Search Results for "identify unknown networks"

Showing 51 open source projects for "identify unknown networks"

View related business solutions
  • Project Planning and Management Software | Planview Icon
    Project Planning and Management Software | Planview

    Connect programs, projects, resources, and financials with business outcomes using portfolio management software from Planview.

    Planview® Portfolios enables enterprises to accelerate strategic execution by seamlessly integrating business and technology planning, optimizing resources, and leveraging the power of embedded AI — Planview Anvi™ — to deliver breakthrough products, services, and customer experiences. This unified approach aligns strategy with execution, driving enhanced business performance across the organization.
    Learn More
  • Manage and optimise Google, Facebook and Microsoft Ads faster and gain a competitive advantage with our digital advertising platform. Icon
    Manage and optimise Google, Facebook and Microsoft Ads faster and gain a competitive advantage with our digital advertising platform.

    Smarter, more effective advertising

    Slash the time it takes to manage and optimize your Google, Microsoft Advertising or Facebook Ads campaigns to just minutes a day. Adzooma's AI and machine learning based PPC platform offers stress free campaign management, state of the art 24/7 optimization and advanced automation, all in a simple to use interface. Scan for 50+ improvement 'opportunities', many of which can be actioned with a single click, track PPC performance and highlight over/under spending to improve your quality score, conversions and ROI. These trying times are tough for all. So we're giving away our whole award-winning platform for free until June 1st 2020. That's automated PPC ads, one-click optimisations, and world-class reporting - at zero cost. No strings attached. No credit card required.
    Free until June 1st 2020
  • 1
    YARA

    YARA

    The pattern matching swiss knife for malware researchers

    ...YARA-CI may be a useful addition to your toolbelt. This is GitHub application that provides continuous testing for your rules, helping you to identify common mistakes and false positives. If you plan to use YARA to scan compressed files (.zip, .tar, etc) you should take a look at yextend, a very helpful extension to YARA developed and open-sourced by Bayshore Networks.
    Downloads: 44 This Week
    Last Update:
    See Project
  • 2
    Stock prediction deep neural learning

    Stock prediction deep neural learning

    Predicting stock prices using a TensorFlow LSTM

    Predicting stock prices can be a challenging task as it often does not follow any specific pattern. However, deep neural learning can be used to identify patterns through machine learning. One of the most effective techniques for series forecasting is using LSTM (long short-term memory) networks, which are a type of recurrent neural network (RNN) capable of remembering information over a long period of time. This makes them extremely useful for predicting stock prices. Predicting stock prices is a complex task, as it is influenced by various factors such as market trends, political events, and economic indicators. ...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 3
    geowifi

    geowifi

    OSINT tool for locating WiFi networks using BSSID or SSID data

    geowifi is an open source OSINT tool designed to search and retrieve geolocation information about WiFi networks using their BSSID or SSID identifiers. It queries several public WiFi geolocation databases and aggregates the results to help identify the approximate location of a wireless access point. By combining multiple data sources such as Wigle, Apple, Google, WifiDB, Mylnikov, and Combain, the tool can provide location data that may include coordinates and additional network metadata. ...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 4
    IVRE

    IVRE

    Open source framework for large scale network reconnaissance and analy

    IVRE is an open source network reconnaissance framework designed to collect, process, and analyze intelligence gathered from network scans and traffic data. It provides tools for both active and passive reconnaissance, enabling users to understand how networks behave and identify exposed services or infrastructure. The framework integrates with well known security and scanning tools such as Nmap, Masscan, ZGrab2, ZDNS, and Zeek to gather large amounts of network intelligence. IVRE stores the collected data in a database and offers multiple ways to explore and analyze it, including a web interface, command line tools, and a Python API. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • PairSoft | AP Automation and Doc Management Icon
    PairSoft | AP Automation and Doc Management

    Free your team from manual processes.

