Start from a prompt and build production-ready apps on your data—with security, permissions, and compliance built in.
Vibe coding tools create cool demos, but Retool helps you build software your company can actually use. Generate internal apps that connect directly to your data—deployed in your cloud with enterprise security from day one. Build dashboards, admin panels, and workflows with granular permissions already in place. Stop prototyping and ship on a platform that actually passes security review.
Build apps that ship
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
SyslogMonitor is a KDE Kicker aplication, that monitors system log using a pipe and syslogd redirections, and filters catched messages through a list of user-defined filters.
This project is to create a Linux based Router Configuration Management System for Cisco Routers (initially supporting router IOS 12.0+). The project was written in bash and perl scripting but has now been rewritten in Ruby, and makes use of Linux system
A tool for Multi-Router Traffic Graphing software, MRTG Spike Remover removes anomalous "spike" data from the MRTG logs in order to faciliatate reading the parts of the graph important to the surveyor, leaving out irrelevant data outliers.
Nasty LKM Defender is a module wich protects Your system against some nasty modules (e.g. rootkits).
Well mainly it protects sys_call_table and some other important functions (get_module_list, sys_query_module)
Tools for the Budget SysAdmin<>
Pix Log Parser: It parses pix logs for information and creates reports from it <>
SGZLogs. Searches gzipped logs for multiple terms and saves reports.<>
This is a Shell Script. It transform the logs of the linux in HTML pages, with colored erros.
I dont speak english very well but I think... the name explain everything. the name of the script is LOGhtmlER.
Run applications fast and securely in a fully managed environment
Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.
Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
Generic log parser written in PHP for *nix systems. Log entries are analysed on the fly and consolidated into events that are similar. Results are then displayed via a webpage.
CTrace is a multi-threaded trace debug library written in C. It provides a simple, fast, well documented trace utility for applications and as such is especially suitable for use in real-time embedded applications.
FWReport is a log parser and reporting tool for IPTables. It generates daily and monthy summaries of the log files, allowing the admin to free up substantial time, maintain better control over security of the network, and reduce unnoticed attacks.
Traffic Control is a Linux toolbox to control squid, NAT, and other
services traffic limits. TF uses Linux iptables to count traffic.
This utility consists of two parts. The first is server side
(written in Perl) and the second part is the interface.
RAIDmon2 is a simple perl-script for linux to monitor DELL's PERC/4 RAID-controller with SNMP.
It uses X-window (Tk at version 2.2, GTK in older ones) or STDOUT as output.
Requires Perl, TK or GTK, snmpd und the PERC-MIB.
USRBAC is a kernel patch and userspace daemon that allows role based access control to be mitegated in userspace. The goal is to allow a secure way to impliment RBAC compliant security systems using a daemon in userspace
Regwatch is a regular expression based logfile watcher in perl. It watches a log file, and executes pre-defined actions based on whether the line matches a regular expression defined in the configuration.
Loggy is a Linux Advanced Logcleaner and a tool to hide you in a linux machine
by cleaning or modifing the intruder's ip from all the logfiles in /var
bin and txt logs it find logs, with a recursive search in /var/log and a lot of fantastic features
Dryad is a real time log analysis daemon, capable of responding to events as they happen. It is highly configurable, allowing for maximum control over the entire process.