[go: up one dir, main page]

Search Results for "identify unknown networks"

Showing 43 open source projects for "identify unknown networks"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Free Website Monitoring Service | UptimeRobot Icon
    Free Website Monitoring Service | UptimeRobot

    The free online uptime monitoring service with an App is available for iOS and Android.

    With the Free Plan, you can monitor up to 50 URLs, check for a website's content (using the keyword monitor), ping your server or monitor your ports in 5-minute intervals. You can create a status page to showcase your uptime. SMS or Call alerts can be bought anytime.
    Learn More
  • 1
    YARA

    YARA

    The pattern matching swiss knife for malware researchers

    ...YARA-CI may be a useful addition to your toolbelt. This is GitHub application that provides continuous testing for your rules, helping you to identify common mistakes and false positives. If you plan to use YARA to scan compressed files (.zip, .tar, etc) you should take a look at yextend, a very helpful extension to YARA developed and open-sourced by Bayshore Networks.
    Downloads: 52 This Week
    Last Update:
    See Project
  • 2
    Stock prediction deep neural learning

    Stock prediction deep neural learning

    Predicting stock prices using a TensorFlow LSTM

    Predicting stock prices can be a challenging task as it often does not follow any specific pattern. However, deep neural learning can be used to identify patterns through machine learning. One of the most effective techniques for series forecasting is using LSTM (long short-term memory) networks, which are a type of recurrent neural network (RNN) capable of remembering information over a long period of time. This makes them extremely useful for predicting stock prices. Predicting stock prices is a complex task, as it is influenced by various factors such as market trends, political events, and economic indicators. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    PentestAgent

    PentestAgent

    AI agent framework for black-box security testing

    PentestAgent is an open-source autonomous security testing platform designed to help organizations identify vulnerabilities and assess security posture by simulating real-world attack scenarios without manual intervention. It brings a modular and automated approach to penetration testing by orchestrating a suite of tools and scripts that can emulate common exploitation techniques, reconnaissance workflows, and post-exploitation activities across targets. Users configure rules, policies, and...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 4
    HomeRobot

    HomeRobot

    Mobile manipulation research tools for roboticists

    ...Designed for low-cost robots such as the Hello Robot Stretch, HomeRobot enables agents to perceive, navigate, and interact with their surroundings through vision and manipulation. The system focuses on Open Vocabulary Mobile Manipulation (OVMM) — a challenging task in which a robot must explore an unknown environment, identify an object by name, locate a suitable receptacle, and place the object appropriately. HomeRobot integrates perception, planning, and control under a unified architecture, supporting AI Habitat for simulation and ROS Noetic for real-world deployment. It provides interfaces for Detic, Grounded-SAM, and Contact-GraspNet, allowing open-vocabulary detection and 3D grasping.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Contractor Foreman is the most affordable all-in-one construction management software for contractors and is trusted by contractors in more than 75 countries. Icon
    Contractor Foreman is the most affordable all-in-one construction management software for contractors and is trusted by contractors in more than 75 countries.

    For Residential, Commercial and Public Works Contractors

    Starting at $49/m for the WHOLE company, Contractor Foreman is the most affordable all-in-one construction management system for contractors. Our customers in 75+ countries and industry awards back it up. And it's all backed by a 100 day guarantee.
    Learn More
  • 5

    KdumpID

    Identify any kernel core dump file

    The kdumpid utility can be used to find out the exact kernel architecture and version of an unknown kernel core dump.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    DeFi-Yield-Farming-Bot
    Welcome to the DeFi Yield Farming Bot! This tool is designed to automate liquidity provision and optimize returns on various decentralized finance (DeFi) platforms. Whether you're an experienced yield farmer or just getting started, this bot simplifies the process and helps maximize your passive income. The bot supports the following blockchain networks: Ethereum Fuse Telos Meter Moonriver Polygon PoS Avalanche Theta Fantom Harmony Shard-0 Binance Smart Chain Solana
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Mev Seeker

    Mev Seeker

    Mev Seeker is an advanced All-In-One (AIO) Mev Bot

    Mev Seeker is an advanced All-In-One (AIO) Maximal Extractable Value (MEV) bot engineered to autonomously identify and capitalize on profitable trading opportunities across both Solana and Ethereum blockchain networks. By meticulously monitoring pending transactions and analyzing market dynamics, Mev Seeker executes strategies such as arbitrage, front-running, and sandwich attacks to optimize returns.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    DocWire SDK

    DocWire SDK

    Award-winning modern data processing SDK in C++20

    DocWire SDK, a standout C++20AI driven data processing tool, has received award from SourceForge and strong backing from Microsoft. It handles nearly 100 file types, empowering efficient text extraction, web data extraction, and document analysis. For businesses, the shift to DocWire SDK signifies a leap forward. It promises comprehensive document format support and the ability to extract valuable insights from email boxes, databases, and websites using cutting-edge AI. DocWire SDK aims to...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 9
    RY GeoIP 3

    RY GeoIP 3

    User-friendly network & geolocation tools, APIs integration and more!

