Showing 288 open source projects for "c--"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • 1
    This project intends to build a complete CallerID-function for home- or small buisniess environments. It depends on simple hardware which everyone can build. It will present the incomming call's number on every workstation on the network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    tcpick is a textmode sniffer; it tracks tcp streams, shows the status, reassembles and saves the data captured in files or displays them in the terminal in different modes (ascii, hex..). There is a color-mode. Useful to get files passively.
    Leader badge
    Downloads: 9 This Week
    Last Update:
    See Project
  • 3
    General line based buffer with backlog written in "C". It supports multiple input and a single output. I/O modules: TCP/IP, UDP/IP, Unix sockets, File/Pipe. It supports backlog writing (and resume) so a failsafe transport-buffer can be build.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Log common Windows trojan attempts (and optionally emulate the trojan). *This project is not actively maintained, and the software is of little use today.*
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    A resource-conscientious, flexible, modular, platform-independent, scalable and robust server based on ircd-ratbox.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Daemon to sit between NAS and RADACCT server and provide an automated spooling service of Accounting information should the server fail to respond. Helps reduce impact of temporary failure of single accounting server
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    S.M.A.R.T. Linux is a bootable floppy distribution containing tool (smartmontools) for monitoring IDE/SCSI hard disks (using Self-Monitoring, Analysis and Reporting Technology). It is based on Slackware Linux.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    Syscall logger is a Linux kernel patch which enables logging of the selected syscalls using syslog.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Find out who's calling you before pick up the phone. No extra hardware is required as long as your modem is supported.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    VILE is a high performance logging tool for C and C++ programs. VILE can be used for debugging or performance analysis.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    The Looper Event / Alert System is an application primarily used for network management to perform alert monitoring and redirection. It is designed with extreme simplicity in mind and is highly modularized. Also used as a Netcool probe or gqateway.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Impost is a network security auditing tool designed to analyze the forensics behind protocol exploitation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    YAML (tm) is a straight-forward data serilization language, offering an alternative to XML where markup (named lists and mixed content) are not needed. YAML borrows ideas from rfc822, SAX, C, HTML, Perl, and Python.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Nasty LKM Defender is a module wich protects Your system against some nasty modules (e.g. rootkits). Well mainly it protects sys_call_table and some other important functions (get_module_list, sys_query_module)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    CTrace is a multi-threaded trace debug library written in C. It provides a simple, fast, well documented trace utility for applications and as such is especially suitable for use in real-time embedded applications.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 16
    "GETO" is NIPS system. NIPS is a system which prevent any abnormal network user from access your valuable server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Automated Security Tools (autosec) aims to provide automatic tools which network administrators may use to help check and test the security of their network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Output spool reader for Snort! This program decouples output overhead from the Snort network intrusion detection system and allows Snort to run at full speed. It takes input and output plugins and can therefore be used to convert almost any spooled fil
    Downloads: 3 This Week
    Last Update:
    See Project
  • 19
    sldb is the embedded database for syslog. It captures log messages to a disk-backed database, and sorts them by user-defined subject. Excess messages from each bin are pruned on a first-in, first out basis.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Loggy is a Linux Advanced Logcleaner and a tool to hide you in a linux machine by cleaning or modifing the intruder's ip from all the logfiles in /var bin and txt logs it find logs, with a recursive search in /var/log and a lot of fantastic features
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    xrootconsole tails a file in a window on your X11 root window. It aims to be as simple and resource-light as possible, within reason: it should run smootlhy on a P133 laptop. The program is non-interactive; all configuration is done on the command line.
    Downloads: 17 This Week
    Last Update:
    See Project
  • 22
    SETILog saves some statistics of a completed SETI@home work-unit in a text CSV file. This file is needed by SETIWatch to keep track of the completed workunits.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Billing system for PPTP and PPPOE servers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    This is a simple utility to track the amount of time a PC is used. It can the used to determine 1. whether PCs are being used optimally, e.g. internet cafe's. 2. productivity (similar to punchcards). 3. sleep/wake cycles or bipolar cycles.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Logcheck is software package that is designed to automatically run and check system log files for security violations and unusual activity. Logcheck utilizes a program called logtail that remembers the last position it read from in a log file.
    Downloads: 0 This Week
    Last Update:
    See Project