Showing 34 open source projects for "developer"

View related business solutions
  • Create and manage the email signature you need Icon
    Create and manage the email signature you need

    For companies and organizations that need an email signature solution

    With WiseStamp it’s easy to unify your brand and turn your emails into a powerful marketing tool. Get the most out of your emails with a professionally designed custom email signature.
    Learn More
  • Office Ally: Healthcare Software for Your Medical Practice Icon
    Office Ally: Healthcare Software for Your Medical Practice

    We support healthcare organizations of all sizes with easy-to-use, affordable software solutions.

    Service Center by Office Ally is a trusted revenue cycle management platform used by over 65,000 healthcare organizations processing more than 350 million claims annually. With it, providers can verify patient eligibility and benefits, upload and submit claims, correct rejected claims, check claim status, and obtain remits. With multiple claim types and submission options, providers can easily submit claims to any payer from any practice management system. Transactions are secure, ensuring the confidentiality of sensitive patient information. With no needed implementation, providers can quickly and effortlessly streamline their billing processes, increase their financial performance, simplify medical billing, and reduce claim rejections for faster reimbursements.
    Learn More
  • 1
    User Scanner

    User Scanner

    Scan usernames and emails across many platforms from the CLI

    user-scanner is a command-line OSINT tool designed to analyze the presence and availability of usernames and email addresses across many online platforms. It helps users quickly determine whether a specific username or email is already associated with accounts on social networks, developer platforms, creator communities, gaming services, and other sites. user-scanner is useful for security researchers, investigators, and analysts performing open source intelligence, as well as individuals or businesses looking for a unique username across multiple services. By scanning many platforms in a single command, it simplifies the process of checking account existence and identifying a digital footprint. user-scanner uses a modular architecture where each platform is implemented as a small validator module that determines whether a username exists or is available.
    Downloads: 23 This Week
    Last Update:
    See Project
  • 2
    frida

    frida

    Dynamic instrumentation toolkit for developers

    ...Install the Node.js bindings from npm, grab a Python package from PyPI, or use Frida through its Swift bindings, .NET bindings, Qt/Qml bindings, or C API. Frida is and will always be free software (free as in freedom). We want to empower the next generation of developer tools, and help other free software developers achieve interoperability through reverse engineering. We are proud that NowSecure is using Frida to do fast, deep analysis of mobile apps at scale. Frida has a comprehensive test-suite and has gone through years of rigorous testing across a broad range of use-cases.
    Downloads: 648 This Week
    Last Update:
    See Project
  • 3
    Bitwarden Secrets Manager SDK

    Bitwarden Secrets Manager SDK

    Bitwarden Secrets Manager SDK

    This repository houses the Bitwarden Secret Manager SDK. The SDK is written in Rust and provides a Rust API, CLI, and various language bindings.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    SiteDorks

    SiteDorks

    Automate search engine dorking across hundreds of websites

    ...Instead of manually running the same query for many sites, SiteDorks generates and executes the queries automatically using lists of “dorkable” websites. A built-in dataset contains hundreds of websites grouped into categories such as cloud services, developer platforms, documentation sites, social platforms, and communication tools. Users can also supply custom domain lists or CSV files to tailor searches for tasks like penetration testing, bug bounty research, or OSINT investigations.
    Downloads: 3 This Week
    Last Update:
    See Project
  • RouteGenie NEMT software Icon
    RouteGenie NEMT software

    Modern software for non-emergency medical transportation providers, built to improve scheduling, billing, routing, and dispatching processes.

    RouteGenie NEMT software is a modern system built to automate all non-emergency medical transportation processes including routing, scheduling, dispatching, and billing. It helps manage everyday challenges like vehicle breakdowns, traffic problems, cancelations, driver call-offs, will calls, no shows, add-on trips, on-demand trips, and more.
    Learn More
  • 5
    OmniAuth

    OmniAuth

    OmniAuth is a flexible authentication system utilizing Rack middleware

    ...One strategy, called Developer, is included with OmniAuth and provides a completely insecure, non-production-usable strategy that directly prompts a user for authentication information and then passes it straight through. You can use it as a placeholder when you start development and easily swap in other strategies later.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    CASL

    CASL

    CASL is an isomorphic authorization JavaScript library

    CASL is an isomorphic authorization JavaScript library that restricts what resources a given user is allowed to access. It's designed to be incrementally adoptable and can easily scale between a simple claim-based and fully featured subject and attribute-based authorization. It makes it easy to manage and share permissions across UI components, API services, and database queries.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 7
    Berglas

    Berglas

    A tool for managing secrets on Google Cloud

    ...This makes it useful for teams that want a more programmable and cloud-native approach to secret distribution without hardcoding sensitive values into applications or deployment pipelines. Because it is written in Go and distributed in multiple ways, including binaries, Docker, Homebrew, and source installation, it fits a variety of developer environments and operational setups.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 8
    FHEVM