    Streamline operations and elevate your team's efficiency with PairSoft. Our AP automation, procurement, and document management solutions eliminate manual processes, cut costs, and free your team to focus on strategic initiatives. Experience our state-of-the-art invoice-to-pay solution, now integrated with advanced AI technology for faster, smarter results. Our customers report a significant 70% reduction in approval times and annual savings of $62,000 in employee hours. At PairSoft, we aim to transform your business operations through automation. Explore the future of automation at pairsoft.com, where you can leverage cutting-edge features like invoice capture, OCR, and comprehensive AP automation to transform your workflow. Whether you are a small business or a large enterprise, our solutions are designed to scale with your needs, providing robust functionality and ease of use. Join the growing number of businesses that trust PairSoft.
    Learn More
  • 5
    GoSearch

    GoSearch

    OSINT tool to find usernames and digital footprints across 300+ sites

    ...The tool reduces false positives and false negatives by clearly marking uncertain matches, allowing users to quickly identify reliable results. In addition to username searches, GoSearch can check various breach intelligence databases for compromised credentials linked to a username. If password hashes are found in breach data, the tool can attempt to crack them using the Weakpass database.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 6
    HomeRobot

    HomeRobot

    Mobile manipulation research tools for roboticists

    ...Designed for low-cost robots such as the Hello Robot Stretch, HomeRobot enables agents to perceive, navigate, and interact with their surroundings through vision and manipulation. The system focuses on Open Vocabulary Mobile Manipulation (OVMM) — a challenging task in which a robot must explore an unknown environment, identify an object by name, locate a suitable receptacle, and place the object appropriately. HomeRobot integrates perception, planning, and control under a unified architecture, supporting AI Habitat for simulation and ROS Noetic for real-world deployment. It provides interfaces for Detic, Grounded-SAM, and Contact-GraspNet, allowing open-vocabulary detection and 3D grasping.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    PentestAgent

    PentestAgent

    AI agent framework for black-box security testing

    PentestAgent is an open-source autonomous security testing platform designed to help organizations identify vulnerabilities and assess security posture by simulating real-world attack scenarios without manual intervention. It brings a modular and automated approach to penetration testing by orchestrating a suite of tools and scripts that can emulate common exploitation techniques, reconnaissance workflows, and post-exploitation activities across targets. Users configure rules, policies, and...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 8
    AdGuard Filters

    AdGuard Filters

    AdGuard Content Blocking Filters

    ...These filters are composed of text-based rules that instruct applications to block advertisements, trackers, pop-ups, and other intrusive elements from web pages. The project is continuously updated by contributors who identify new advertising domains, tracking scripts, and annoyance elements across a wide range of websites. It includes multiple specialized filter lists targeting different types of content, such as general ads, privacy threats, social widgets, and regional advertising networks. The repository is designed to be compatible with various platforms, including browser extensions, mobile apps, and DNS-based blocking systems.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    AI Powered Knowledge Graph Generator

    AI Powered Knowledge Graph Generator

    AI Powered Knowledge Graph Generator

    ...The system emphasizes structured data modeling and graph-based queries that allow users to explore relationships that would be difficult to identify using traditional relational databases.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Planfix: Manage Projects, Team's Tasks and Business Processes Icon
    Planfix: Manage Projects, Team's Tasks and Business Processes

    All-in-One Enterprise-Level Software is Now Available for SMB

    Planfix is like a souped-up business process management system for folks who really know their stuff. It's built to help you dive deeper and gives you more options than your run-of-the-mill project and task management systems. Best part? Even small businesses and non-profits can get in on the action.
    Learn More
  • 10

    KdumpID

    Identify any kernel core dump file

    The kdumpid utility can be used to find out the exact kernel architecture and version of an unknown kernel core dump.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    DeFi-Yield-Farming-Bot
    Welcome to the DeFi Yield Farming Bot! This tool is designed to automate liquidity provision and optimize returns on various decentralized finance (DeFi) platforms. Whether you're an experienced yield farmer or just getting started, this bot simplifies the process and helps maximize your passive income. The bot supports the following blockchain networks: Ethereum Fuse Telos Meter Moonriver Polygon PoS Avalanche Theta Fantom Harmony Shard-0 Binance Smart Chain Solana
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Mev Seeker

