Showing 5 open source projects for "bee-box"

View related business solutions
  • We help you deliver Virtual and Hybrid Events using our Award Winning end-to-end Event Management Platform Icon
    We help you deliver Virtual and Hybrid Events using our Award Winning end-to-end Event Management Platform

    Designed by event planners for event planners, the EventsAIR platform gives you the ability to manage your event, conference, meeting or function with

    EventsAIR have been anticipating and responding to the ever-changing event industry needs for over 30 years, providing innovative solutions that empower event organizers to create successful events around the globe.
    Learn More
  • AI-Powered Identity Governance Icon
    AI-Powered Identity Governance

    For IT Teams and MSPs in need of a solution to simplify, optimize and secure their SaaS, file, and device management operations

    Define governance policies, manage access, and optimize licenses with unified visibility across every identity, app, and file.
    Learn More
  • 1
    Sysdig

    Sysdig

    Linux system exploration and troubleshooting tool

    ...Apply microsegmentation by automating Kubernetes-native network policies. Unify threat detection and incident response across containers, Kubernetes, and cloud with out-of-the-box Falco rules leveraging syscalls, Kubernetes audit logs and cloud logs. Gain deep insight with container and Kubernetes monitoring that is fully Prometheus compatible. Validate compliance against standards like PCI, NIST and SOC2 for containers, hosts, Kubernetes and cloud. Sysdig created Falco, the open standard for runtime threat detection for containers, hosts, Kubernetes and cloud.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 2
    shadowsocks-libev

    shadowsocks-libev

    Bug-fix-only libev port of shadowsocks

    ...Snap is the recommended way to install the latest binaries. You can build shadowsocks-libev and all its dependencies by script. The latest shadowsocks-libev has provided a redir mode. You can configure your Linux-based box or router to proxy all TCP traffic transparently, which is handy if you use an OpenWRT-powered router. Although shadowsocks-libev can handle thousands of concurrent connections nicely, we still recommend setting up your server's firewall rules to limit connections from each user. We strongly encourage you to install shadowsocks-libev from jessie-backports-sloppy.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3
    The Tool Box

    The Tool Box

    Tools for the payments type!

    Version 1.1.5 - Added: Added the ability to edit the EMV panel - You can change which tags show, and what order they are in - Added: Tag 9F10 (Issuer Application Data) to which also includes CVR (a subtag of 9F10) - Added: Menu link to the homepage (sourceforge) - Fixed: 9F07/AUC had the wrong tag details - Fixed: File>Close now saves notes and config updates before exiting - Fixed: Tag 95/TVR title had a spelling mistake - Fixed: Homepage wasn't populating EMV page names -...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 4
    Pyringe

    Pyringe

    Debugger capable of attaching to and injecting code into python

    ...It’s also useful for forensic snapshots: enumerate objects of a certain type, find reference cycles, or measure memory pressure without pre-instrumentation. While powerful, it’s designed for careful, auditable use—showing exactly what code runs and where—so teams can regain visibility when black-box processes go sideways.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Attack Surface Management | Criminal IP ASM Icon
    Attack Surface Management | Criminal IP ASM

    For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

    Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
    Learn More
  • 5
    Edyuk is a free, open source, fast and lightweight development environment which supports C++ and Qt 4 out of the box and can be extended through plugins. It works under all platforms supported by Qt 4 (Linux, Mac, Windows, BSD, ...).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB