Tremendous is the global payouts platform for businesses sending gift cards and money at scale.
Getting started is simple: add a funding method and place your first order in minutes.
Trusted by 20,000+ leading organizations, Tremendous has delivered billions of rewards and enables businesses to reach recipients across 230+ countries and regions. Recipients have 2,500+ payout options to choose from, including gift cards, prepaid cards, cash transfers, and charitable donations.
Learn More
DataHub is the leading open-source data catalog helping teams discover, understand, and govern their data assets.
Modern Data Catalog and Metadata Platform
Built on an open source foundation with a thriving community of 13,000+ members, DataHub gives you unmatched flexibility to customize and extend without vendor lock-in. DataHub Cloud is a modern metadata platform with REST and GraphQL APIs that optimize performance for complex queries, essential for AI-ready data management and ML lifecycle support.
An inline system for registering computers on a semi-public network. Project consists of documentation to build the system and some code libraries for building the registration system.
This toolkit will provide seemless backend support for multiple Firewall and IDS systems deployment. The initial release will only support Snort and FreeBSD\\\'s ipfw, but future releases will expand the firewall selection. The main code is Python,
ISO 17799 - Code of practice for information security management. Creation of methodology and documentation for audit adapted to ISO. One is made up of an introduction on general aspects of the security of the information.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
The RTSP Proxy Kit contains source code for a reference implementation of an
application-level RTSP proxy server for UNIX and Windows environments. The kit
provides all of the basic functionality for an RTSP proxy.