Showing 4 open source projects for "python-bibtex"

View related business solutions
  • RentGuruz is an all-in-one vehicle rental software solution designed to streamline operations for car rental businesses worldwide. Icon
    RentGuruz is an all-in-one vehicle rental software solution designed to streamline operations for car rental businesses worldwide.

    Auto rental businesses seeking a solution to manage all their cloud business needs

    RentGuruz. The simple, intuitive, and powerful cloud application platform that manages all kinds of mobility for all kinds of rental businesses.
    Learn More
  • Manage your hosting business with our vacation rental software Icon
    Manage your hosting business with our vacation rental software

    Empowering your short-term rental business to succeed

    Whether you’re a new or established business, you can rely on Lodgify’s vacation rental property management software for support through every step of your journey.
    Learn More
  • 1
    Brownie

    Brownie

    A Python-based development and testing framework for smart contracts

    Brownie is a Python-based development and testing framework for smart contracts targeting the Ethereum Virtual Machine. Powerful debugging tools, including python-style tracebacks and custom error strings. The recommended way to install Brownie is via pipx. pipx installs Brownie into a virtual environment and makes it available directly from the command-line.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 2
    Slither

    Slither

    Static Analyzer for Solidity

    Slither is a Solidity static analysis framework written in Python 3. It runs a suite of vulnerability detectors, prints visual information about contract details, and provides an API to easily write custom analyses. Slither enables developers to find vulnerabilities, enhance their code comprehension, and quickly prototype custom analyses. Slither is the first open-source static analysis framework for Solidity.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 3
    Smart Contract Sanctuary

    Smart Contract Sanctuary

    A home for ethereum smart contracts

    A home for Ethereum smart contracts verified on Etherscan. This is the index repository for the smart contract sanctuary. Bookmark this repo. Chain-specific sub-repos and the index are updated twice a day. Expect a full, recursive check-out to take 2GB+ disk space. Existing repository but submodules never initialized - checkout submodules and update all chain-specific sub repositories. Contains smart contract sources for various networks, grouped by the first two chars of the contract...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Raiden Network

    Raiden Network

    Raiden Network

    Use Raiden to enrich your dApp with nearly instant, low-fee and scalable payments. It comes with an easy-to-use API and is compatible with the Ethereum ERC20 token standard. Incentivized, decentralized P2P live streaming with micropayments using Raiden, introducing “Proof-of-Stream-Payment”. The Raiden Network is an infrastructure layer on top of the Ethereum Blockchain. While the basic idea is simple, the underlying protocol is quite complex and the implementation non-trivial. Nonetheless...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Attack Surface Management | Criminal IP ASM Icon
    Attack Surface Management | Criminal IP ASM

    For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

    Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
    Learn More
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB