Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.
Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
Explore 10,000+ tools
Rezku Point of Sale
Designed for Real-World Restaurant Operations
Rezku is an all-inclusive ordering platform and management solution for all types of restaurant and bar concepts. You can now get a fully custom branded downloadable smartphone ordering app for your restaurant exclusively from Rezku.
PeerGuardian - a privacy oriented firewall application
PeerGuardian is a privacy oriented firewall application. It blocks connections to and from hosts specified in huge blocklists (thousands or millions of IP ranges). Its origin seeds in targeting aggressive IPs while you use P2P.
PeerGuardian Linux:
Not developed actively anymore. Team might still be around. Some unreleased changes on git. Outdated technology.
Peerguardian OS X:
Not developed anymore. We've lost contact with the OS X developer.
PeerGuardian Windows:
Not developed...
LiMon (Linux Monitor) is a free/open/libre multiplataform real time Linux monitor written in C/C++, and other languages. Monitor of server's relevant aspects, such as services, temperature, CPU, memory and disk usage, etc.
Likewise Open is an open source, community project sponsored by Likewise Software that integrates Linux, Unix and Mac platforms with Microsoft Active Directory. To download Likewise Open for free, go to http://www.Likewise.com/
This is a JavaOS software able to listen to or watch to VoIP sniffed communication. This software read libpcap file and it is able to discover VoIP-SIP session.
Secure and customizable compute service that lets you create and run virtual machines.
Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
Ethereal Network Traffic Session Reconstruction for Internet Protocols. Management Console to reconstruct emails, web sessions, VOIP sessions, FTP, and all known supported Internet Protocols for Network Forensics. ***UPDATE*** Project release scheduled.