g., VirusTotal reports), file carriers, and sample hashes. It’s intended for malware analysts/researchers to help study how malware works, how they are delivered, and how it evolves.
    Downloads: 22 This Week
    Last Update:
    See Project
  • 6
    Lantern

    Lantern

    Tool to access videos, messaging, and other popular apps

    Can't access your favorite apps? Download Lantern to easily access videos, messaging, and other popular apps while at school or work. Lantern is an application that allows you to bypass firewalls to use your favorite applications and access your favorite websites. Lantern does not cooperate with any law enforcement in any country. Lantern encrypts all of your traffic to blocked sites and services to protect your data and privacy. Lantern passed multiple third party white box security audits...
    Downloads: 29 This Week
    Last Update:
    See Project
  • 7
    Accrescent

    Accrescent

    A novel Android app store focused on security, privacy, and usability

    Accrescent is a private and secure Android app store built with modern features in mind. It aims to provide a developer-friendly platform and pleasant user experience while enforcing modern security and privacy practices and offering robust validity guarantees for installed apps. A novel Android app store focused on security, privacy, and usability. Open-source forever.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Awesome Privacy

    Awesome Privacy

    A curated list of privacy & security-focused software and services

    Awesome Privacy is a curated directory of privacy-respecting alternatives to mainstream apps and services, organized across many categories like browsers, search, email, messaging, cloud storage, and operating systems. It aims to help you choose tools that reduce tracking, fingerprinting, and data collection without sacrificing usability. Each entry highlights the project’s core properties—such as open source status, end-to-end encryption, and platform availability—so you can evaluate...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 9
    GOAD (Game of Active Directory)

    GOAD (Game of Active Directory)

    game of active directory

    ...Analysts can filter, cluster, and explore these relationships to identify infrastructure patterns, potential subdomains, or attack surfaces. Integrations may include metadata like geolocation, WHOIS, and risk scoring to prioritize leads. GOAD helps teams transition from fragmented OSINT tools to a unified reconnaissance dashboard where exploration and filtering are first-class.
    Downloads: 6 This Week
    Last Update:
    See Project
  • Combine Jira and SCM data to improve team performance Icon
    Combine Jira and SCM data to improve team performance

    For engineering leaders who need to foster alignment with the business and streamline their operations for better efficiency and higher productivity

    Jellyfish is the leading Engineering Management Platform, providing complete visibility into engineering organizations, the work they do, and how they operate. By analyzing engineering signals from Git and Jira, qualitative team feedback, and contextual business data from roadmapping, incident response, HR, calendar, and collaboration tools, Jellyfish enables engineering leaders to align engineering decisions with business initiatives and deliver the right software, efficiently, on time. With Jellyfish, engineering leaders can focus their teams on what matters most to the business, driving strategic decisions and delivering results.
    Learn More
  • 10
    2FAS Pass iOS

    2FAS Pass iOS

    Source code for 2FAS Pass iOS app

    ...The app allows users to add authentication tokens by scanning QR codes, automatically generate secure rotating codes, and protect access with Face ID or Touch ID, all while keeping secrets encrypted on-device. Like its Android counterpart, 2FAS Pass iOS works offline and does not require an account, preserving anonymity and avoiding metadata collection by design. It integrates with optional 2FAS browser extensions and companion tools to streamline login workflows across websites and services that support MFA. The client’s interface is crafted to be intuitive for Apple users, following iOS conventions while providing powerful multi-factor authentication support.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    2FAS Pass Android

    2FAS Pass Android

    Source code for 2FAS Pass Android app

    ...The app supports scanning QR codes to add new authentication tokens, allows local encrypted storage of secrets, and can restore tokens from backups or synced devices. 2FAS focuses on privacy and simplicity—tokens aren’t sent to third parties, metadata isn’t stored externally, and users can secure the app with biometrics or passcodes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Coraza

    Coraza

    OWASP Coraza WAF is a golang modsecurity compatible firewall library

    ...CRS protects from many common attack categories including: SQL Injection (SQLi), Cross Site Scripting (XSS), PHP & Java Code Injection, HTTPoxy, Shellshock, Scripting/Scanner/Bot Detection & Metadata & Error Leakages. Coraza is a library at its core, with many integrations to deploy on-premise Web Application Firewall instances.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13
    KubeArmor

    KubeArmor

    Runtime Security Enforcement System

    KubeArmor is a runtime Kubernetes security engine. It uses eBPF and Linux Security Modules(LSM) for fortifying workloads based on Cloud Containers, IoT/Edge, and 5G networks. It enforces policy-based controls. KubeArmor is a runtime Kubernetes security engine. It uses eBPF and Linux Security Modules(LSM) for fortifying workloads based on Cloud Containers, IoT/Edge, and 5G networks. It enforces policy-based controls. KubeArmor lessens the attack surface on pods, containers, and virtual...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Tomb

    Tomb

    the Crypto Undertaker

    ...The interface is deliberately simple—dig a tomb, forge a key, lock it, and open it—yet provides hooks to bind directories or run scripts on open/close so you can tailor behavior to your workstation. Permissions and ownership hygiene are emphasized to avoid leaking metadata, and the tool favors auditable shell operations that experienced users can inspect. Tomb’s model suits people who want encrypted containers with Unix-friendly ergonomics, keeping secrets safe while integrating cleanly into everyday scripts and workflows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Live-Forensicator

    Live-Forensicator

    A suite of Tools to aid Incidence Response and Live Forensics

    ...The tool tries to be non-invasive while collecting sensitive data quickly and logs the collection steps to preserve chain-of-custody details and to help auditors understand potential collection side effects. Because live collection can alter system state, Live-Forensicator includes options to limit intrusive actions and to capture hashes, timestamps, and provenance metadata to aid later validation. The output bundles are often compatible with other forensic parsers and workflows, which helps teams move from initial triage to deep-dive forensic analysis without re-running collection tasks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    spyware

    A complete SpyWare.