    FHEVM

    Integrate FHE with blockchain applications

    FHEVM is a framework built by Zama to enable confidential smart contracts on EVM-compatible blockchains using Fully Homomorphic Encryption (FHE). It lets developers write Solidity contracts that handle encrypted inputs, encrypted state, arithmetic and logical operations on encrypted types, while maintaining privacy (data always encrypted), composability (encrypted state works alongside public state), and security (via threshold decryption, KMS, etc). The framework includes on-chain and...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 9
    Retire.js

    Retire.js

    Scanner detecting the use of JavaScript libraries

    ...Scan a web app or node app for use of vulnerable JavaScript libraries and/or node modules. grunt-retire scans your grunt-enabled app for use of vulnerable JavaScript libraries and/or node modules. Scans visited sites for references to insecure libraries and puts warnings in the developer console. An icon on the address bar displays will also indicate if vulnerable libraries were loaded. Retire.js has been adapted as a plugin for the penetration testing tools Burp and OWASP ZAP.
    Downloads: 6 This Week
    Last Update:
    See Project
  • Ditto Edge Server is a lightweight standalone server for resource-constrained edge environments, based on the core Ditto Edge SDK. Icon
    Ditto Edge Server is a lightweight standalone server for resource-constrained edge environments, based on the core Ditto Edge SDK.

    With Ditto Edge Server, you can join devices as small as a Raspberry Pi to a local mesh network and synchronize data across edge environments.

    Ditto's Edge SDK is the only thing your edge devices need to ensure your application is operational in any environment, regardless of network conditions.
    Learn More
  • 10
    Checkov

    Checkov

    Prevent cloud misconfigurations during build-time for Terraform

    Checkov scans cloud infrastructure configurations to find misconfigurations before they're deployed. Checkov uses a common command-line interface to manage and analyze infrastructure as code (IaC) scan results across platforms such as Terraform, CloudFormation, Kubernetes, Helm, ARM Templates and Serverless framework. Verify changes to hundreds of supported resource types in all major cloud providers. Checkov supports developers using Terraform, Terraform plan, CloudFormation, Kubernetes,...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 11
    Rack::Attack

    Rack::Attack

    Rack middleware for blocking & throttling

    ...Rack::Attack lets you easily decide when to allow, block and throttle based on properties of the request. Rack middleware for blocking & throttling abusive requests. Tackling each curious anomaly that threatens your site’s reliability saps developer productivity and happiness. Rack::Attack lets you throttle abusive requests with just a few lines of code. For the security of our users, we have a stricter throttle for login attempts. This makes it very time consuming for attackers to guess users’ passwords. We also use the IPCat ruby library to detect requests from well-known datacenters. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 12
    Open-Source auth provider

    Open-Source auth provider

    Open source alternative to Auth0 / Firebase Auth, etc.

    ...Node.js, Go, Python, React.js, React Native, Vanilla JS, etc. Supertokens architecture is optimized to add secure authentication for your users without compromising on user and developer experience. Frontend SDK: Manages session tokens and renders login UI widgets. Backend SDK: Provides APIs for sign-up, sign-in, signout, session refreshing etc. Your Frontend will talk to these APIs. SuperTokens Core: The HTTP service for the core auth logic and database operations. This service is used by the Backend SDK.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    AWS Encryption SDK for C

    AWS Encryption SDK for C

    AWS Encryption SDK for C

    The AWS Encryption SDK for C is a client-side encryption library designed to make it easy for everyone to encrypt and decrypt data using industry standards and best practices. It uses a data format compatible with the AWS Encryption SDKs in other languages. For more information on the AWS Encryption SDKs in all languages, see the Developer Guide. We will demonstrate some simple build recipes for Linux, Mac, and Windows operating systems. These recipes assume a newly installed system with default installs of dependency packages. The Windows instructions install everything in your current directory (where you run the build process). The AWS Encryption SDK for C can be used with AWS KMS, but it is not required. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 14
    Tsunami

    Tsunami

    Network security scanner for detecting severity vulnerabilities

    Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence. When security vulnerabilities or misconfigurations are actively exploited by attackers, organizations need to react quickly in order to protect potentially vulnerable assets. As attackers increasingly invest in automation, the time window to react to a newly released, high severity vulnerability is usually measured in hours. This poses a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Logto

    Logto

    Identity infrastructure for developers, Auth0 open source alternative

    Logto is an open-source Identity and Access Management (IAM) platform designed to streamline Customer Identity and Access Management (CIAM) and Workforce Identity Management. With Single Sign-On (SSO), OIDC-based authentication, and Multi-Tenant SaaS capabilities, Logto offers a scalable, secure, and developer-friendly way to manage authentication for modern web and mobile application.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    SafeUtils

    SafeUtils

    110+ developer tools as native MacOS, Linux & Windows desktop apps.

