Easily access more than 100,000 products and tools with our robust search engine. Manage your entire IT lifecycle from purchase to renewal all in one place — so you can get more done faster.Advertisement
- Embedded Operating Systems (12)
- Grouping and Descriptive Categories (12)
- Linux (12)
- Mac (12)
- Windows (12)
- Android (6)
- Modern (6)
- BSD (4)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
IOS6 and recent iTunes updates have broken a few features. We have made some partial fixes, but they are not complete. If you'd like to help support our development, or take over the development please let us know. Explore the internal file structure of your iphone (or of a seized phone in the case of forensic teams) using either the iphone's own backup files or (for jail broken iphones) ssh. Viewing of plist, sqlite, and hex are supported. IOS 5 is now supported iOS 6 only partially works at the moment (some features fail or are missing). Unfortunately paid work means we can't fix this right now, but would welcome anyone else submitting patches.110 weekly downloads
Open Source for Internet of Things53 weekly downloads
Minimalistic address book in web browser. No server or plugin needed.50 weekly downloads
Cloudbased voice solutions are common in enterprise networks and frustrating for operations teams to manage. Simplify VoIP monitoring by having a proactive analysis of on-prem, hybrid and UCaaS voice services. Try the ThousandEyes VoIP monitoring solution today, free.Advertisement
Best open source MLM software for managing MLM network more easily!89 weekly downloads
Multiplatform data-driven test automation execution services7 weekly downloads
This is a site that I use to keep programs I make and want to share.
Ampare Copy Protection is a simple jquery prevent newbies copy content
A Simple Yet Effective Way To Protect Your Image From Download Free
AlienVault® Unified Security Management™ (USM™) is an innovative approach to security monitoring, delivered in a unified platform. The USM platform includes five essential security capabilities that provide resource-constrained organizations with everything they need for effective threat detection, incident response, and compliance management, in a single pane of glass.Advertisement
Japanese dictionary & flashcards like software for jailbroken iphone/ipad/ipod touch. It should also works on standard hardware, as long as it sports Ruby and its SQLite3 bindings.
Loid is used to work with Java and Objective-C to simplify data exchange bindings. Loid can generate meta-information available at run-time. Requesting clients or applications can inference on the meta-information for data binding.
A next generation RSS reader
mail2prowl is used to operate the free service http://mail2prowl.de This script receives mails via POP3, reads a special formed recpeint adress and sends the mail to the Prowl webservice. Prowl is a push enabled iPhone Application with a nice API.