    ...This spyware is not a virus, it does not export any data to a server. Data is stored locally only. Do not use it for illegal purposes. - Save keyboard events - Record from microphone - Save files metadata in CSV file - Screenshots - Pictures from Webcam - Domains and IP addresses from metadata - Save clipboard
    Downloads: 78 This Week
    Last Update:
    See Project
  • 17
    MetaRemover Toolkit

    MetaRemover Toolkit

    Open-source toolkit for removing metadata from files locally

    MetaRemover Toolkit is an open-source Python-based toolkit for removing metadata (EXIF, GPS, author, device information) from images and documents. The project demonstrates privacy-first metadata removal using local processing without uploading files to third-party servers. This toolkit complements the online service https://metaremover.com and can be used by developers, researchers, and privacy-conscious users.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 18
    BypassHash

    BypassHash

    This tool downloads an executable and bypasses hash-based virus checks

    This tool downloads an executable, ELF (Linux) and PE (Windows), modify metadata to bypasses hash-based virus checks and protect against identification with metadata (like rich headers, timestamps, ...).
    Downloads: 9 This Week
    Last Update:
    See Project
  • 19

    KPEnhancedEntryView

    An enhanced entry view panel for KeePass

    This is a plugin to KeePass <http://www.KeePass.info> to provide an enhanced entry view. For the rationale and design behind this project, see the forum post linked to as the homepage
    Leader badge">
    Downloads: 149 This Week
    Last Update:
    See Project
  • 20

    Oculus

    Oculus - OSINT VM

    A pre-configured Kali Linux virtual machine designed for Open Source Intelligence investigations, including essential tools for reconnaissance, social media research, metadata analysis, and reporting, with privacy and cleanup adjustments applied
    Downloads: 3 This Week
    Last Update:
    See Project
  • 21

    YoungerSibling

    YoungerSibling: Cross-platform OSINT tool for quick data gathering.

    YoungerSibling is a Python-based terminal utility script designed for educational purposes. It provides a set of useful tools to perform tasks like searching the web, performing lookups (Google search, IP lookup, username lookup, etc.), and extracting metadata from images, directly from the terminal. This project aims to help students, developers, and hobbyists learn about web scraping, API usage, and terminal interaction with Python.
    Downloads: 17 This Week
    Last Update:
    See Project
  • 22
    WipeFreeSpace

    WipeFreeSpace

    Secure wiping/shredding of free disk space with many methods

    WipeFreeSpace is a program to securely erase/wipe/overwrite/shred the free space on file systems WITHOUT DESTROYING EXISTING FILES, to prevent recovery of deleted sensitive data. This allows protecting the user's privacy when e.g. selling the drive or the whole computer. The following filesystems are supported: - Ext2/3/4, - NTFS, - XFS, - ReiserFSv3/4, - FAT12/16/32, - MinixFS1/2, - JFS, - HFS/HFS+, - OCFS. The following wiping methods are supported: Gutmann-like, random,...
    Leader badge">
    Downloads: 125 This Week
    Last Update:
    See Project
  • 23

    url-checker-php-sdk

    Official PHP SDK for the EmailVeritas URL Checker API

    ...It enables developers to classify and analyze URLs directly from PHP applications using simple methods for URL Lookup and URL Scan. Lightweight and dependency-free, the SDK performs redirect-chain, WHOIS, and HTML metadata analysis. Composer support makes integration seamless with PSR-4 autoloading. Ideal for CRMs, contact forms, and security dashboards. Features: • Real-time phishing detection • URL Lookup and URL Scan endpoints • WHOIS, redirect, and metadata analysis • Native PHP (cURL) implementation • Composer integration • MIT License Homepage: https://www.emailveritas.com/url-checker Repository: https://github.com/Email-Veritas/url-checker-php-sdk
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    PTBC

    PTBC

    irreversible encryption with time self-destruction

    ...Key features: AES-CFB encryption with per-file IV Argon2id key derivation with 256MB RAM resistance TTL (time to live) built directly into the encrypted file HMAC-SHA512 integrity verification Self-deleting mode (--autowipe) and one-time access marking (--onetime) No file metadata, no recovery, no password resets Philosophy: If you lose the password - it’s over. If time expires - it’s gone. PTBC doesn’t forgive, doesn’t forget, and doesn’t leak. https://github.com/01alekseev/PTBC
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    Secure Protocol Format

    Generic binary protocol library that prevents injection attacks

    ...The Distinguished Encoding Rules, or DER, of the ASN.1 standard follows this approach but includes numerous constraints and, more importantly, demands that data fields to be described using binary metadata rather than text. The Secure Protocol Format, or SPF, was created as a simplified version of DER. In addition to delimiting data by length, it also affords programmers the ability to use text for describing data, just like tags are used in HTML and XML. Thus, SPF provides a simple and practical approach to preventing command injection attacks while allowing text to describe data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next