4 projects for "python::module" with 2 filters applied:

  • Attack Surface Management | Criminal IP ASM Icon
    Attack Surface Management | Criminal IP ASM

    For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

    Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
    Learn More
  • Mavenlink | Project Management Software Icon
    Mavenlink | Project Management Software

    Connecting People, Projects, and Profits

    Mavenlink is an innovative online resource management and project management software built for professional services teams. Offering a better way to manage projects and resources, Mavenlink transforms businesses by combining project management, collaboration, time tracking, resource management, and project financials all in one place.
    Get Started Today
  • 1
    z-utalm

    z-utalm

    Unified Test and Logging layer for multiple programming languages

    Modern software systems and application are commonly written in multiple languages, include scripting engines, and are frequently build on multiple specialized frameworks and middleware for a considerable diversity of runtime environments. The latest influencing update in development paradigm is the application of multicore processors. This projects is aimed to unify the required trace and logging output and integrate into debugging environments. The target is to provide general development,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    aim is to provide support for monitoring system behaviour through dynamic analysis, and for analysing and modeling this data for a better understanding of system behaviour and for test automation
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    "Yet Another Do-It-Yourself (Test) Automation Framework" specification. Use or modify one of the existing software implementations (hosted/referenced here), or implement the framework yourself. Download and read the spec for more details.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Testerman

    A TTCN-3-inspired testing environment in Python

    Testerman is an attempt to produce a TTCN-3 inspired test automation system without the strict typing model of the TTCN-3 test control notation that can be too heavy to be practical with non-stricly defined protocols. This is achieved by bringing TTCN-3 primitives and concepts to the Python programming language. It provides a complete environment to design, manage, execute and analyze automated tests, and can be used as a platform to develop test simulators (drivers and stubs) and prototypes of network applications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cybersecurity Starts With Password Security. Icon
    Cybersecurity Starts With Password Security.

    Keeper is the top-rated password manager for protecting you, your family and your business from password-related data breaches and cyberthreats.

    Research shows that a whopping 81% of data breaches are due to weak or stolen passwords. Business password managers provide an affordable and simple way for companies to solve the single biggest root cause of most data breaches. By implementing Keeper, your business is significantly reducing the risk of a data breach.
    Get Started
  • Previous
  • You're on page 1
  • Next