Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Learn More
Context for your AI agents
Crawl websites, sync to vector databases, and power RAG applications. Pre-built integrations for LLM pipelines and AI assistants.
Build data pipelines that feed your AI models and agents without managing infrastructure. Crawl any website, transform content, and push directly to your preferred vector store. Use 10,000+ tools for RAG applications, AI assistants, and real-time knowledge bases. Monitor site changes, trigger workflows on new data, and keep your AIs fed with fresh, structured information. Cloud-native, API-first, and free to start until you need to scale.
You can compute what you have in common with untrusted parties, without disclosing what you have. This is an implementation of a cryptographic protocol that is tailored for privacy-preserving set intersection.
it is about a GUI (Graphical User Interface ) program based on Qt4 library ,that hides data on a picture using differents method depending on picture format (BMP,JPG,PNG,...) (this is called Steganography) the data can be on any file format
L2Acc is a packet sniffer for Lineage 2 (C4) game that uses WinPCap. It tracks the private shop prices and provides market evolution, scans the inventory and calculates its value, recipe budgets, allows recipe search and price estimation.
SKIF ppds - Personal Password and Data Sentinel- password manager and data security-tools. Single file (main database) encrypted Blowfish-cipher - for storage user acсounts and any text data. "Crypto" tools - Blowfish-cipher,SHA,MD5,DIFF,MAC and other
The PowerCiph Data Encryption Algorithm is a versatile, yet simplistic, encryption algorithm/protocol. The ultimate goal of the algorithm is simplicity, compactness, and a lack of prerequisites.
Secure Storage service is a set of tools to store in a secure way and in an encrypted format confidential data on the grid storage elements. The service has been designed for the grid Middleware of the EGEE infrastructure, gLite.
It's a modern take on desktop management that can be scaled as per organizational needs.
Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
This library implements some of the functionality that could not be found elsewhere, and also allows for straightforward handling of POSIX threads to configuration files.
This program allows to delete safely files on system Windows (Windows XP/Vista 32 bit). In program the opportunity of adjustment of key parameters such as cycles of filling in zero and cycles of filling is stipulated by random numbers.
Here is a little utility I wrote to facilitate my work when I have to try methods on deciphering coded messages. Well, of course for all those who do not treasure hunts, it may seem slightly unnecessary. So for them, it can also be used to encode a messa
libapache2-mod-scramble-ip encrypts IPs in the apache-server in a way, that you can still work with them (for analytics etc.) but its not possible to find out the original IP.
File Crypter is a Simple program, that is able to encrypt your files and decrypt them. A version of File Crypter is included as an example in the xCrypter Library and is called "ncrypter" which is short for "new crypter".
Corporate Data Protection and Network Security is a IT project targeting policy-based and fully-automated data protection, encryption and transmission. We plan to create self-diagnostic risk-predict enterprise environment with artificial intelligence.
A novel graphical password tool (YAGP) inspired by Draw-A-Secret (DAS) is implemented in this project. The tool has the advantages of free drawing positions, strong shoulder surfing resistance and large password space.
Dm-crypt + LUKS encrypted device manager. Available functions : open, close, create, show info, add key, remove key, change key. Most important functions : change encryption parameters and reencryption with new master key - both in-place & failsafe.
Zeus provides an API for developers to protect with AES Encryption and compress with ZIP application specific data not intended for public access. Zeus, the tool, integrates with Windows Explorer to protect sensitive data.
IeClose prevent Internet Explorer to start. With a password function, only user with the password can start/stop the blocking. The password can easily be changed, require the old password.
The Mav.Crypt tool will be upgraded to many different encryption methods. At the Moment, the only method is ROT13, but we are developing some other technics and a new Algorithm. More Infos shortly at the Project Web Page.
This application aims to be a simple, small and portable enrypter which encrypts any number of files of any size quickly but securely. It also preserves file extensions which are encrypted with the file and handles ANY file type.
A distributed and dynamically threaded password cracker. Completely cross-platform using Qt 4.3. Utilizes 1 server and N clients to distribute password cracking across N machines, each of which can utilize N CPUs.
A kind of encryption named "simple stream encrypt". The length of plaintext segment or the length of key is not limited, but must greater than zero. The lengths of every plaintext segment in a process don't require equivalency.