    RY GeoIP 3 is a powerful application that combines network and geolocation tools for comprehensive analysis. With its user-friendly interface and integration with Google Maps API and API Ninja DNS Lookups service, you can perform a wide range of operations, from geolocation lookups and ping tests to DNS analysis, traceroute, SSL certificate inspection, header data retrieval, and open port scanning. The ability to save data as PDFs and maps as images further enhances the utility of the...
    Downloads: 2 This Week
    Last Update:
    See Project
  • The Apple Device Management and Security Platform Icon
    The Apple Device Management and Security Platform

    For IT teams at organizations that run on Apple

    Achieve harmony across your Apple device fleet with Kandji's unmatched management and security capabilities.
    Learn More
  • 10
    BloodHound Legacy

    BloodHound Legacy

    Six Degrees of Domain Admin

    BloodHound Legacy is the deprecated open‑source version of the BloodHound Active Directory attack path analysis tool. It uses graph theory to model and visualize privileged relationships in AD, Entra ID, and Azure environments. Security professionals use it to enumerate domain privilege escalation paths, misconfigurations, and attack surfaces in corporate networks
    Downloads: 13 This Week
    Last Update:
    See Project
  • 11
    PuntoGPS

    PuntoGPS

    Minimalistic wide-open GPS-locator/tracker

    ...It's free, open source, portable and cross-platform. *** NB *** - Check the "allow unknown sources" option on your device security settings to setup on Android. Current version: 0.9 (beta) Release notes: -> https://sourceforge.net/p/puntogps/blog/
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    WebDeets

    WebDeets

    WebDeets Powerful And Versatile Network Utility App

    WebDeets Is A Network Utility App That Is Used For Network Diagnostics And Troubleshooting. Provide Features That Can Help, Network Administrators And IT Professionals To Monitor And Troubleshoot Network Performance, Identify Potential Vulnerabilities And Take Proactive Steps To Address Any Issues. It Can Convert IP Addresses To Hostnames And Vice Versa And Comes With Preloaded Commands Of Netstat And Ping. It Allows You To Save Results In Different Formats And Has A Real-Time Terminal Feature. Overall, It's A Powerful Tool For Network Administrators And IT Professionals WebDeets is a versatile Tool That Simplifies Network Diagnostics And Is Essential For Anyone Working With Complex Networks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Log4jScanner

    Log4jScanner

    A log4j vulnerability filesystem scanner and Go package

    log4jscanner is a filesystem scanner and Go package that helps organizations quickly identify vulnerable Log4j components inside JARs and shaded dependencies. Instead of probing networks, it walks directories and archives, including nested JARs, to find version fingerprints and risky classes associated with the Log4Shell family of issues. The focus on static analysis makes it suitable for container images, build artifacts, and offline systems where active scanning isn’t feasible. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 14
    SVoice (Speech Voice Separation)

    SVoice (Speech Voice Separation)

    We provide a PyTorch implementation of the paper Voice Separation

    SVoice is a PyTorch-based implementation of Facebook Research’s study on speaker voice separation as described in the paper “Voice Separation with an Unknown Number of Multiple Speakers.” This project presents a deep learning framework capable of separating mixed audio sequences where several people speak simultaneously, without prior knowledge of how many speakers are present. The model employs gated neural networks with recurrent processing blocks that disentangle voices over multiple computational steps, while maintaining speaker consistency across output channels. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 15
    Hands-on Unsupervised Learning

    Hands-on Unsupervised Learning

    Code for Hands-on Unsupervised Learning Using Python (O'Reilly Media)

    This repo contains the code for the O'Reilly Media, Inc. book "Hands-on Unsupervised Learning Using Python: How to Build Applied Machine Learning Solutions from Unlabeled Data" by Ankur A. Patel. Many industry experts consider unsupervised learning the next frontier in artificial intelligence, one that may hold the key to the holy grail in AI research, the so-called general artificial intelligence. Since the majority of the world's data is unlabeled, conventional supervised learning cannot...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    NeuralBot

    NeuralBot

    A general purpose aimbot, which uses a neural network for enemy/target

    NeuralBot is a general-purpose aimbot that utilizes neural networks for enemy or target detection. Unlike traditional aimbots that may interact directly with game memory, NeuralBot functions as a "pixel bot," analyzing on-screen pixels to identify targets. This approach makes it versatile across various first-person shooter games without modifying game files.
    Downloads: 22 This Week
    Last Update:
    See Project
  • 17
    EfficientNet Keras

    EfficientNet Keras

    Implementation of EfficientNet model. Keras and TensorFlow Keras

    This repository contains a Keras (and TensorFlow Keras) reimplementation of EfficientNet, a lightweight convolutional neural network architecture achieving state-of-the-art accuracy with an order of magnitude fewer parameters and FLOPS, on both ImageNet and five other commonly used transfer learning datasets. Convolutional Neural Networks (ConvNets) are commonly developed at a fixed resource budget, and then scaled up for better accuracy if more resources are available. In this paper, we systematically study model scaling and identify that carefully balancing network depth, width, and resolution can lead to better performance. Based on this observation, we propose a new scaling method that uniformly scales all dimensions of depth/width/resolution using a simple yet highly effective compound coefficient. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Sagacity

    Sagacity

    Security Assessment Data Management and Analysis Tool

    ...Security assessments, especially those done for DoD and Federal organizations, produce tremendous amounts of scan and compliance data that security engineers must sort through and deconflict, identify untested requirements, and somehow analyze to communicate risk to their employers. Sagacity, originally written to support a government customer, was designed to fill that need. What if an organization could turn massive amounts of irreconcilable vulnerability scan data into true knowledge and insight about their networks? They would be able to make wise decisions resulting in cost-effective actions to improve their security with the best return on investment. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Face Recognition

    World's simplest facial recognition api for Python & the command line

    Face Recognition is the world's simplest face recognition library. It allows you to recognize and manipulate faces from Python or from the command line using dlib's (a C++ toolkit containing machine learning algorithms and tools) state-of-the-art face recognition built with deep learning. Face Recognition is highly accurate and is able to do a number of things. It can find faces in pictures, manipulate facial features in pictures, identify faces in pictures, and do face recognition on a...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 20
    COW

    COW

    HTTP proxy to automatically identify blocked sites

    HTTP proxy written in Go. COW can automatically identify blocked sites and use parent proxies to access. COW's design goal is automation. Ideally, users don't need to care about which websites are inaccessible, and they can directly connect to the website without slowing down the access speed due to the use of secondary agents. As an HTTP proxy, it can be provided to mobile devices; if deployed on a domestic server, it can be used as an APN proxy. Support HTTP, SOCKS5, shadowsocks and cow...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    SDN-Toolkit

    Discover, Identify, and Manipulate SDN-Based Networks

    Discover, identify, and manipulate SDN-Based networks through both their northbound and southbound APIs
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    program.MODULAR

    program.MODULAR

    MODULAR: Autonomous Computation of Modularity

    MODULAR is a software developed to perform rapid and automatic calculation of modularity in sets of networks. MODULAR reads a set of text files with bipartite or adjacency binary matrices representing networks. The software can identify and define modules by two different modularity metrics widely used in studies with different types of networks such as social, ecological and biochemical networks. In order to find the network partition that maximizes modularity, the software offers five optimization methods to the user: simulated annealing, fast greedy, spectral partitioning, a hybrid of fast greedy and simulated annealing, and a hybrid of spectral partitioning and simulated annealing. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 23
    Grammar based Combinatorial Solver

    Grammar based Combinatorial Solver

    Solver with Applications in Computer Network Systems Design

    ...A GoJS based visualization is provided for model's grammar. Two system design model samples are provided. One uses the solver to identify low power network design for Passive Optical Networks given a set of choices for provider and customer premises equipment and a set of optical domain constraints. Second uses the solver to identify a low power switch design for data center networks given a set of choices for various sub-components within a switch and a set of constraints. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Dragon UnPACKer
    Dragon UnPACKer is a game archive (Quake PAK, etc..) unpacking tool. It is plugin based making easier to add new archive file formats. It has convert ability and raw search function for known material (audio, video and pictures).
    Leader badge">
    Downloads: 265 This Week
    Last Update:
    See Project
  • 25
    nogotofail

    nogotofail

    An on-path blackbox network traffic security testing tool

    nogotofail is a network security testing tool developed by Google to help developers and researchers identify weaknesses in TLS/SSL implementations and detect unencrypted traffic that could compromise sensitive data. The tool functions as an on-path man-in-the-middle (MiTM) testing system, allowing users to inspect and evaluate how applications and devices handle encrypted connections under real-world conditions. It can detect a wide range of vulnerabilities, including improper SSL...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next