Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.
Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
Build an app in Retool
Outgrown Windows Task Scheduler?
Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.
Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
Multicasting Master-Slave Network Filesystem - efficient method of populating filesystems among several machines on the local network using multicasting.
Linux driver for rtl8180 wlan card with philips, maxim or gct radio(other in future).Still under development!(Use at your own risk!).Managed and monitor mode working.Ad-hoc roughly working,WEP support with open authentication and promisc mode are ok also
LICOM is a compression/de-compression tool that sits in-between the browser and content from the server. It aims to facilitate compression of ASCII text, RTF, DOC, PDF, HTML, GIF, JPG, BMP and similar filetypes.
escapeNET is used to provide an user or customer with all the necessary information from the internet he can not get because company restrictions or proxy servers. It can be used to connect to different services on the internet from any computer.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
An elliptic curve based encryption system for secure and private communications at the network level. Public key encryption is used to automatically negotiate keys for AES encryption links between all nodes in use. Dev version uses orinoco drivers.
Total Network Visibility for Network Engineers and IT Managers
Network monitoring and troubleshooting is hard. TotalView makes it easy.
This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
XSServer is a system, which is intented to be an easy way to configure dhcp, iptables and squid in order to make possible to have those working together at once, generating the needed config files for each.
IVS Milter is a plugin based content filtering milter. It currently supports... Virus (ClamAV) & Spam (SpamAssassin) scanning, Content-type, Attachment type & Attachment filename matching
OpenRPR. An opensource implementation of Resilient Packet Ring or 802.17. This new technology is fueling a revolution in Telephony Transport Technologies by converging SONET's resilience with Ethernet's Flexibility.
M-ICE is a modular hostbased intrusion detection framework. It is used as middleware to close the gap between IDS research and IDS development. M-ICE consists of various parts that can be connected together by using network-or interprocess-communication
OLSR-OLOD is a part of the Open Libraries of Doom project. It provides a POSIX-based C-language library for implementing and interfacing with Optimized Link State Routing (OLSR) mesh networks, as defined in RFC 3626.
phc -- proxy hunter customed -- for validation of free SOCKS 4/5 or HTTP proxies.
It is highly customed. Current first release 1.0 validate http proxies from a file with CONNECT or GET method bypass a basic auth http tunnel. Delay is recorded, too.
marping (Multi-ARp-PING) is a (tiny) command line utility for *nix operating
systems used to discover systems in local network and gather their
MAC addresses.
It's designed to perform rather massive scans very fast.
wlan-chooser lets you choose and join an available wireless network. It also remembers your WEP keys for next time you want to join the same protected network again.
A Linux 2.6 kernel module for the Datagram Control and Congestion Protocol (DCCP). DCCP intends to provide a datagram service with TCP-like or TCP-friendly rate control.