    Mev Seeker

    Mev Seeker is an advanced All-In-One (AIO) Mev Bot

    Mev Seeker is an advanced All-In-One (AIO) Maximal Extractable Value (MEV) bot engineered to autonomously identify and capitalize on profitable trading opportunities across both Solana and Ethereum blockchain networks. By meticulously monitoring pending transactions and analyzing market dynamics, Mev Seeker executes strategies such as arbitrage, front-running, and sandwich attacks to optimize returns.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    DocWire SDK

    DocWire SDK

    Award-winning modern data processing SDK in C++20

    DocWire SDK, a standout C++20AI driven data processing tool, has received award from SourceForge and strong backing from Microsoft. It handles nearly 100 file types, empowering efficient text extraction, web data extraction, and document analysis. For businesses, the shift to DocWire SDK signifies a leap forward. It promises comprehensive document format support and the ability to extract valuable insights from email boxes, databases, and websites using cutting-edge AI. DocWire SDK aims to...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 14
    SocialPwned

    SocialPwned

    OSINT tool to collect emails from social networks and find leaks

    SocialPwned is an OSINT tool designed to gather publicly exposed email addresses from social networks and analyze them for potential credential leaks. It helps security researchers and penetration testers identify vulnerable targets during the footprinting phase of ethical hacking engagements. It collects email addresses associated with individuals or organizations from platforms such as Instagram, LinkedIn, and Twitter. Once emails are discovered, SocialPwned searches for leaked credentials using breach databases like PwnDB and Dehashed to determine whether those accounts have appeared in data leaks. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    RY GeoIP 3

    RY GeoIP 3

    User-friendly network & geolocation tools, APIs integration and more!

    RY GeoIP 3 is a powerful application that combines network and geolocation tools for comprehensive analysis. With its user-friendly interface and integration with Google Maps API and API Ninja DNS Lookups service, you can perform a wide range of operations, from geolocation lookups and ping tests to DNS analysis, traceroute, SSL certificate inspection, header data retrieval, and open port scanning. The ability to save data as PDFs and maps as images further enhances the utility of the...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 16
    BloodHound Legacy

    BloodHound Legacy

    Six Degrees of Domain Admin

    BloodHound Legacy is the deprecated open‑source version of the BloodHound Active Directory attack path analysis tool. It uses graph theory to model and visualize privileged relationships in AD, Entra ID, and Azure environments. Security professionals use it to enumerate domain privilege escalation paths, misconfigurations, and attack surfaces in corporate networks
    Downloads: 13 This Week
    Last Update:
    See Project
  • 17
    PuntoGPS

    PuntoGPS

    Minimalistic wide-open GPS-locator/tracker

    ...It's free, open source, portable and cross-platform. *** NB *** - Check the "allow unknown sources" option on your device security settings to setup on Android. Current version: 0.9 (beta) Release notes: -> https://sourceforge.net/p/puntogps/blog/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    WebDeets

    WebDeets

    WebDeets Powerful And Versatile Network Utility App

    WebDeets Is A Network Utility App That Is Used For Network Diagnostics And Troubleshooting. Provide Features That Can Help, Network Administrators And IT Professionals To Monitor And Troubleshoot Network Performance, Identify Potential Vulnerabilities And Take Proactive Steps To Address Any Issues. It Can Convert IP Addresses To Hostnames And Vice Versa And Comes With Preloaded Commands Of Netstat And Ping. It Allows You To Save Results In Different Formats And Has A Real-Time Terminal Feature. Overall, It's A Powerful Tool For Network Administrators And IT Professionals WebDeets is a versatile Tool That Simplifies Network Diagnostics And Is Essential For Anyone Working With Complex Networks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Log4jScanner