    Tools: https://safeutils.com/barcode-generator https://safeutils.com/color-picker https://safeutils.com/qr-code-generator https://safeutils.com/qr-code-scanner https://safeutils.com/word-counter https://safeutils.com/base-64-decoder https://safeutils.com/diff-checker https://safeutils.com/hex-to-ascii https://safeutils.com/json-formatter https://safeutils.com/lorem-ipsum-generator https://safeutils.com/random-generator https://safeutils.com/time-converter https://safeutils.com/...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Supercookie

    Supercookie

    Browser fingerprinting via favicon!

    Supercookie uses favicons to assign a unique identifier to website visitors. Unlike traditional tracking methods, this ID can be stored almost persistently and cannot be easily cleared by the user. The tracking method works even in the browser's incognito mode and is not cleared by flushing the cache, closing the browser or restarting the operating system, using a VPN or installing AdBlockers. The demo of "supercookie", as well as the publication of the source code of this repository, is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    BTS-SIO-SLAM-CYBER-INTERVENTION

    Cybersecurity intervention for BTS SIO SLAM

    You will find all the files to prepare a security intervention in a BTS SIO (SLAM - development part). This training aims to highlight the role of the developer in cybersecurity. Different software vulnerabilities are presented as well as the good practices that allow limiting them. To this goal, some aspects of a secure system design are addressed. Informations and documentation are here: https://sourceforge.net/p/bts-sio-slam-cyberintervention/wiki/Home/.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Horusec

    Horusec

    Open source tool that improves identification of vulnerabilities

    ...Currently, the languages for analysis are C#, Java, Kotlin, Python, Ruby, Golang, Terraform, Javascript, Typescript, Kubernetes, PHP, C, HTML, JSON, Dart, Elixir, Shell, Nginx. The tool has options to search for key leaks and security flaws in all your project's files, as well as in Git history. Horusec can be used by the developer through the CLI and by the DevSecOps team on CI /CD mats.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 20
    Tamper Dev

    Tamper Dev

    Extension that allows you to intercept and edit HTTP/HTTPS requests

    If you are a developer, you can use Tamper Dev to debug your websites, or if you are a pentester, you can use it to search for security vulnerabilities by inspecting the HTTP traffic from your browser. Unlike most other extensions, Tamper Dev allows you to intercept, inspect and modify the requests before they are sent to the server. This extension provides functionality similar to Burp Proxy, MITM Proxy, OWASP ZAP, Tamper Data, and Postman Proxy, but without the need of additional software, with full support of HTTPS connections, and trivial to set-up (just install).
    Downloads: 7 This Week
    Last Update:
    See Project
  • 21
    Hush

    Hush

    Noiseless browsing, content blocker for Safari

    ...Nor does it track behavior or collect crash reports, nothing leaves your device. Everything is free of charge. Forever. No in-app purchases, no-nonsense. However, any help towards covering the yearly Apple Developer fee is greatly appreciated. The app is primarily a host of rules that integrates with Safari in a native, lightweight way, making the blocking efficient and fast. It's as easy as downloading the app and enabling it in Safari settings ⭢ Content Blockers. No configuration or maintenance needed. The source code is available on GitHub under the permissive MIT license. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    Bash Scripting

    Bash Scripting

    Free Introduction to Bash Scripting eBook

    This is an open-source introduction to Bash scripting guide/ebook that will help you learn the basics of Bash scripting and start writing awesome Bash scripts that will help you automate your daily SysOps, DevOps, and Dev tasks. No matter if you are a DevOps/SysOps engineer, developer, or just a Linux enthusiast, you can use Bash scripts to combine different Linux commands and automate boring and repetitive daily tasks, so that you can focus on more productive and fun things. The guide is suitable for anyone working as a developer, system administrator, or a DevOps engineer and wants to learn the basics of Bash scripting. ...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 23
    PLEASE NOTE that we are in the process of moving to GitHub: https://github.com/jasypt/jasypt Jasypt (Java Simplified Encryption) is a java library which allows the developer to add basic encryption capabilities to his/her projects with minimum effort, and without the need of having deep knowledge on how cryptography works. PLEASE NOTE that we are in the process of moving to GitHub: https://github.com/jasypt/jasypt
    Downloads: 20 This Week
    Last Update:
    See Project
  • 24

    CryptoFlouze

    This software display the last prices of the top 20 cryptocurencies

    ...The data is downloaded from : https://coinmarketcap.com/api/ For windows : Download this zip file, unzip everything in the same directory. The data are updated at every run. For other operating systems : Run it from the source. https://github.com/hamdyaea/CryptoFlouze Developer - Author Hamdy Abou El Anein
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Steganograph

    Steganograph

    Hide your text message's inside a image

    This software let's you hide text message's inside a image .
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB