Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
Explore Apify Store
FusionAuth: Authentication and User Management Software
Offer your users flexible authentication options, including passwords, passwordless, single sign-on (SSO), and multi-factor authentication (MFA).
FusionAuth adds login, registration, SSO, MFA, and a bazillion other features to your app in days - not months.
jover-managing will be an manager and system viewer Applikation in Java, which exchanges data via sockets. It will be written in Java. It also will step into the base OS System doing changes, killing prozesses and so on.
This project is a collection of three different programs, regarding: 1) a program to include context-sensitive ranking when querying on a database, 2) a program for estimating relative importance in networks. 3)Search of services in a sensor network
Fully managed relational database service for MySQL, PostgreSQL, and SQL Server
Focus on your application, and leave the database to us
Cloud SQL manages your databases so you don't have to, so your business can run without disruption. It automates all your backups, replication, patches, encryption, and storage capacity increases to give your applications the reliability, scalability, and security they need.
This is a Java implementation of the driver for communicate with a ZigBee network. This driver has the capabilities to create a communication with a Coordinator node, discover the nodes on the ZigBee network, receive and send command to any of this nodes
Infect is a network traffic classification tool, that classifies TCP protocols. The classification is based on ML techniques. Scen: Train/Recognize arbitrary protocols (SSH, HTTPS..), Detect policy violations (e.g. tunnels)
Companies searching for an Employer of Record solution to mitigate risk and manage compliance, taxes, benefits, and payroll anywhere in the world
With G-P's industry-leading Employer of Record (EOR) and Contractor solutions, you can hire, onboard and manage teams in 180+ countries — quickly and compliantly — without setting up entities.
A server network is created where if a new server is introduced into the network, it seamlessly integrates with the existing ones in a way that is not made known to the users of the service - web apache servers are used to process client request.
Async message based communication system for different languages
Different implementations of a JSON based protocol for interchange of messages between different programming languages in a peer to peer fashion.
Currently Java and Javascript support, but more coming.
Etch is a cross-platform, language- and transport-independent framework for building and consuming network services. With Etch, service development and consumption becomes no more difficult than library development and consumption.
Bonswing is a library/framework that uses Java Swing components to list updates to services in the network using Apple's Bonjour. By using Bonswing components, the developer does not have to worry about service discovery and can focus on the application
FreeACS is Free Auto-Configuration Server. The project has just started, but we hope (and plan) to provide a free (GPL) full implementation of the CPE WAN Management Protocol (CWMP).
OpenVPN SysTray is a smart program enabling you to control OpenVPN from a self explaining graphical user interface. In addition, a password manager is supplied. Whenever you have to give your authentication information OpenVPN SysTray can do that for you
A Java based high performance CIFS Proxy Server that provides handlers for each type of CIFS packets to the user. In essence it provides a generic CIFS/SMB packet sniffing, logging and handling ability by providing simple Java APIs to the users.
Valkyrie-project is a realization of a group of students in training for Project Leader in Computer Science (CSIA) applied to the establishment Sciences-U.
This project will manage and visualize corporate networks.
Racoon is an application server for multi-player games. Its intention is to relieve game developers from recurring and time extensive tasks. This is achieved with a modular concept: only the game logic has to be written and deployed in Racoon.
This project intends to make a SOCKS compatible tunnel proxy which communicates to the server part, running on your nameserver, over standard DNS (UDP) protocol. That way you can bypass network firewalls allowing no other IP traffic but DNS.
JBTWatch is a Java Library used to communicate with Bluetooth Watches such as Sony Ericsson MBW-100 or MBW-150. It uses BlueCove to communicate and is responsible to handle the AT commands send from and to the watch.
Hyper-M is a bluetooth based DHT peer-to-peer infrastructure for J2ME (CLDC1.1/ MIDP2.0) enabled handphones. Hyper-M allows the user to create a peer-to-peer network and share and retrieve files on this network. Has been tested mainly on Nokia handphones
JStream is a stream manipulator based on plugin architecture.
Streams are manipulated via custom scripts (Java language).
JStream uses Java NIO for better performances.
With JStream, you can easyly create programs like : MD5Sum, TCP Redirector...
VeriNeC (Verified Network Configuration) is a network configuration management application. It allows to import configuration, simulate and verify the network and distribute configuration to devices.