Start from a prompt and build production-ready apps on your data—with security, permissions, and compliance built in.
Vibe coding tools create cool demos, but Retool helps you build software your company can actually use. Generate internal apps that connect directly to your data—deployed in your cloud with enterprise security from day one. Build dashboards, admin panels, and workflows with granular permissions already in place. Stop prototyping and ship on a platform that actually passes security review.
Build apps that ship
Find Hidden Risks in Windows Task Scheduler
Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.
Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
Live Security/Forensics Linux Distribution, built from scratch and packed full of tools useful for vulnerability analysis, penetration tests, and forensic analysis.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Firewall-Rulegenerator creates automatically iptables-scrips from XML-Files containing Information
on your network-topology and your required services.
linux4501 is a linux software distribution for the soekris net4501 single board PC (see www.soekris.com).
It fits on a 16 or 32 MB Compactflash card and turns the 4501 into a firewall and (dsl) router. It can also be used as a starting point for your
ow
The SWAP (Secure Wireless Access Point) project is intended for use in embedded appliances. These appliances will operate in the role of a WEP (wireless encryption protocol) and IPSEC enabled wireless access point, IPSEC VPN gateway, and firewall.
Provide secure, quality, user-friendly and fail-proof access to internet manager for IPTABLES-DENY-ALL-based Linux configuration of firewall, including traffic and time accounting, logging, auto-disconnection.
Software for i-net clubs and caffee admins
Bait and Switch combines IDS tech (Snort primarily) and Honeypots into a new, more valuable, reactive system. After receiving an alert, B&S protects your server by silently redirecting hostile traffic to a honeypot while leaving other traffic alone.
It's a modern take on desktop management that can be scaled as per organizational needs.
Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
LanBiz is a free, Open Source Server Suite, mostly fitted for SOHO (Small Office/Home Office) environments. The final LanBiz will include: an internet gateway/firewall, proxy, mail, file/print, fax/telephony server and more!
Linmkfwall is able to set up a firewall for your linux box ( ipfwadm, ipchains and iptables are supported ). The firewall rules are put in a Unix script shell file that you have to execute as root.
AGT is a powerful console frontend to iptables, supporting nearly all of the iptables extensions. All options can be specified in a configuration file with similar syntax to 'ipf' and 'ipfw'.
Packit is a network auditing tool that allows you to monitor, manipulate, and inject customized IP traffic into your network. This can be valuable for testing firewalls, intrusion detection systems, port scanning, and general TCP/IP auditing.
A filtering proxy which processes HTTP- and HTML-traffic to enhance
the security: Remove javascript calls, check document types, remove
client infos (operating system, browser version)
ReAIM is an AOL Instant Messenger Proxy for iptables-based firewalls. It allows direct connections to be made to hosts behind an address-translating firewall. MSN and Windows Messenger are also supported.
Security proxy to clean up all unallowed constructions from HTTP requests, detect intruders and filter outgoing HTTP traffic against leaking classified data.