Showing 9 open source projects for "win memory check"

View related business solutions
  • SIEM | API Security | Log Management Software Icon
    SIEM | API Security | Log Management Software

    AI-Powered Security and IT Operations Without Compromise.

    Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can:
    Learn More
  • Dominate AI Search Results Icon
    Dominate AI Search Results

    Generative Al is shaping brand discovery. AthenaHQ ensures your brand leads the conversation.

    AthenaHQ is a cutting-edge platform for Generative Engine Optimization (GEO), designed to help brands optimize their visibility and performance across AI-driven search platforms like ChatGPT, Google AI, and more.
    Learn More
  • 1
    EaseProbe

    EaseProbe

    A simple, standalone, and lightweight tool

    EaseProbe is a simple, standalone, and lightweight tool that can do health/status checking, written in Go. Checking the HTTP status code, Support mTLS, HTTP Basic Auth, and can set the Request Header/Body. Check whether a TCP connection can be established or not. Run a Shell command and check the result. Run a remote command via SSH and check the result. Support the bastion/jump server. Connect to a given port using TLS and (optionally) validate for revoked or expired certificates. Run an SSH command on a remote host and check the CPU, Memory, and Disk usage. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Eclipse Collections

    Eclipse Collections

    Eclipse Collections is a collections framework for Java

    ...Many container types include immutable collections, primitive collections, bimaps, multimaps and bags. You can make use of various container types, leveraging handy factory methods for instantiation. Eclipse Collections provides a memory-efficient implementation of Sets and Maps as well as primitive collections. Check out the Eclipse Collections Kata, a fun way to help you learn idiomatic Eclipse Collections usage. This particular kata is set up as a series of unit tests that fail. Your task is to make them pass, using Eclipse Collections.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    PHP-Casbin

    PHP-Casbin

    An authorization library that supports access control models

    ...In Casbin, an access control model is abstracted into a CONF file based on the PERM metamodel (Policy, Effect, Request, Matchers). So switching or upgrading the authorization mechanism for a project is just as simple as modifying a configuration. Besides memory and file, Casbin policy can be stored into lots of places. Currently, dozens of databases are supported, from MySQL, Postgres, Oracle to MongoDB, Redis, Cassandra, AWS S3. Check the full supported list at: adapters. Casbin is implemented in Golang, Java, PHP and Node.js. All implementations share the same API and behaviors. You can learn Casbin once and use it everywhere.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 4
    jjb

    jjb

    A chrome extension that helps you automatically apply for Jingdong

    Regularly monitor the price changes of purchased goods, and automatically apply for JD.com price protection when the price is reduced. It will only be saved locally if you choose to save the account and log in automatically. All functions of Beijing Price Insurance are completed locally, and will not actively upload any private information to anyone. Beijing Price Insurance is not a free app. You need to tip any amount to get legal authorization. Although there are currently no mandatory...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Attack Surface Management | Criminal IP ASM Icon
    Attack Surface Management | Criminal IP ASM

    For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

    Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
    Learn More
  • 5
    handy

    handy

    A simple C++11 network server framework

    Simple and easy-to-use C++11 network library/ Supports tens of millions of concurrent connections on a single machine/ a simple C++11 network server framework. Graceful exit allows programmers to better define the exit behavior of their programs. You can better check for memory leaks with tools such as valgrind. 10 lines of code to write a complete server. Asynchronously manages network I/O and processes requests synchronously, which simplifies the writing of server processing logic. For examples, see examples/hsha.cc. Asynchronous connection management supports openssl connection, if OpenSSL is installed, and <openssl/ssl.h> can be found, the project will automatically download handy-ssl because the open-source protocol of OpenSSL is not compatible with this, so the project file is placed separately in handy-SSL. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    GambleKit

    C++ Framework for slot machine games

    GambleKit is a free open-source C++ object oriented library for quick and easy building of slot machine and gambling games with reels and GUI management. It relies basically on declarative programming style, so the programmer needs simply to declare, for example at creation time, the basic layout and behavior of the game, and then leave the game flow, requiring as little additional intervention as possible. The project is welcoming contributors and feedback is appreciated! The next...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    N-Tier Windows Forms Framework

    N-Tier Windows Forms Framework

    N-Tier Windows Forms entity productivity framework

    Updated to work with Visual Studio 2012. The N-Tier Framework for Windows Forms is designed to put the developer in control with tools & APIs for the rapid development of database applications in c#. NTier is designed to leverage developers' skills and familiarity with Visual Studio and Windows Forms to quickly build large business applications. NTier provides tools, frameworks, designers, extender providers and helpers to make database application development easy without replacing...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    JClaim
    Java Instant Message (IM) Library, Client and Tools. Flexible framework to design your own. AIM, ICQ, Yahoo, MSN, Jabber, SMS, Nate, GoogleTalk. GUI, spell checking and more. Includes a web interface for remote/cell access. Mac, Win, Linux friendly
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    ZenWINX is a framework for Windows native applications development. These applications are intended for use inside of the Windows boot process in a manner similar to Microsoft CheckDisk or UltraDefrag. Actually ZenWINX is part of UltraDefrag, so check it out if you'd like to develop your own native application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Securden Password Vault Icon
    Securden Password Vault

    For IT Teams, CIO, CSO, Security Analysts

    Store, manage, and share passwords, files, SSH keys, and DevOps secrets among IT teams. Enforce password security best practices. Ensure compliance with industry standards using comprehensive audit trails.
    Learn More
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB