Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Learn More
Easy-to-use Business Software for the Waste Management Software Industry
DOP Software’s mission is to streamline waste and recycling business’ processes by providing them with dynamic, comprehensive software and services that increase productivity and quality of performance.
This is a tool that has per objective to audit a system Unix. In order to make this procedure, this tool has verifications of configurations and variables of the Operating system.
Paglo Crawler discovers all devices connected to a network - including workstations, servers, switches, routers, printers, etc and gathers rich information about each device. This information is then searchable through an account at http://paglo.com/
A distributed application for ethernet packet sending (using c# and remote objects). Large part of the project its currently in development, and many parts are not yet available.
this is progress of original dhcpdump.
Added some functionality concerning to option82 of dhcp protocol:
- '-s, --short' - only querier's vlan & port and relay agent's IP (in decimal)
- '-k, --switch-ip' - traffic only regarding this relay agent
Turn traffic into pipeline and prospects into customers
For account executives and sales engineers looking for a solution to manage their insights and sales data
Docket is an AI-powered sales enablement platform designed to unify go-to-market (GTM) data through its proprietary Sales Knowledge Lake™ and activate it with intelligent AI agents. The platform helps marketing teams increase pipeline generation by 15% by engaging website visitors in human-like conversations and qualifying leads. For sales teams, Docket improves seller efficiency by 33% by providing instant product knowledge, retrieving collateral, and creating personalized documents. Built for GTM teams, Docket integrates with over 100 tools across the revenue tech stack and offers enterprise-grade security with SOC 2 Type II, GDPR, and ISO 27001 compliance. Customers report improved win rates, shorter sales cycles, and dramatically reduced response times. Docket’s scalable, accurate, and fast AI agents deliver reliable answers with confidence scores, empowering teams to close deals faster.
Kwickserver is a do-it-yourself Firewall appliance optimized for educational use, but can be used in all other scenarios. It installs automatically from CD on your HD and is administered via webinterface. Download it from the project homepage!
hardware log monitor that will display log behaviour via various hardware (parallel port, USB devices, ...). You can specify pattern(regexp) in log(s) on which hardware will turn on. It has also some unique ways of visualization of log files.
Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place.
For healthcare Providers and Facilities
Incredable streamlines and simplifies the complex process of medical credentialing for hospitals and medical facilities, helping you save valuable time, reduce costs, and minimize risks. With Incredable, you can effortlessly manage all your healthcare providers and their credentials within a single, unified platform. Our state-of-the-art technology ensures top-notch data security, giving you peace of mind.
BlueLogger is built using the Python programming language in order to monitor for Bluetooth devices nearby. The application can log the "Time", "Device Name" and "Device Address" of each discovered device.
NEP is a network management software platform based on Netconf protocol. It implements all the basic functions of Netconf. Also, it is hithly scalable and the program structure allows users to conveniently carry out the secondary development.
ACE RADIUS library is a portable open-source implementation of RADIUS protocol, as defined in RFCs 2865 and 2866. It's written in C++ and is supported on a wide variety of POSIX-compliant platforms, including Linux and Solaris, and on Windows.
PHP Daemon & Frontend for Squid Web Proxy Server.
Provides both User Based bandwidth Monitoring, and Squid Logfile Analysys. Allows users to generate graphs of traffic usage, based on many different factors.
WSD4WSN provides Wireshark dissectors for the analysis of Wireless Sensor Networks (WSNs) based upon the IEEE802.15.4 protocol, to be used with the wireshark network packet analyzer.
LIne KEEper, a monitoring system for supervision of web applications and pages. A tool for automation of service processes of uptime-critical web applications. Visit product site www.likee.org. Check demo at demo.likee.org (login as demo/demo)
A software solution for managing Cybercafes,register users,define a network,log client's internet traffic,define custom services and block client workstations according to the antiterror laws of Italy (Legge Pisanu 155/05) and of other countries.
Armory is a monitoring solution for network, servers and applications. Planning cool features like auto-discovery, full snmp support, inventory, scalations, easy install and use. Alpha version is coming soon.
Parse through Cisco IOS-style configurations and retrieve portions of the config using a variety of query methods. Note: starting January 2010, we have moved development to http://bitbucket.org/mpenning/ciscoconfparse/. Please update your hyperlinks.
NetAccess is an application for managing a gateway linux server through a web-based interface. It can be used to change the network settings, to limit the bandwidth, to limit the computers that can get internet access (by checking their MAC), etc.
Pynk, or the Python Network (K/C)ontrol (Names are hard, give me a break) is a programme designed to return data, when polled, about the system it is sitting upon. We Don't Need No Stinking SSH
Recon is a networking tool that analyzes level 2 and 3 protocols in the OSI model. It is written in C++ and makes use of classes to represent the different protocols in the said layers. It is mainly developed for educational purposes only.
Berkley Snoop protocol module for Linux. Purpose: avoid speed reduction between big fat pipe (satellite) and wireless links caused by error prone nature of wireless links.