Showing 102 open source projects for "processing"

View related business solutions
  • MicroStation by Bentley Systems is the trusted computer-aided design (CAD) software built specifically for infrastructure design. Icon
    MicroStation by Bentley Systems is the trusted computer-aided design (CAD) software built specifically for infrastructure design.

    Microstation enables architects, engineers, and designers to create precise 2D and 3D drawings that bring complex projects to life.

    MicroStation is the only computer-aided design software for infrastructure design, helping architects and engineers like you bring their vision to life, present their designs to their clients, and deliver their projects to the community.
    Learn More
  • AestheticsPro Medical Spa Software Icon
    AestheticsPro Medical Spa Software

    Our new software release will dramatically improve your medspa business performance while enhancing the customer experience

    AestheticsPro is the most complete Aesthetics Software on the market today. HIPAA Cloud Compliant with electronic charting, integrated POS, targeted marketing and results driven reporting; AestheticsPro delivers the tools you need to manage your medical spa business. It is our mission To Provide an All-in-One Cutting Edge Software to the Aesthetics Industry.
    Learn More
  • 1
    Robin

    Robin

    AI-powered tool for dark web OSINT search and investigation

    ...The project provides a modular architecture separating search, scraping, and AI processing components so it can be extended with new data sources.
    Downloads: 19 This Week
    Last Update:
    See Project
  • 2
    Open Semantic Search

    Open Semantic Search

    Open source semantic search and text analytics for large document sets

    Open Semantic Search is an open source research and analytics platform designed for searching, analyzing, and exploring large collections of documents using semantic search technologies. It provides an integrated search server combined with a document processing pipeline that supports crawling, text extraction, and automated analysis of content from many different sources. Open Semantic Search includes an ETL framework that can ingest documents, process them through analysis steps, and enrich the data with extracted information such as named entities and metadata. It also supports optical character recognition to extract text from images and scanned documents, including images embedded inside PDF files. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3
    ASNmap

    ASNmap

    CLI tool for mapping organization network ranges using ASN data

    ...This capability makes it particularly useful for security researchers, penetration testers, and reconnaissance workflows that require identifying network infrastructure owned by a target organization. asnmap retrieves ASN-related data and returns structured results that can be easily integrated into automated pipelines. Output can be generated in multiple formats including plain text, JSON, and CSV, enabling flexible data processing and analysis. asnmap also supports reading input from standard input and piping its results directly into other command line tools for chained workflows.
    Downloads: 35 This Week
    Last Update:
    See Project
  • 4
    ModSecurity

    ModSecurity

    Cross platform web application firewall (WAF) engine for Apache

    ...Libmodsecurity is one component of the ModSecurity v3 project. The library codebase serves as an interface to ModSecurity Connectors taking in web traffic and applying traditional ModSecurity processing. In general, it provides the capability to load/interpret rules written in the ModSecurity SecRules format and apply them to HTTP content provided by your application via Connectors. Before starting the compilation process, make sure that you have all the dependencies in place.
    Downloads: 21 This Week
    Last Update:
    See Project
  • Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight Icon
    Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight

    Lock Down Any Resource, Anywhere, Anytime

    CLEAR by Quantum Knight is a FIPS-140-3 validated encryption SDK engineered for enterprises requiring top-tier security. Offering robust post-quantum cryptography, CLEAR secures files, streaming media, databases, and networks with ease across over 30 modern platforms. Its compact design, smaller than a single smartphone image, ensures maximum efficiency and low energy consumption.
    Learn More
  • 5
    ModSecurity Nginx Connector

    ModSecurity Nginx Connector

    ModSecurity v3 Nginx Connector

    ModSecurity-nginx is the connector that embeds the ModSecurity v3 (libmodsecurity) web application firewall engine into NGINX. It integrates WAF processing into the NGINX request/response phases, allowing rules to inspect headers, bodies, and even streaming request data before it reaches upstream apps. Operators can load the OWASP Core Rule Set or custom rules to detect and block common attacks such as SQLi, XSS, RCE patterns, and protocol anomalies. The module exposes directives for enabling audit logging, anomaly scoring, request body buffering limits, and performance tuning to fit high-traffic deployments. ...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 6
    syslog-ng

    syslog-ng

    Log management solution that improves the performance of SIEM

    syslog-ng is the log management solution that improves the performance of your SIEM solution by reducing the amount and improving the quality of data feeding your SIEM. With syslog-ng Store Box, you can find the answer. Search billions of logs in seconds using full text queries with Boolean operators to pinpoint critical logs. syslog-ng Store Box provides secure, tamper-proof storage and custom reporting to demonstrate compliance. syslog-ng can deliver data from a wide variety of sources to...
    Downloads: 21 This Week
    Last Update:
    See Project
  • 7
    vRain

    vRain

    Chinese Ancient eBooks Generator

    vRain is a small, focused automation tool aimed at simplifying routine tasks on education-oriented web platforms, particularly those that require periodic attendance or check-ins. It encapsulates login, session management, and request sequencing so repetitive actions can be executed reliably on a schedule. A configuration-driven approach lets users store multiple accounts, adjust intervals, and toggle features without modifying code. The program surfaces clear logs and result summaries so...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Anti-Spam SMTP Proxy Server

