Showing 4 open source projects for "x-vpn"

View related business solutions
  • Get full visibility and control over your tasks and projects with Wrike. Icon
    Get full visibility and control over your tasks and projects with Wrike.

    A cloud-based collaboration, work management, and project management software

    Wrike offers world-class features that empower cross-functional, distributed, or growing teams take their projects from the initial request stage all the way to tracking work progress and reporting results.
    Learn More
  • Secure Cloud Storage for Files, Photos and Documents | pCloud Icon
    Secure Cloud Storage for Files, Photos and Documents | pCloud

    Store, access, and manage your files on your own terms, from anywhere.

    Store, sync, and share your files securely with pCloud. Get up to 10 GB of free secure cloud storage and access your files from any device, anywhere.
    Learn More
  • 1
    firezone

    firezone

    Enterprise-ready zero-trust access platform built on WireGuard

    Firezone is a modern, self-hosted VPN solution built on WireGuard, designed to provide secure remote access for teams and infrastructure. It offers a sleek web interface, automatic configuration management, and strong encryption. Unlike traditional VPNs, Firezone focuses on ease of deployment, scalability, and integration with identity providers, making it ideal for developers and teams needing secure networking without relying on third-party services.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 2
    observer_cli

    observer_cli

    Visualize Erlang/Elixir Nodes On The Command Line

    Observer CLI is a library to be dropped into any beam nodes, to be used to assist DevOps people to diagnose problems in production nodes. Provide a high-performance tool usable both in development and production settings. Focus on important and detailed information about real-time running systems. Keep minimal consumption. Increments are values that are mostly useful when compared to a previous one to have an idea of what they're doing because otherwise, they'd never stop increasing: bytes...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 3
    Cachex

    Cachex

    A powerful caching library for Elixir with support for transactions

    Cachex is a high-performance in-memory caching library for Elixir, offering a robust feature set including expirations, size limits, hooks, fallbacks, async operations, and clustering capabilities. The version 4.x release brought optimized janitor routines, modular streaming and querying, runtime cache warming, size pruning (LRW/LRU), distributed routing mechanisms, and a major documentation overhaul. It integrates seamlessly with Elixir applications via mix dependencies, supports advanced transactional use cases, and includes utilities for distributed node clusters.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4
    Guardian

    Guardian

    Elixir Authentication

    ...By default JSON Web Tokens are supported out of the box but you can use any token that Has the concept of a key-value payload, is tamper-proof, can serialize to a String, or that has a supporting module that implements the Guardian.Token behavior. You can use Guardian tokens to authenticate web endpoints (Plug/Phoenix/X), channels/Sockets (Phoenix - optional), and any other system you can imagine. If you can attach an authentication token you can authenticate it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Attack Surface Management | Criminal IP ASM Icon
    Attack Surface Management | Criminal IP ASM

    For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

    Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
    Learn More
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB