• AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • 1
    XHS-Downloader

    XHS-Downloader

    GUI/CLI tool for downloading Xiaohongshu

    ...The project offers two execution paths—run the compiled app or run from source—and documents default download and configuration paths to simplify first use. Recent releases add format support like JPEG and HEIC, clipboard-listening mode improvements, author-based archiving, SOCKS/HTTP proxy options, and the ability to set the file’s modification time to the post’s publish time for cleaner library organization. There is an active issues/discussions area with community tips, including approaches that use Selenium to acquire cookies and user agents for more reliable downloads.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    LitterBox

    LitterBox

    A secure sandbox environment for malware developers and red teamers

    ...It provides an isolated environment to exercise payloads against modern detection stacks, verify signatures and heuristics, and observe runtime characteristics without leaking binaries to third-party vendors. The README frames typical use cases: testing evasion, validating detections, analyzing behavior, and keeping sensitive tooling in-house. Repo metadata and author pages highlight an active security-tools ecosystem around the maintainer, with CI and pull-request activity suggesting ongoing development. The project positions itself as a safe proving ground to reduce surprises in the field while minimizing operational risk. For teams exploring MCP integrations, notes mention pairing with LLM agents for assisted analysis.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next