Showing 4 open source projects for "remote host"

View related business solutions
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • FusionAuth: Authentication and User Management Software Icon
    FusionAuth: Authentication and User Management Software

    Offer your users flexible authentication options, including passwords, passwordless, single sign-on (SSO), and multi-factor authentication (MFA).

    FusionAuth adds login, registration, SSO, MFA, and a bazillion other features to your app in days - not months.
    Learn More
  • 1
    Twenty

    Twenty

    Building a modern alternative to Salesforce, powered by the community

    ...We believe the next great CRM will come from the open-source community. We’ve packed Twenty with powerful features to give you full control and help you run your business efficiently. Contribute, self-host, fork. Break free from vendor lock-in and join us in shaping the open future of CRM. The days when the role of CRM platforms was to shift manual data entries to a database are over. Now, the data is already there. CRM 2.0 should be built around your data, allowing you to access and visualize any existing sources, not forcing you to retrofit your data into predefined objects on a remote cloud.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 2
    CoVim

    CoVim

    Collaborative Editing for Vim

    CoVim enables collaborative, real-time editing sessions in Vim by networking multiple clients into a shared buffer. Participants can see each other’s cursors and changes as they type, approximating pair programming inside a modal editor. Sessions are hosted on a server process that coordinates edits and user presence across machines. The goal is to keep collaboration simple while preserving familiar Vim motions and commands. It is particularly handy for remote code walkthroughs, mentoring,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Hypersocket VPN

    Hypersocket VPN

    A simple yet powerful open source VPN solution

    Hypersocket is a streamlined VPN solution built for all types of remote access scenarios. Powerful yet simple to use, Hypersocket uses a single installed client to provide access to any number of network resources. Its powerful granular access means you can have fine grained control over your entire network and remote users. Accessed through a secure HTTPS port, the Hypersocket client provides access to any number of host/port combinations all effortlessly assigned server-side by the Administrator through roles. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    DemoScript runs commandline-based demos. It logs to a remote host (ssh), writes the password, and then writes the commands specified in a script. The tool mimics someone's typing: delay between each letter and intelligent command sending synchronisation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • SIEM | API Security | Log Management Software Icon
    SIEM | API Security | Log Management Software

    AI-Powered Security and IT Operations Without Compromise.

    Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can:
    Learn More
  • Previous
  • You're on page 1
  • Next