Crawl websites, sync to vector databases, and power RAG applications. Pre-built integrations for LLM pipelines and AI assistants.
Build data pipelines that feed your AI models and agents without managing infrastructure. Crawl any website, transform content, and push directly to your preferred vector store. Use 10,000+ tools for RAG applications, AI assistants, and real-time knowledge bases. Monitor site changes, trigger workflows on new data, and keep your AIs fed with fresh, structured information. Cloud-native, API-first, and free to start until you need to scale.
Try for free
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Endian Firewall Community (EFW) is a "turn-key" linux security distribution that makes your system a full featured security appliance with Unified Threat Management (UTM) functionalities. The software has been designed for the best usability: very easy to install, use and manage and still greatly flexible.
The feature suite includes stateful packet inspection firewall, application-level proxies for various protocols (HTTP, FTP, POP3, SMTP) with antivirus support, virus and spam-filtering...
Net-Policy is a highly-scalable, role-and-policy based network management system. Net-Policy aims to be an easy-to-use, full-fledged management station capable of configuration, monitoring, and notification collection and aggregation via the use of SNMP
These three tools build Checkpoint, Cisco ASA or Netscreen policys from logfiles. They write dbedit, access-list or set address, set service and set policy commands for the traffic seen in the logs, that can be cut and pasted into the firewalls. WOOT
This is an NIDS/HIDS, Network plus Host based Intrusion Detection System. Este é um NIDS / HIDS, Sistema de Detecção de Invasões Baseado em Redes e em Máquinas.
inundator is a tool used to anonymously inundate intrusion detection logs with false positives to obfuscate a real attack, leaving the IDS analyst feeling completely inundated.
BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts coming from a SNORT IDS system.
Schedule emailing of your Smoothwall logs. Schedule on a daily/weekly/monthly basis via cron jobs. Formatting options are text and html. csv formatting planned.
Smoothwall GUI Styles selection. Mod to Smoothwall 2.0 provides Web interface color/style selection from the stock orange. Various styles implemented along with the capability to easily add your own styles. Smoothies Style Select has a built in css edito
It's a modern take on desktop management that can be scaled as per organizational needs.
Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
Smoothwall Mod for Dansguardian User group editing. Creates five initial groups; everybody, child, preteen, teen and adult. Intended to automated the editing of filtergroupslist and exceptionuserlist via the web interface of Smoothwall. Inserts as a new
What are the packets rejected by your Netfilter based firewall today ? How often this suspicious host try to connect to your box ? What are the most rejected domains ? Who is this strange host which scan your ports ?
The responses are in the iptables log
The package includes tools that make a fully functional user accounting system for a small ISP. Functionality includes: traffic shaping, management of users' accounts, firewall, networkmonitoring, link quality measurement, alert system, etc.
The Plague provides a web UI to a MySQL db of parsed syslog data. The focus has been security reporting. The logs supported (so far) are NetScreen firewalls, Cisco routers and switches and PIXen, Gauntlet firewalls.
A daemon to detect spammers trying to harvest email addresses by username guessing and temporarily DROP them with iptables firewall rules. The program also looks for and kills sendmail processes that have been stuck in "cmd read" mode for a long time.
IP Traffic Volume: Logs (counts) in- & outgoing bytes through network device(s) using kernel iptables. Highly configurable as to which bytes are logged, e.g. to/from specific ports or ip-addresses. Data displayed in html via cgi or plain ascii to console
Green Screen: A Linux based Advanced Syslog Server for Juniper NetScreen Firewalls - Can be expanded later to support other products. It can capture syslog messages, parse them, store them in a MySQL database. A Web GUI interface is also included.
Distribution for CABLE ISP with a builting network managment suite optimized for ethernet users. Distro based on Slackware. The Network management suite has features of bandwidth accounting, traffic control, network diagnostics, IP to MAC binding etc.
Project Description:
Tk-Cerber is a client/server software that aims towards ease-of-use of Linux's QoS capabilities.
It is written in Perl for the server side and Perl/Tk for the client side.
Platform: GNU/Linux
Traffic Control is a Linux toolbox to control squid, NAT, and other
services traffic limits. TF uses Linux iptables to count traffic.
This utility consists of two parts. The first is server side
(written in Perl) and the second part is the interface.
OpenAanval - The Open Source version of the Commercial Aanval Console - A full featured advanced Intrusion Detection System (IDS) Console for Snort. Real-time LIVE event monitoring, comprehensive statistics, multi-user, email / audio alerting, IP marking
PACIE (Perl Analysis Console for Intrusion Events) Attempts to be a complete replacement for ACID. Place this cgi script on your internal webserver and receive powerfull reporting on your current snort database.
IPFWstats is a suite of shell, perl and PHP scripts to count network traffic on
a per user basis on a server using the FreeBSD IPFW firewall. Statistics are imported into a MySQL database daily and can
then be viewed using a PHP script in a web browser
This Daemon written in Perl, logs FreeBSD ipfw ip accounting counters every X seconds/minutes, so after rebooting, crashing, flushing, zero out your ipfirewall table, you don't loose any mayor traffic information.