    Log4jScanner

    A log4j vulnerability filesystem scanner and Go package

    log4jscanner is a filesystem scanner and Go package that helps organizations quickly identify vulnerable Log4j components inside JARs and shaded dependencies. Instead of probing networks, it walks directories and archives, including nested JARs, to find version fingerprints and risky classes associated with the Log4Shell family of issues. The focus on static analysis makes it suitable for container images, build artifacts, and offline systems where active scanning isn’t feasible. ...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 20
    SVoice (Speech Voice Separation)

    SVoice (Speech Voice Separation)

    We provide a PyTorch implementation of the paper Voice Separation

    SVoice is a PyTorch-based implementation of Facebook Research’s study on speaker voice separation as described in the paper “Voice Separation with an Unknown Number of Multiple Speakers.” This project presents a deep learning framework capable of separating mixed audio sequences where several people speak simultaneously, without prior knowledge of how many speakers are present. The model employs gated neural networks with recurrent processing blocks that disentangle voices over multiple computational steps, while maintaining speaker consistency across output channels. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Hands-on Unsupervised Learning

    Hands-on Unsupervised Learning

    Code for Hands-on Unsupervised Learning Using Python (O'Reilly Media)

    This repo contains the code for the O'Reilly Media, Inc. book "Hands-on Unsupervised Learning Using Python: How to Build Applied Machine Learning Solutions from Unlabeled Data" by Ankur A. Patel. Many industry experts consider unsupervised learning the next frontier in artificial intelligence, one that may hold the key to the holy grail in AI research, the so-called general artificial intelligence. Since the majority of the world's data is unlabeled, conventional supervised learning cannot...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    NeuralBot

    NeuralBot

    A general purpose aimbot, which uses a neural network for enemy/target

    NeuralBot is a general-purpose aimbot that utilizes neural networks for enemy or target detection. Unlike traditional aimbots that may interact directly with game memory, NeuralBot functions as a "pixel bot," analyzing on-screen pixels to identify targets. This approach makes it versatile across various first-person shooter games without modifying game files.
    Downloads: 19 This Week
    Last Update:
    See Project
  • 23
    EfficientNet Keras

    EfficientNet Keras

    Implementation of EfficientNet model. Keras and TensorFlow Keras

    This repository contains a Keras (and TensorFlow Keras) reimplementation of EfficientNet, a lightweight convolutional neural network architecture achieving state-of-the-art accuracy with an order of magnitude fewer parameters and FLOPS, on both ImageNet and five other commonly used transfer learning datasets. Convolutional Neural Networks (ConvNets) are commonly developed at a fixed resource budget, and then scaled up for better accuracy if more resources are available. In this paper, we systematically study model scaling and identify that carefully balancing network depth, width, and resolution can lead to better performance. Based on this observation, we propose a new scaling method that uniformly scales all dimensions of depth/width/resolution using a simple yet highly effective compound coefficient. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Top deep learning Github repositories

    Top deep learning Github repositories

    Top 200 deep learning Github repositories sorted by stars

    ...Instead of providing its own machine learning models or frameworks, the project functions as an organized index that helps users discover high-quality deep learning repositories across different application domains. The repository categorizes projects related to neural networks, computer vision, natural language processing, reinforcement learning, and other areas of artificial intelligence. By collecting popular open-source implementations in one place, the project simplifies the process of exploring cutting-edge tools and research implementations for deep learning practitioners. The curated lists are particularly helpful for developers who want to quickly identify well-maintained projects with strong community support.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Literature of Deep Learning for Graphs

    Literature of Deep Learning for Graphs

    A comprehensive collection of recent papers on graph deep learning

    Literature of Deep Learning for Graphs is a curated repository that collects research papers and educational resources related to deep learning methods for graph-structured data. The project organizes important academic work covering topics such as graph neural networks, graph embeddings, knowledge graphs, and network representation learning. By structuring the literature into categories, the repository allows researchers to quickly identify influential papers in specific subfields of graph machine learning. The collection includes foundational works that introduced graph convolutional networks as well as more recent research on large-scale graph representation learning and graph generation techniques. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next
MongoDB Logo MongoDB