Showing 9 open source projects for "python server"

View related business solutions
  • Earn up to 15% annual interest with Nexo. Icon
    Earn up to 15% annual interest with Nexo.

    Let your crypto work for you

    Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • Earn up to 15% annual interest with Nexo. Icon
    Earn up to 15% annual interest with Nexo.

    Access competitive interest rates on your digital assets.

    Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 1
    CacheGuard Gateway

    CacheGuard Gateway

    CacheGuard Gateway is a UTM, a WAF, and a QoS management appliance.

    CacheGuard Gateway is a simple internet security solution for startups, small businesses and SMEs that need strong protection without complexity. A free, open-source Unified Threat Management (UTM) platform for quick deployment and easy management. Download CacheGuard-OS and install on bare-metal or a virtual machine. In minutes, you get a complete security gateway protecting your network at no cost. Includes firewall, web antivirus, VPN, URL filtering, and SSL-inspecting web proxy in...
    Leader badge
    Downloads: 197 This Week
    Last Update:
    See Project
  • 2
    Network Security Toolkit (NST)

    Network Security Toolkit (NST)

    A network security analysis and monitoring toolkit Linux distribution.

    Network Security Toolkit (NST) is a bootable ISO image (Live USB Flash Drive) based on Fedora 42 providing easy access to best-of-breed Open Source Network Security Applications and should run on most x86_64 systems. The main intent of developing this toolkit was to provide the security professional and network administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in the article: Top 125 Security Tools by INSECURE.ORG are available...
    Leader badge
    Downloads: 137 This Week
    Last Update:
    See Project
  • 3
    Remote PC Input

    Remote PC Input

    Mobile device as wireless keyboard and mouse for PC

    Now Remote-PC-Input is a Progressive Web Application (PWA): https://remote-pc-input.tecnobillo.com Control your PC from your mobile device. Remote PC Input is a wireless mouse and keyboard: https://remote-pc-input.tecnobillo.com/app.html To connect with the PC you must download the application server: https://remote-pc-input.tecnobillo.com/rpci-ws/remote-pc-input-ws.rar
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    KeexyBox

    KeexyBox

    The box to keep the Internet under your control

    KeexyBox allows you to do parental control, block ads, limit telemetry, and browse the Internet anonymously from your home network without installing any software on your devices. It also can be used to create a public wireless access point with the captive portal. It is a software program which requires a Raspberry PI box and which is installed on Raspbian. It constitutes a cut-off point between your devices (computers, tablets, smartphones, etc.) and your router or Internet box....
    Downloads: 4 This Week
    Last Update:
    See Project
  • Securden Privileged Account Manager Icon
    Securden Privileged Account Manager

    Unified Privileged Access Management

    Discover and manage administrator, service, and web app passwords, keys, and identities. Automate management with approval workflows. Centrally control, audit, monitor, and record all access to critical IT assets.
    Learn More
  • 5
    ZeroNet

    ZeroNet

    Decentralized websites using Bitcoin crypto and BitTorrent network

    Open, free and uncensorable websites, using Bitcoin cryptography and BitTorrent network. Your content distributed directly to other visitors without any central server. Uncensored: It's nowhere because it's everywhere! No hosting costs: Sites are served by visitors. Always accessible: No single point of failure. No configuration needed: Download, unpack and start using it. Decentralized domains using Namecoin cryptocurrency. Your account is protected by the same cryptography as your Bitcoin...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    pyshot, windows session recorder/auditor
    pySHOT is a session recorder for windows. (soon linux session recorder also) It's a client/server python app using gearman. To use pyshot you must install pyshot-client from https://sourceforge.net/projects/pyshot-client/ on monitored server
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Proxy Tester is a proxy list tester and then it generates a wpad.dat file you can use for your browser based on working servers. wpad.dat file selects a random proxy server from the list of provided working proxy servers with each connection request.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    yaSSL, or yet another SSL, is an embedded ssl library for programmers building security functionality into their applications and devices. yaSSL is highly portable, and runs on standard as well as embedded platforms(QNX, ThreadX, VxWorks, Tron) yaSSL is still available but no longer being developed. Current development on the same project continues under wolfSSL. Visit yaSSL Home above for the latest stable release.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Etch is a cross-platform, language- and transport-independent framework for building and consuming network services. With Etch, service development and consumption becomes no more difficult than library development and consumption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Comet Backup - Fast, Secure Backup Software for MSPs Icon
    Comet Backup - Fast, Secure Backup Software for MSPs

    Fast, Secure Backup Software for Businesses and IT Providers

    Comet is a flexible backup platform, giving you total control over your backup environment and storage destinations.
    Learn More
  • Previous
  • You're on page 1
  • Next