Showing 13 open source projects for "tamper data"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • 1
    Chainlink

    Chainlink

    node of the decentralized oracle network

    Securely connect smart contracts with off-chain data and services. Chainlink decentralized oracle networks provide tamper-proof inputs, outputs, and computations to support advanced smart contracts on any blockchain. Start building your hybrid smart contract with Chainlink. Use decentralization, trusted nodes, premium data, and cryptographic proofs to connect highly accurate and available data/APIs to any smart contract.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 2
    Nox

    Nox

    Rust implementation of the Fluence network peer

    Nox is a decentralized, serverless execution platform for running secure WebAssembly (Wasm) modules over the Fluence peer-to-peer network. It enables developers to build and deploy composable services without central servers, ensuring tamper-resistant logic and trustless computation. Nox is designed to support multi-peer coordination, decentralized app logic, and data privacy, using Fluence’s Aqua programming model. Ideal for Web3 developers, Nox provides the building blocks to run interoperable backends directly from the edge.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    syslog-ng

    syslog-ng

    Log management solution that improves the performance of SIEM

    ...Instead of deploying multiple agents on hosts, organizations can unify their log data collection and management. syslog-ng Store Box provides automated archiving, tamper-proof encrypted storage, granular access controls to protect log data. The largest appliance can store up to 10TB of raw logs.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 4
    immudb

    immudb

    Immutable database based on zero trust, SQL and Key-Value, tamperproof

    immudb is a database with built-in cryptographic proof and verification. It tracks changes in sensitive data and the integrity of the history will be protected by the clients, without the need to trust the database. It can operate both as a key-value store, and/or as a relational database (SQL). Traditional database transactions and logs are mutable, and therefore there is no way to know for sure if your data has been compromised. immudb is immutable. You can add new versions of existing...
    Downloads: 2 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 5
    Trillian

    Trillian

    A transparent, highly scalable and cryptographically verifiable data

    ...Common use cases include certificate transparency, package registries, and audit logs where public verifiability or tamper evidence is required. Trillian exposes both “log” and “map” primitives so developers can choose between append-only timelines or verifiable dictionaries depending on their data model. By making verification independent of trust in the operator, trillian helps build systems that are auditable by external parties.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    OpenArchiver

    OpenArchiver

    An open-source platform for legally compliant email archiving

    OpenArchiver is a comprehensive, self-hosted email archiving and compliance platform built to help organizations ingest, index, store, and search email communication data across diverse sources like Gmail, Microsoft 365, IMAP, PST, and more. It’s designed for scenarios where reliable, tamper-proof archiving and full-text search across both emails and attachments are essential for legal discovery, compliance, or long-term records retention. The platform combines a modern web UI with powerful backend services, including fast indexing, deduplication, encryption at rest, and asynchronous ingestion workflows, making it suitable for both small teams and enterprise deployments. ...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 7
    PyScaffold

    PyScaffold

    Python project template generator with batteries included

    PyScaffold is a project generator for bootstrapping high-quality Python packages, ready to be shared on PyPI and installable via pip. It is easy to use and encourages the adoption of the best tools and practices of the Python ecosystem, helping you and your team to stay sane, happy and productive. The best part? It is stable and has been used by thousands of developers for over half a decade! Checkout out this demo project, which was set up using PyScaffold and if you are still not convinced...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    -PTRN--Petoron--token
    ...Contract Details: - Ethereum Mainnet - Contract: 0xCe675D637bB5E3aDAFDC4d1e475a35D75F6D95bc - Total supply: 20,000,000 PTRN - Treasury: 0x31187017dC243d4D46126bB5a160Bb98FFeef39b Petoron is an entire cryptography ecosystem developed to give people real tools for privacy and data protection: - 🔐 PTBC — Petoron Time Burn Cipher (time-based self-destructing encryption) - 📜 PSC — Petoron Seal Contracts (tamper-proof sealed data) - 📦 PCA — Petoron Crypto Archiver (secure archiving) - 🧹 PLD — Petoron Local Destroyer (irreversible deletion) - ⚛️ PQS — Petoron Quantum Standard (quantum-resistant encryption) - 💬 P2P Messenger — fully encrypted peer-to-peer communication https://github.com/01alekseev/-PTRN--Petoron--token
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    World Cup NFT Fantasy

    World Cup NFT Fantasy

    World Cup NFT Fantasy is a prediction-based game

    WC NFT Fantasy is a Prediction game where you can play a game to win a prize if you guessed the winning teams right. Extending the idea of CryptoFishx we have built an application that anyone can participate and win with the confidence that no one is going to tamper or cheat in the system. Having it on the on chain (on the blockchain) enables us to use smart contracts which are public (anyone can see and read) immutable (once deployed it cannot be changed) code that governs everyone's interactions with the game. Which means, no third party including us can tamper with the data once set. Anyone can confirm that game works as intended by reading the code and the final prize pool is handed over to the winner by code itself so anyone can confirm that is correct.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 10
    Tamper Dev

    Tamper Dev

    Extension that allows you to intercept and edit HTTP/HTTPS requests

    If you are a developer, you can use Tamper Dev to debug your websites, or if you are a pentester, you can use it to search for security vulnerabilities by inspecting the HTTP traffic from your browser. Unlike most other extensions, Tamper Dev allows you to intercept, inspect and modify the requests before they are sent to the server. This extension provides functionality similar to Burp Proxy, MITM Proxy, OWASP ZAP, Tamper Data, and Postman Proxy, but without the need of additional software, with full support of HTTPS connections, and trivial to set-up (just install).
    Downloads: 28 This Week
    Last Update:
    See Project
  • 11
    ciphermail

    ciphermail

    Ciphermail email encryption gateway (S/MIME, OpenPGP, PDF encryption)

    ...Ciphermail Email Encryption Gateway has a built-in CA which can be used to issue X.509 certificates for internal and external users. For additional security, keys can be securely generated and stored in a tamper proof Hardware Security Module (HSM). The built-in Data Leak Prevention (DLP) module can be used to prevent certain information to leave the organization via email. Ciphermail can be installed on most Linux and Unix based systems. Installation packages are available for Ubuntu, Debian, Red Hat/CentOS and OpenSUSE. A ready to run virtual appliance for VMware and Hyper-V is available.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Free Web Application Firewall

    Free Web Application Firewall

    Free Web Application Firewall

    The FreeWAF provides specialized, layered application threat protection. It protects your web-based applications and internet-facing data from attack and data loss. Using advanced techniques to provide bidirectional protection against sophisticated threats like SQL injection and cross-site scripting, it helps you prevent identity theft, financial fraud and corporate espionage.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    The Watermarks is a java library for images and text watermarking fingerprinting and tamper-proofing. The supported carrier formats for a watermark are JPEG and PDF. The project also aim to build a test environment to evaluate robustness of implemented a
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB