Showing 4 open source projects for "android program source code"

View related business solutions
  • Intelligent testing agents | Checksum.ai Icon
    Intelligent testing agents | Checksum.ai

    Checksum generates, runs, and maintains end-to-end tests automatically so your team ships with confidence as code output grows.

    Coding agents write the code. Checksum runs it—continuously testing against real APIs, real data, real edge cases—before it ever reaches production.
    Learn More
  • Monitoring, Securing, Optimizing 3rd party scripts Icon
    Monitoring, Securing, Optimizing 3rd party scripts

    For developers looking for a solution to monitor, script, and optimize 3rd party scripts

    c/side is crawling many sites to get ahead of new attacks. c/side is the only fully autonomous detection tool for assessing 3rd party scripts. We do not rely purely on threat feed intel or easy to circumvent detections. We also use historical context and AI to review the payload and behavior of scripts.
    Learn More
  • 1
    Rapid ERP Development

    Rapid ERP Development

    Great Open Source Plugins For iDempiere ERP Project

    I created a set of simple plugins to use iDempiere ERP with Unicenta POS, Android Scanner, Budgeting, Warehousing, Manufacturing, on-the-fly generators for App Dictionary, CRM Board and Charts, Kanban Board, Translation and more. Always complete with full technical documentation, blogs and movie tutorials. No information hiding. Its the open source sharing passion and i wanted to give it all back. Much of my present work is sponsored by SYSNOVA, the largest iDempiere conglomerate user and...
    Downloads: 25 This Week
    Last Update:
    See Project
  • 2
    Asset Management System for Intranets

    Asset Management System for Intranets

    The Free & Popular Snipe-IT Web Software in a Complete Virtual Machine

    This VM is created for 2 reasons: 1. Very little initial setup work required to make an Asset Management System live, within minutes. 2. This system should keep running for Years, without requiring Updates / Breakages. If you are new to Virtual Machines, then please watch the Video below ( taken from my other project. just replace td with am wherever mentioned ) After starting this VM, please login to its administration panel with: Website Address: https://am.local/ ( Accept Any...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    mobile recharge software

    mobile recharge software

    We Developed Responsive Admin Dashboard, User Dashboard, Frontend

    Recharge Software with Mobile Recharge, DTH Recharge, Money Transfer, Master Distributor, Distributor, Retailer, API User. School Software, MLM Software, Shopping Portal etc...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    ShelterOps

    ShelterOps

    ShelterOps - Animal and Wildlife data management software

    ShelterOps is a PHP based software program to manage animal operations for animal welfare organizations, animal rescues, wildlife rescue/rehabilitation facilities, animal control agencies (ACOs) and any other entities that need to track animal intake, dispositions, medical procedures, assessment, etc. It offers a basic Point Of Sale (POS) system for services, licenses, merchandise and general ledger integration for accounting, as well as several optional modules to extend functionality...
    Downloads: 3 This Week
    Last Update:
    See Project
  • Attack Surface Management | Criminal IP ASM Icon
    Attack Surface Management | Criminal IP ASM

    For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

    Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
    Learn More
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB