Showing 6 open source projects for "you-get"

View related business solutions
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 1
    BerserkArch

    BerserkArch

    A bleeding-edge, security-centric Arch-based Linux distribution.

    ...As an Arch-based distribution, it benefits from the rolling release model, providing users with the latest software versions and kernel updates. BerserkArch is a dist "designed to make you powerful" for specific use cases like reverse-engineering binaries and automating exploits, rather than being an easy-to-use distribution for general beginners.
    Leader badge
    Downloads: 47 This Week
    Last Update:
    See Project
  • 2
    openWrt-snort

    openWrt-snort

    Image of OpenWrt OS, with snort community featured in.

    ...eth0 used as output/ LAN socket, to run internet and access router. eth1, which can be USB -> Ethernet port, is used as WAN port, to connect Pi board to Internet IP. to flash img file, you can restore in SD card, or use Balena Etcher to flash. or you can use DD commend of UNIX. **USERNAME** - root **PASSWORD** - bing.google12
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3
    boundman

    boundman

    Add rule to windows firewall to block inbound and outbound traffic

    Boundman is an advanced, user-friendly, and sleek application designed to take control over your network connections. It allows you to efficiently manage and block incoming and outgoing traffic for specific .exe files contained within a chosen folder and its subfolders. With its intuitive PyQt5 graphical interface and robust PowerShell scripts, Boundman provides seamless integration with the Windows Firewall for a powerful network management experience.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    pyWhat

    pyWhat

    Identify emails, IP addresses, and more

    ...Given inputs such as hex strings, URLs, email addresses, IP addresses, credit card numbers, cryptocurrency wallets, or entire .pcap capture files, it scans for structured patterns and tells you what it finds. The tool is recursive: it can traverse files and directories to extract meaningful entities, which is useful when analyzing malware samples, network captures, or code repositories at scale. It offers powerful filters called “tags” and distributions that let you narrow results to specific categories like bug bounties, cryptocurrencies, or AWS-related artifacts. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 5
    ProcessFilterExample

    ProcessFilterExample

    EaseFilter Process Filter Driver SDK

    ...By intercepting process and thread operations at the kernel level, it enables the development of robust security applications that can prevent unauthorized or malicious processes from executing. With the Process Filter Driver, it allows you to prevent the untrusted executable binaries (malwares) from being launched, protect your data being damaged by the untrusted processes. It also enables your application to get the callback notification for the process/thread creation or termination, from the new process information you can get the parent process Id and thread Id of the new created process, you also can get the exact file name that is used to open the executable file and the command line that is used to execute the process if it is available.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    CVE-Alert

    CVE-Alert

    Real-time CVE tracking and email alerts for security vulnerabilities

    CVE-Alert helps organizations and individuals track Common Vulnerabilities and Exposures (CVEs) in real-time. Get notified about security issues affecting your vendors and products. Key capabilities: - Real-time CVE tracking - Automatically sync with CVE.org's CVE List (cvelistV5) to stay current with published security vulnerabilities - Custom subscriptions - Subscribe to specific vendors, products, or severity levels to receive alerts only for what matters to your organization - Email notifications - Receive timely email alerts with detailed information about CVEs affecting your subscribed vendors and products - Comprehensive reports - Search and browse CVE entries with detailed information including severity scores, descriptions, and affected products - Free to use - No cost for individuals and organizations CVE-Alert is designed for security professionals, IT administrators, developers, and anyone responsible for maintaining secure systems. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next