Showing 11 open source projects for "corruption"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • 1
    WCDB

    WCDB

    Cross-platform database framework developed by WeChat

    ...ORM/persistence solution via Room from Android Architecture Components. Concurrent access via connection pooling from modern Android framework. Repair toolkit for database corruption recovery.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Git

    Git

    Fast, scalable, distributed revision control system

    Git is a free, distributed version control system created by Linus Torvalds in 2005 to manage the development of the Linux kernel. It emphasizes speed, data integrity, and support for non-linear workflows, and remains the most popular VCS for collaborative software development. Git is an Open Source project covered by the GNU General Public License version 2 (some parts of it are under different licenses, compatible with the GPLv2). It was originally written by Linus Torvalds with help of a...
    Downloads: 14 This Week
    Last Update:
    See Project
  • 3

    CheckIt

    Checkit is a file integrity tool for Linux and Unix systems.

    ...It allows you to detect any data integrity issues or file changes to any file. By storing a checksum as an extended attribute, checkit provides an efficient way to detect silent data corruption, bit rot, or other modification errors. It was inspired by the checksumming performed by filesystems like BTRFS and ZFS. Checkit allows similar functionality, the ability to compare stored files and entire directory trees against a checksum at a glance.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    XWA Hacker

    Fixes for X-Wing game binaries

    Fix/improve X-Wing games (XWA and others) to allow them to run on current PCs with improved graphics. Now also available on the Microsoft Store (consider it beta) at ms-windows-store://pdp/?productid=9PPKMJSRTM2B or https://www.microsoft.com/store/apps/9PPKMJSRTM2B
    Downloads: 9 This Week
    Last Update:
    See Project
  • Collect! is a highly configurable debt collection software Icon
    Collect! is a highly configurable debt collection software

    Everything that matters to debt collection, all in one solution.

    The flexible & scalable debt collection software built to automate your workflow. From startup to enterprise, we have the solution for you.
    Learn More
  • 5

    corrupt

    This program corrupts a unix stream at a specified error rate

    ...[FILE] where: OPTIONS -bit single bit error instead of byte substitution corruption -B NUM_B number of bytes per a single corruption event -kB NUM_KB number of kilobytes per a single corruption event -MB NUM_MB number of megabytes per a single corruption event -u uniform corruption instead of a random statistical event -c CHAR substitute a constant CHAR instead of a random bit/byte error
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    DBGMEM is a memory debugger designed for large scale C and C++ programs on Linux. It helps you to find: memory leaks, heap memory corruption, passing of illegal argument to selected standard library functions, use of freed or uninitialized heap blocks
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    Post Memory Corruption Memory Analysis

    PMCMA - Post Memory Corruption Memory Analysis

    Pmcma is a tool aimed at automating the most time consuming taskes of exploitation. It for instance determine why an application is triggering a segmentention fault, evaluate if the faulting instruction can be used to write to memory or execute arbitrary code, and list all the function pointers potentially called from a given point in time by an application. Pmcma is a totally new kind of debugger, which allows for easy experimentation with a process in memory by forcing it to fork. The...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    gdbplus

    gdb extension with powerful heap memory commands

    ...On top of gdb functions, the extension provides additional commands to analyze heap data, object relationship, etc. These power features may shed light on tough issues such as memory corruption, debugging highly optimized code, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Reed-Solomon encoder/decoder for Block Devices. Provides methods for enhanced data recovery from corrupted storage media, along with faster methods for reading the data when no corruption is encountered.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Most modern and flexible cloud platform for MLM companies Icon
    Most modern and flexible cloud platform for MLM companies

    ERP-class software for multi-level marketing

    For direct selling (MLM) companies, from startup to well established enterprises with millions of distributors across the world
    Learn More
  • 10
    Simple data corruption testing utilities based on the concept of generating a stream of small self-contained records which can be decoded in a way which makes certain common data corruption modes in filesystems and networks automatically diagnosable.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    memwatch is an ANSI C fault tolerant memory leak and corruption detection tool. Basically, you add a header file to your souce code files, and compile with MEMWATCH defined or not. Check the README and USING files for more instructions.
    Downloads: 3 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next