Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
Explore Apify Store
The complete IT asset and license management platform
Gain full visibility and control over your IT assets, licenses, usage and spend in one place with Setyl.
The platform seamlessly integrates with 100+ IT systems, including MDM, RMM, IDP, SSO, HR, finance, helpdesk tools, and more.
NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows that can detect the OS, hostname and open ports of network hosts through packet sniffing or by parsing a PCAP file. NetworkMiner can also extract transmitted files from network traffic.
New versions of NetworkMiner are released exclusively on www.netresec.com since version 2.0 of NetworkMiner. This page on SourceForge is only kept to provide hosting of older versions of the software.
To get the latest version of...
The Coding Analysis Toolkit (or "CAT") consists of a ASP.NET based suite of tools to facilitate efficient and effective analysis of text datasets that have been coded using the CAT coding module or ATLAS.ti.
A computerised clinical decision support advancement for emergency med
ACAFE-a computerised clinical decision support advancement for emergency medicine. Hospital electronic medical record EHR or EMR. Used commercially. Other uses include research-development into chronic and infectious-diseases.
Watch video here of demo https://www.youtube.com/watch?v=SGlicILHhJs
All-in-one security tool helps you prevent ransomware and breaches.
SIEM + Detection and Response for IT Teams
Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.