Showing 43 open source projects for "security script"

View related business solutions
  • The full-stack observability platform that protects your dataLayer, tags and conversion data Icon
    The full-stack observability platform that protects your dataLayer, tags and conversion data

    Stop losing revenue to bad data today. and protect your marketing data with Code-Cube.io.

    Code-Cube.io detects issues instantly, alerts you in real time and helps you resolve them fast. No manual QA. No unreliable data. Just data you can trust and act on.
    Learn More
  • Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight Icon
    Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight

    Lock Down Any Resource, Anywhere, Anytime

    CLEAR by Quantum Knight is a FIPS-140-3 validated encryption SDK engineered for enterprises requiring top-tier security. Offering robust post-quantum cryptography, CLEAR secures files, streaming media, databases, and networks with ease across over 30 modern platforms. Its compact design, smaller than a single smartphone image, ensures maximum efficiency and low energy consumption.
    Learn More
  • 1
    Platypus

    Platypus

    Create native Mac applications from command line scripts

    Platypus is a developer tool that creates native Mac applications from command line scripts such as shell scripts or Python, Perl, Ruby, Tcl, JavaScript, and PHP programs. This is done by wrapping the script in an application bundle along with a slim app binary that runs the script. Platypus makes it easy to share scripts and programs with people who are unfamiliar with the command line interface. Native, user-friendly applications can be created with a few clicks. It is very easy to create...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    D2

    D2

    D2 is a modern diagram scripting language that turns text to diagrams

    D2 is a diagram scripting language that turns text to diagrams. It stands for Declarative Diagramming. Declarative, as in, you describe what you want diagrammed, it generates the image. As well, the functioning of the install script is described in detail to alleviate any concern of its use. We recommend using your OS's package manager directly instead for improved security but the install script is by no means insecure. D2 includes a variety of official themes to style your diagrams beautifully right out of the box. See ./d2themes to browse the available themes and make or contribute your own creation. ...
    Downloads: 20 This Week
    Last Update:
    See Project
  • 3
    Pipeline Model Definition Plugin

    Pipeline Model Definition Plugin

    Dfine CI/CD workflows using Jenkinsfile

    The Pipeline Model Definition Plugin introduces Declarative Pipelines in Jenkins—offering a more structured, configuration-like syntax for defining CI/CD workflows using Jenkinsfile. It simplifies pipeline creation, gives clearer semantic error messages, supports post-build steps, and is fully extensible via APIs.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 4
    x-ui-yg

    x-ui-yg

    The x-ui simplified and modified version of the script

    ...While it offers ease of use, it also highlights security considerations, encouraging the use of HTTPS and proper authentication for panel access. Overall, x-ui-yg is a lightweight yet powerful management solution for proxy infrastructure.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Collect! is a highly configurable debt collection software Icon
    Collect! is a highly configurable debt collection software

    Everything that matters to debt collection, all in one solution.

    The flexible & scalable debt collection software built to automate your workflow. From startup to enterprise, we have the solution for you.
    Learn More
  • 5
    transcrypt git

    transcrypt git

    transparently encrypt files within a git repository

    A script to configure transparent encryption of sensitive files stored in a Git repository. Files that you choose will be automatically encrypted when you commit them, and automatically decrypted when you check them out. The process will degrade gracefully, so even people without your encryption password can safely commit changes to the repository's non-encrypted files. transcrypt protects your data when it's pushed to remotes that you may not directly control (e.g., GitHub, Dropbox clones,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    shadowsocks-libev

    shadowsocks-libev

    Bug-fix-only libev port of shadowsocks

    Shadowsocks-libev is a lightweight secured SOCKS5 proxy for embedded devices and low-end boxes. Shadowsocks-libev is written in pure C and depends on libev. It's designed to be a lightweight implementation of shadowsocks protocol, in order to keep the resource usage as low as possible. Snap is the recommended way to install the latest binaries. You can build shadowsocks-libev and all its dependencies by script. The latest shadowsocks-libev has provided a redir mode. You can configure your...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 7
    Dependabot

    Dependabot

    Dependabot's core logic for creating update PR's

    Dependabot-Core is the library at the heart of Dependabot security/version updates. Use it to generate automated pull requests updating dependencies for projects written in Ruby, JavaScript, Python, PHP, Dart, Elixir, Elm, Go, Rust, Java and .NET. It can also update git submodules, Docker files, and Terraform files. Check for the latest version of a dependency that's resolvable given a project's other dependencies. Generate updated manifest and lockfiles for a new dependency version....
    Downloads: 8 This Week
    Last Update:
    See Project
  • 8
    Erigon

    Erigon

    Ethereum implementation on the efficiency frontier

    Erigon is an implementation of Ethereum (execution client), on the efficiency frontier, written in Go. For an Archive node of Ethereum Mainnet we recommend >=3TB storage space: 1.8TB state (as of March 2022), 200GB temp files (can symlink or mount folder <datadir>/etl-tmp to another disk). Ethereum Mainnet Full node ( see --prune* flags): 400Gb. Erigon by default is "all in one binary" solution, but it's possible start TxPool as separated processes. Same true about: JSON RPC layer...
    Downloads: 23 This Week
    Last Update:
    See Project
  • 9
    Erlang/OTP

    Erlang/OTP

    Build massively scalable soft real-time systems

    ...It includes its own distributed database, applications to interface towards other languages, debugging and release handling tools. Erlang/OTP is available as pre-built binary packages by most OS package managers. You can use Kerl, a script that lets you easily build Erlang with a few commands. We take security bugs in Erlang/OTP seriously. The Erlang distribution includes a step-by-step getting started guide.
    Downloads: 30 This Week
    Last Update:
    See Project
  • Turn traffic into pipeline and prospects into customers Icon
    Turn traffic into pipeline and prospects into customers

    For account executives and sales engineers looking for a solution to manage their insights and sales data

    Docket is an AI-powered sales enablement platform designed to unify go-to-market (GTM) data through its proprietary Sales Knowledge Lake™ and activate it with intelligent AI agents. The platform helps marketing teams increase pipeline generation by 15% by engaging website visitors in human-like conversations and qualifying leads. For sales teams, Docket improves seller efficiency by 33% by providing instant product knowledge, retrieving collateral, and creating personalized documents. Built for GTM teams, Docket integrates with over 100 tools across the revenue tech stack and offers enterprise-grade security with SOC 2 Type II, GDPR, and ISO 27001 compliance. Customers report improved win rates, shorter sales cycles, and dramatically reduced response times. Docket’s scalable, accurate, and fast AI agents deliver reliable answers with confidence scores, empowering teams to close deals faster.
    Learn More
  • 10
    URE

    URE

    Universal Runtime Environment

    The Universal Runtime Environment (URE) is a computer environment allowing all computer programmers in the world to develop their applications, systems and others easily thanks to its structure for debugging and executing programs written in different languages or different ways for the best understanding, security of the coded information or security of the syntaxes used by the programmers. For expert developers, the objective is to help them adapt their systems, integrated...
    Downloads: 12 This Week
    Last Update:
    See Project
  • 11
    PetoronHash-System

    PetoronHash-System

    PHASH | post-quantum XOF hashing algorithm | C++20

    PHASH is a self-contained, dependency-free, post-quantum XOF hashing algorithm implemented in modern C++20. This release delivers the first fully stable production implementation of the PetoronHash-System — a 1600-bit sponge-based hash function with domain separation, extendable output, and deterministic behavior. Key Features No external dependencies — pure C++20 implementation. Extendable Output (XOF) — supports arbitrary output length (256–8192+ bits). Post-quantum oriented design...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
    pH7 Social Dating CMS (pH7Builder)❤️

    pH7 Social Dating CMS (pH7Builder)❤️

    🚀 Professional Social Dating Web App Builder (formerly pH7CMS)

    pH7Builder is a Professional, Free & Open Source PHP Social Dating Builder Software (primarily designed for developers ...). This Social Dating Web App is fully coded in object-oriented PHP (OOP) with the MVC pattern (Model-View-Controller). It is low resource-intensive, extremely powerful and highly secure. pH7Builder is included with over 42 native modules and is based on its homemade pH7 Framework which includes more than 52 packages To summarize, pH7Builder Social Dating Script...
    Downloads: 29 This Week
    Last Update:
    See Project
  • 13
     Loi 25 Quebec Cookie Consent

    Loi 25 Quebec Cookie Consent

    Free WordPress plugin for Quebec's Law 25. Bilingual cookie banner

    The only FREE, open-source WordPress plugin fully compliant with Quebec’s Law 25 (Bill 64). Blocks tracking scripts (Google Analytics, Meta Pixel) until user consent. KEY FEATURES • Automatic Script Blocking: Paste scripts into the “Vault” — they run only after “Accept.” • Google Consent Mode v2: Supports ad_storage & analytics_storage. • Bilingual (FR/EN): Auto-detects WordPress language. • 3 Display Styles: Bar, Popup, or Corner Widget. • Lightweight: Vanilla JS (<10KB), no...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    CrossC2 framework

    CrossC2 framework

    generate CobaltStrike's cross-platform payload

    Support CobaltStrike's security assessment of other platforms (Linux/MacOS/...), and include the development support of Unix post-penetration module.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 15

    htmLawed

    PHP code to purify & filter HTML

    The htmLawed PHP script makes HTML more secure and standards- & policy-compliant. The customizable HTML filter/purifier can balance tags, ensure proper nestings, neutralize XSS, restrict HTML, beautify code like Tidy, implement anti-spam measures, etc.
    Leader badge
    Downloads: 167 This Week
    Last Update:
    See Project
  • 16
    Automated_Quiz

    Automated_Quiz

    A Shell Script for Quizzing the whole class of students and log result

    Please download the above zip file and extract it to a secret folder and run the quiz.sh script from that folder in your terminal program, as shown in the youtube videos : https://youtu.be/kQi0XlIaT9M and https://youtu.be/prwKN5DiFp0 You may change the contents of the quiz.txt file to your liking, while maintaining the format of it. Note: Press Enter/Return key after typing on your Terminal, to proceed to the next step, while testing the quiz.sh script. Also, increase the terminal...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Node.js express.js MongoDB JWT REST API

    Node.js express.js MongoDB JWT REST API

    Node.js express.js MongoDB JWT REST API - Basic Project Skeleton

    ...This basic example shows how powerful and simple JavaScript can be. Do you want to contribute? Pull requests are always welcome to show more features. Custom email/password user system with basic security and blocking for preventing brute force attacks. Login access log with IP, browser and country location (for country it looks for the header cf-ipcountry that CloudFlare creates when protecting your website). NPM script for keeping good source code formatting using prettier and ESLint. JWT Tokens, make requests with a token after login with the Authorization header with value Bearer yourToken where yourToken is the signed and encrypted token given in the response.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    dat.GUI

    dat.GUI

    dat.gui is a lightweight controller library for JavaScript

    ...The easiest way to use dat.GUI in your code is by using the built source at build/dat.gui.min.js. These built JavaScript files bundle all the necessary dependencies to run dat.GUI. If you're using a server with a Content Security Policy in place that blocks 'unsafe-inline', you will have problems when dat.gui.js tries to inject style information. To get around this, load 'build/dat.gui.css' as an external style sheet. With the npm run build script you can build development and production version of scripts. And with the npm run dev script you can build development version of script and watch for changes.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    ReconSpider

    ReconSpider

    Most Advanced Open Source Intelligence (OSINT) Framework

    ReconSpider is most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Addresses, Emails, Websites, and Organizations and find out information from different sources. ReconSpider can be used by Infosec Researchers, Penetration Testers, Bug Hunters, and Cyber Crime Investigators to find deep information about their target. ReconSpider aggregate all the raw data, visualize it on a dashboard, and facilitate alerting and monitoring on the data. Recon Spider also combines the...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 20
    Big List of Naughty Strings

    Big List of Naughty Strings

    List of strings which have a high probability of causing issues

    The Big List of Naughty Strings is a community-maintained catalog of “gotcha” inputs that commonly break software, from unusual Unicode to SQL and script injection payloads. It exists so developers and QA engineers can easily test edge cases that normal test data would miss, such as zero-width characters, right-to-left marks, emojis, foreign alphabets, and long or malformed strings. By throwing these strings at forms, APIs, databases, and UIs, teams can discover encoding bugs, sanitizer gaps, rendering issues, and security oversights early. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    rust_cmd_lib

    rust_cmd_lib

    Common rust command-line macros and utilities

    ...It hides much of the boilerplate of std::process::Command when you're doing simple task automations, but still allows full flexibility when needed. Because it avoids launching a shell, it reduces some classes of security and quoting errors, while improving readability of scripting logic inside a Rust binary.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 22

    RADPhE

    Rapid Application Development PHP Hosting Environment

    A Rapid PHP Application Development Environment designed for webmasters, developers, and hosts to enforce website uniformity, hardening, and light weight enough to function within shared hosting, in the presence of other scripts, and nested within itself.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Sudomy

    Sudomy

    Sudomy is a subdomain enumeration tool to collect subdomains

    Sudomy is a subdomain enumeration tool to collect subdomains and analyze domains performing advanced automated reconnaissance (framework). This tool can also be used for OSINT (Open-source intelligence) activities. Easy, light, fast and powerful. Bash script (controller) is available by default in almost all Linux distributions. By using bash script multiprocessing feature, all processors will be utilized optimally. Subdomain enumeration process can be achieved by using active method or...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Movies for Hackers

    Movies for Hackers

    A curated list of movies every hacker & cyberpunk must watch

    ...It provides both a readable README and a sortable web view for browsing the collection more easily. The repository also includes guidance for contributors and a small script to help work with the list, encouraging community additions and updates under a CC0-1.0 license. The selection highlights movies that explore themes of security, privacy, code, networks, and the social impact of technology, useful for entertainment and cultural context for technologists. Because it’s a plain-text, cross-platform resource, anyone can fork the list, propose additions, or reuse the dataset in their own tooling.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 25
    modernish

    modernish

    Modernish is a library for writing robust, portable, readable, and pow

    ...It can be deployed in embedded or multi-user systems in which new binary executables may not be introduced for security reasons, and is portable among numerous shell implementations. The installer can also bundle a reduced copy of the library with your scripts, so they can run portably with a known version of modernish without requiring prior installation.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB