Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.
Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
Build an app in Retool
Find Hidden Risks in Windows Task Scheduler
Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.
Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
....
- Floating gallery for viewing websites as lists as well.
- User profiles with privileges and privacy settings.
- Includes adblocks and phishing filters.
- View text edition of websites without images and objects.
Please note that OWFS source code, and all Issue/Tickets/merge requests have now been moved to https://github.com/owfs/owfs/.
Developer mailing lists will still be kept at Sourceforge.
----
OWFS -- 1-Wire file system. Use the Dallas 1-Wire and iButton chips with standard filesystem commands. Create temperature loggers. Monitor everything. OWHTTPD -- same system, only used as a light weight web server. OWFS is also ported to embedded routers, Mac OSX and Windows.
Basically you can use these inexpensive little sensors and other chips with very simple wiring to sense and control the physical environment. ...
Payload list editor to use techniques to bypass WAF
Payload mask tool to edit web payload lists to try bypass web application firewall.
A web application firewall (WAF) is an appliance, server plugin, or filter that applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as cross-site scripting (XSS) and SQL injection. By customizing the rules to your application, many attacks can be identified and blocked.
...Real-time tracking & messaging of stations via radio/internet APRS data streams, w/125 map formats supported. Linux/FreeBSD/Solaris/MacOSX/Windows in any of 7 languages. Can also be used for mobile mapping w/GPS. MAILING LISTS ARE AT: PROJECT->WEB SITE.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
...All you need to do is fill in the required information, then have the program create and insert the code into the text editor.
It is possible to use this method to insert headings, links, paragraphs, images, tables, lists, buttons and many other objects.
You can also access a preview of the current code sample, allowing you to get an idea of what the finished page would look like, without having to save.
Perl cgi for virtual users/virtual domain for exim and tpop3d management. White/black lists per user/domain, quota, etc. No any db, all data stored in plain-text files. Exim, tpop3d and apache config included. Intend for small (10-100 users) mail system.