    Anti-Spam SMTP Proxy Server

    Anti-Spam SMTP Proxy Server implements multiple spam filters

    The Anti-Spam SMTP Proxy (ASSP) Server project aims to create an open source platform-independent SMTP Proxy server which implements auto-whitelists, self learning Hidden-Markov-Model and/or Bayesian, Greylisting, DNSBL, DNSWL, URIBL, SPF, SRS, Backscatter, Virus scanning, attachment blocking, Senderbase and multiple other filter methods. Click 'Files' to download the professional version 2.8.1 build 24261. A linux(ubuntu 20.04 LTS) and a freeBSD 12.2 based ready to run OVA of ASSP V2 are...
    Leader badge
    Downloads: 41,060 This Week
    Last Update:
    See Project
  • 9
    JSignPdf
    JSignPdf is an open-source Java application that adds digital signatures to PDF documents.
    Leader badge
    Downloads: 672 This Week
    Last Update:
    See Project
  • The AI workplace management platform Icon
    The AI workplace management platform

    Plan smart spaces, connect teams, manage assets, and get insights with the leading AI-powered operating system for the built world.

    By combining AI workflows, predictive intelligence, and automated insights, OfficeSpace gives leaders a complete view of how their spaces are used and how people work. Facilities, IT, HR, and Real Estate teams use OfficeSpace to optimize space utilization, enhance employee experience, and reduce portfolio costs with precision.
    Learn More
  • 10
    mendelson OFTP2

    mendelson OFTP2

    Implementation of the OFTP2 protocol (RFC 5024)

    The mendelson OFTP2 is a JAVA-based open source OFTP2 solution. It contains a logging- and configuration UI and supports encryption, digital signatures, message compression, TLS, certificate exchange, message routing, mail notification
    Leader badge
    Downloads: 37 This Week
    Last Update:
    See Project
  • 11
    MToken

    MToken

    MToken - Tokens processing system (Security)

    Tokens processing system (Security)
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    MetaRemover Toolkit

    MetaRemover Toolkit

    Open-source toolkit for removing metadata from files locally

    MetaRemover Toolkit is an open-source Python-based toolkit for removing metadata (EXIF, GPS, author, device information) from images and documents. The project demonstrates privacy-first metadata removal using local processing without uploading files to third-party servers. This toolkit complements the online service https://metaremover.com and can be used by developers, researchers, and privacy-conscious users.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13
    mendelson AS2

    mendelson AS2

    Implementation of the EDIINT AS2 protocol (RFC 4130)

    mendelson AS2 is the JAVA-based open source EDIINT AS2 solution. Monitoring- and configuration GUI, async & sync MDN, signatures, encryption, TLS, web interface, pluggable into any servlet container, partner manager, certificate manager, data compression, optional profiles: MA, FN. Localized to Spanish, Italian, Portuguese, German, English, French.
    Leader badge
    Downloads: 153 This Week
    Last Update:
    See Project
  • 14
    Pen Possible

    Pen Possible

    scans a given textual string in 146 pen on paper possible combinations

    Application scans a given textual string in 146 pen on paper possible combinations- horizontal, vertical, diagonal, reverse, join top, join bottom, groups(2/3/4..), edges & in quadrant dimensions of your choice
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    OpenAS2

    OpenAS2

    AS2 1.1 server implementation in Java

    ...It is intended to be used as a server. It is extremely configurable and supports a wide variety of signing and encryption algorithms. Supports very high traffic volume allowing parallel processing of files per partner. SUPPORT: Please use the Github issues and Discussions channels here: https://github.com/OpenAS2/OpenAs2App/ Requirements: - Java 11 or newer (tested with the LTS versions of Java up to 21) - Any OS that runs Java Planned enhancements in the next major release: - User interace configuration GUI - Certificate Exchange Management IMPORTANT: Java 8 is no longer supported.
    Leader badge
    Downloads: 73 This Week
    Last Update:
    See Project
  • 16
    Digital Signer (a PDF Signing software)

    Digital Signer (a PDF Signing software)

    Digital Signature & eSigning software. Bulk PDF signing. Sign all Page

    Digital Signer is a powerful and user-friendly software designed to secure and sign your digital documents with ease. Ideal for Tender filling, individuals, businesses, and professionals, this software ensures that your sensitive documents are protected from unauthorized editing and tampering, maintaining their integrity and authenticity. Key Features Sign PDFs with Hardware Devices: Ensuring the highest level of security. Digital Signature Certificates (DSC): Apply digital...
    Downloads: 48 This Week
    Last Update:
    See Project
  • 17

    JPEG Metadata Remover Stripper

    View and remove fingerprint / tracking metadata from JPEG/JPG files.

