Showing 1 open source project for "ftp"

View related business solutions
  • DataImpulse - Ethical Provider of Residential, Mobile, and Data Center IPs Icon
    DataImpulse - Ethical Provider of Residential, Mobile, and Data Center IPs

    For anyone looking for residential proxies, mobile proxies, and datacenter proxies

    DataImpulse (dataimpulse.com) is a proxy provider offering a pool of over 90 million ethically sourced residential, mobile, and data center IP addresses from 195 countries. Pricing for residential proxies starts at $1 per GB with a pay-as-you-go model; there are no subscriptions or traffic expiration dates.
    Learn More
  • Attack Surface Management | Criminal IP ASM Icon
    Attack Surface Management | Criminal IP ASM

    For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

    Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
    Learn More
  • 1
    bearer

    bearer

    Code security scanning tool (SAST) to discover security risks

    ...Leakage of sensitive data through cookies, internal loggers, third-party logging services, and into analytics environments. Usage of weak encryption libraries or misusage of encryption algorithms. Unencrypted incoming and outgoing communication (HTTP, FTP, SMTP) of sensitive information. Non-filtered user input. Hard-coded secrets and tokens. Bearer currently supports JavaScript and Ruby stacks, more will follow. Bearer's scanners and reports are your path to analyzing security risks and vulnerabilities in your application.
    Downloads: 5 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB