Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Learn More
Vibes don’t ship, Retool does
Start from a prompt and build production-ready apps on your data—with security, permissions, and compliance built in.
Vibe coding tools create cool demos, but Retool helps you build software your company can actually use. Generate internal apps that connect directly to your data—deployed in your cloud with enterprise security from day one. Build dashboards, admin panels, and workflows with granular permissions already in place. Stop prototyping and ship on a platform that actually passes security review.
kbfd is implementation of the IETF Bidirectional Forwarding Detection Protocol on kernel-space daemon. It is challenge to Hardware implementation(like FPGA) BFD.
QT WebDav Explorer ist a graphical File interface. File and Dir can drag direct on remote folder or synchronize to local. Run on Win and MAC OSX/Linux . Works momentarily only on Apache2 WebDav server. Send us doc/account to implement on other server.
Scanhill is a Microsoft Messenger Protocol Sniffer. Currently it can only intercept Instant Text Messaging. Given that mySQL is used, stored instant messages can be read through a browser interface that is written in PHP language.
Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.
Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
IpTables Extension and Kernel Modul ipt_PORTNETSCAN English Detection of PORTSCAN's, NETSCAN's and COMBINEDSCAN's using quotas. Deutsch: PORTSCAN, NETSCAN und COMBINEDSCAN Erkennung auf Basis von IpTables_Regeln. Für die Erkennung können verschieden
Computer Breaker is a network testing tool that allows networking administrators to test if a computer is vulnerable to malicious attacks. Using the Nessus scanner, computer-breaker scans the remote host and automaticaly exploits its vulnerabilities.
This is a simple gui program which reads from your fstab and mtab and will mount/unmount/ any of the listed entries. I use it to quickly manage my remote shares at work. Double-click the fstab to mount a share. Double-click the mtab to mount it.
All-in-one security tool helps you prevent ransomware and breaches.
SIEM + Detection and Response for IT Teams
Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.
The KOM(S) Streaming System (komssys) implements a streaming system based on the IETF protocols RTSP, SDP, RTP/RTCP with the intention of providing a base for researchers and other developers. Komssys includes code for a server, a client, and a proxy
wayqonlan (Wake You On Lan) Wakeonlan front end. Be able to monitor computers' state (On/Off), turn them on, monitor some management services (telnet, ssh, vnc, remote desktop) and start a session in any of them, all in a single application.
This is a daemon that emulates Microsoft's Internet Connection Service (ICS). It implements the UPnP Internet Gateway Device specification (IGD) and allows UPnP aware clients, such as MSN Messenger to work properly from behind a Linux NAT firewall.
Monitor SMB/CIFS traffic on the wire, live! Use this tool to monitor
your Samba and/or Windows Server installations. Run smbstat anywhere in the network and track multiple clients accessing multiple servers.
Prawn (Prototyping Architecture for Wireless Networks) is a project that aims at providing an easy-to-use developping environment for rapid prototyping of wireless network protocols and applications.
The OpenMGCP project aims to provide a full featured, interoperable, robust Open Source implementation of the IETF MGCP protocol that can be used by personal developers and commercial users under GPL license or commercial license.
Netserpent is a third-party-hack-program framework under network 3rd
level. It configurably hijacks the 3rd level connections(currently
support tcp) outgoing or forwarding, and configurably use plugins to
determine how to hack the hijacked connection.
VNC Session Manager adds the nessary glue code between VNC's two execution modes that enables xdm based login to disconnected sessions. i.e. it provides a 'Terminal Services' like login for *nix based vnc servers.
This site is no longer updated, for updated info head over to http://opensource.iis.se/bbk (TPTEST is a software suite for testing network throughput and Internet services. It consists of a software library w. test functions that can be implemented i
ISIC is a suite of utilities to exercise the stability of an IP and its component stacks (TCP/UDP/ICMP etc.) It generates piles of pseudo random packets with configurable tendancies, then sent to the target to penetrate its firewall rules or find bug
In digital visual effects we deal with an overwhelming number of images. Earth simplifies the management of this data by continuously tracking the whereabouts of image sequences across a filesystem or visual effects facility.
NoCsim is a base library and front end for simulating Network On Chip environments utilizing Wormhole or Virtual Cut-Through routers. The current usage of the simulator includes experimentation with various routing protocols and functional unit mappings.