Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Learn More
AI-generated apps that pass security review
Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
Duply is a shell front end for the duplicity backup tool https://duplicity.us . It simplifies the usage by implementing backup job profiles, batch commands and more.
Secure backup to non-trusted file spaces made easy.
A modern, AI-Smart, WASTE p2p for ipv4 and invisible address spaces
A WASTE client. Download and create your own WASTE networks.
For Windows XP 32/64, Vista 32/64, Win7 32/64, Win8 32/64, Win 10, Linux (WINE).
*** NEW *** Distributed Autonomic-Performance-Tuning - A Goal-Seeking Swarming-Semiotic AI ***
*** Built-in Self-Organising Anti-Spoofing Technology ***
*** Medusa - Pure Ephemeral RNG - Routing, Security Extensions ***
PLEASE ENSURE YOUR NETWORK USES THE SAME BUILD.
FOR BEST RESULTS.
Using encryption to secure your code or text. Click File->Run to run your code using Ruby, see the pop up for output. Never save your text or code to disk unencrypted. Don't forget your password. Encryption is error-persistent.
Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.
Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
Linux-PAM module plus PostgreSQL stored procedures to capture and store encrypted passwords. Intended to facilitate migration of credentials to different authentication systems. Use subversion (see 'Code' tab) to download project source code.
OSN is an open source open protocol distributed social network. Public key cryptography makes the network resilient to spam. User profiles are based on FOAF XML and users can migrate their profile from one site of the federation to another.
A Win32 API based graphical desktop sharing system, it support LZMA compress, MD5 password check, 64bits file transfer, 8bits instruction fast protocol and windows's pack intelligence for reduce useless transfer band.
A low cost software and hardware KVM over IP and remote Console monitoring
solution running on Linux. Secure administration and access to remote
keyboard/video/mouse and serial console output. Easily configured and
customised to suit user needs.
YAWCU is a wireless LAN (WLAN) capture + WEP cracking utility. It can crack 64/128 Bit WEP keys on IEEE 802.11b/g networks by monitoring WLAN traffic and computing the resulting WEP key once enough packets have been gathered
It's a modern take on desktop management that can be scaled as per organizational needs.
Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
KiSS, Kilobyte SOAP Security, is a J2ME library that provides WS-Security for kSOAP2. It supports the WSS Username Token Profile and a subset of the XML Encryption and Processing recommendation.
wss4j + a set of patches to support kerberos token profile. One of the goals of the project is to be merged in wss4j, but in the meantime this library can be used as a drop-in replacement of wss4j.jar