Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.
Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
Build an app in Retool
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Mailchecker will (in time) check mail for 'safe' content. 'unsafe' content (e.g. attachments that may contain viruses) will be stopped or converted to 'safe' formats.
NipperME or 'Nipper Made Easy', is a GUI application that sits on top of the commandline tool Nipper located at http://nipper.titania.co.uk/ This tool provides Nipper commandline options presented to you in a nicely laid out GUI.
Etch is a cross-platform, language- and transport-independent framework for building and consuming network services. With Etch, service development and consumption becomes no more difficult than library development and consumption.
NetgearDG tools is a collection of command line utilities to administer Netgear routers running DGTeam firmware. Currently the only supported router is the Netgear DG834GT.
Freenomalism is a free, community based fork of the Enomalism web-based virtual infrastructure/cloud computing platform. The dashboard can help with issues including deployment planning, load balancing, migration, configuration management, and capacity.
Open source Penetration Testing Suite for IT professionals and penetration testers. SecTest automates the boring repetitive procedures of penetration testing.