    Easy way to remove all metadata from a JPG/JPEG image file. The program creates a shortcut in the right click Send-To menu. When a file is right-clicked, use Send-To > JPEG Stripper to open the program. Supports selecting multiple files. When multiple files are selected, then clicking JPEG Stripper will automatically strip the metadata from all selected files without the dialog box popping open. There is an option to create new copies of files, or overwrite the existing files. The image...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    PCSecrets

    PCSecrets

    Encrypt and manage secret text data

    PCSecrets is a PC application that holds secret text data - protected by a master password and strong encryption. Use it as a password manager or just somewhere to hold any text data securely in one place. It can hold a second, hidden set of secrets that is undetectable and plausibly deniable. The program is also a PC counterpart of the Secrets for Android app. It uses the same data structure and provides synchronization that allows easy transfer of secrets between the two. For those who...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    Address_Decode

    Address_Decode

    Decode various cryptocurrency addresses

    Address to hash160 is an efficient multi-threaded tool designed to decode various cryptocurrency addresses (such as Bitcoin BTC,Bitcoin Cash BCH, Litecoin LTC, Bitcoin Gold BTG, etc.) to extract hash160 values. It is often used in research such as brainflayer, keyhunt, BitCrack, ecloop, keyhunt cuda, etc.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 20
    KeyKiller-Cuda

    KeyKiller-Cuda

    Solving the Satoshi Puzzle

    KeyKiller is a GPU-accelerated version of the KeyKiller project, designed to achieve extreme performance in solving Satoshi Nakamoto's puzzles using modern NVIDIA GPUs. KeyKiller CUDA pushes the limits of cryptographic key search performance by leveraging CUDA, thread-beam parallelism, and batch EC operations. The command-line version is open-source and free to use. For the paid advanced graphics version, please visit: https://gitlab.com/8891689/KeyKiller-Cuda/
    Downloads: 12 This Week
    Last Update:
    See Project
  • 21
    XORimg

    XORimg

    A secure open source tool for performing XOR operations on images

    XorImg Decryptor (Beta) A lightweight Windows utility designed to decrypt images encrypted via XOR operations, specifically compatible with files processed through xorimg.ru. This tool allows users to reconstruct original images by applying a stored XOR key, ensuring privacy and offline processing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Bandizip

    Bandizip

    Fast & efficient file compression and archiving tool

    ...It supports popular archive formats like ZIP, RAR, 7Z, and more, allowing users to create, extract, and manage compressed files with ease. Bandizip is renowned for its high-speed processing and multi-core compression, making it a go-to option for handling large files or batches of files efficiently. It also includes encryption features to secure sensitive files and advanced settings for controlling the compression ratio. With its lightweight design and broad compatibility, Bandizip is an excellent choice for both casual users and professionals seeking a reliable and versatile compression tool.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 23
    The program allows you to generate the hashes with the chosen algorithm (MD2, MD5, SHA-1, SHA-256, SHA-384 and SHA-512) of a single file or an entire folder (you can choose to scan the folder recursively or not recursively). It supports drag and drop of files and folders. The hash can be exported to text files. Compiled with openjdk 8. Usage: param 1: exclude symbolic links (0 or 1) [mandatory], param 2: exclude hidden files (0 or 1) [mandatory], param 3: folders to exclude [optional],...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    SecureDel

    SecureDel

    Secure File Deletion

    ...It does not leave any trace in the system where it acts and performs deletions in such a way that deleted files can no longer be recovered. It generates a report after each deletion to display the processing times. SecureDel 1.2.3 Released. Good Deletion!
    Downloads: 5 This Week
    Last Update:
    See Project
  • 25
    DeepBlueCLI

    DeepBlueCLI

    PowerShell Module for Threat Hunting via Windows Event Logs

    DeepBlueCLI is a PowerShell-centric threat-hunting toolkit built to extract, normalize, and flag suspicious activity from Windows event logs and Sysmon telemetry. It parses common sources—including Windows Security, System, Application, PowerShell logs, and Sysmon event ID 1—then applies a rich set of detection heuristics for things like suspicious account changes, password guessing and spraying, service tampering, PowerShell obfuscation and download-string usage, long or unusual command...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB