Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Learn More
AI-generated apps that pass security review
Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
Kally is a software agent embedded in OpenOffice. We have created a simple interface to allow agents powered by GLORIA (gloria.sourceforge.net) to act as help assistants for users of OpenOffice, the office suite.
This project is to develop a versatile benchmark for High Performance Computing (HPC) network environments, currently the Linux-based Beowulf systems. The goal is to examine the TCP/UPD/MPI communications and their impact to system kernel.
gSTM is a front-end for managing SSH-tunneled port redirects. It stores tunnel configurations in a simple XML format. The tunnels (local, remote and dynamic) can be managed and individually started/stopped through one simple interface.
Pocomos is a cloud-based field service solution that caters to businesses
Built for the pest control industry, but also works great for Mosquito Control, Bin Cleaning, Window Washing, Solar Panel Cleaning, and other Home Service Businesses in need of an easy-to-use software that helps you simplify routing, scheduling, communications, payment processing, truck tracking, time tracking, and reporting.
AntiDialer is a QT based broadband dialer for Sify Broadband users in India. It has features comparable to the Sify Windows dialer such as password saving and autologin. Now Sify users no longer have to depend upon the old default dialer provided by Sify
Wep key changer (wepkc) is a client/server application that allows you to protect your ad-hoc (point to point) Wireless network when you are unable to use (due to software or hardware limitations) sophisticated protocols like WPA.
Welcome to the Linux-IrDA project. The overall goal of this project is to make an implementation of the IrDA (tm) standards specifications for the Linux kernel. The code is licensed under the GNU Public licence (GPL) and is now included in Linux-2.2.
The aim of our project is to create a portable microkernel and a set of OS services that allow good local performance, multiple concurrent operative system personalities (ie UNIX and a native interface) and easy integration of distributed components.
Zulu is a light weight 802.11 wireless frame generation tool to enable fast and easy debugging and probing of 802.11 networks. It has an intuitive command line interface and operates with the madwifi-ng network drivers.
Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys
based on a active dictionary attack, key generator, distributed
network attack and some other methods, it's based on wepattack and GPL licensed
Meghadoot is a hybrid wireless network architecture that provides improved connectivity, efficient routing, and access to the Internet. Meghadoot
architecture combines the advantages of both single-hop and
multi-hop wireless networks.
Nanov6 is a minature IPv6 stack for the Microchip PIC16 family of microcontrollers. Its modular design and simple API is designed for easy modification and itegration into a wide variety of next-generation network enabled embedded applications.
ip-session gets info of network trafic, such as sip, dip, sport, dport, etc. from linux kernel; gets account info of each traffic, such as in/out bytes/pkgs, etc.; else, gives session management function, such as query/del, etc.
A linux liveCD for the non-invasive, non-destructive detection and analysis of WiFi (802.11) networks. It also provides mechanisms to set up a PC as an 802.11 Access Point.
Automated Incident Reporting (AirCERT) is an Internet-scalable infrastructure to automatically receive, process, and analyze security event information reported from across administrative domains.
Ircproxy is transparent IRC content-filtering application. It may be used whenever there is a need of monitoring IRC connections.It may be used to deny specific connections or to behold suspicious IRC traffic.
Piper is a daemon used to redirect streams. Input and output can be one of: stdin, stdout, fifo, program. It simply does the same as shell's "<", ">", "|" with a difference of: ability to re-open fifos, catch program exits/crashes and restart it.
Smtp Relay Checker is a network open mail relay checker. It is muti-threaded so it can be used to scan vast networks quickly, it is fully configurable so it can be adjusted to suit any need, and the scan results can be displayed in HTML. It is intended f