AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
Try it Free
Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
Laika analyzes and reports on the interoperability capabilities of EHR systems. This includes the testing for certification of EHR software products and networks.
Josso agent for Ruby on rails.
Recently, there isn't a josso agent for ruby on rails. So, this project is born for SSO with JOSSO in the ROR environment.
Open source project for bots that can be used on social networks. These bots are for testing only and should not be used for SPAM or other malicious means. Bots are currently coded in Python and Ruby and demonstrate many different ways to use bots.
BXR is an open source, ruby on rails file management system. It is based off of Boxroom, an open source file management project. BXR Allows you to upload, protect, and organize your files.
The Solitox Community system provides an integrated real-time chat service, web interface, and a scalable infrastructure for adding more services with common credentials. These interfaces allow a greater level of communication for your users.
RogueScanner is a network security tool for automatically discovering rogue wireless access points by scanning a wired network. In addition to finding access points, it will classify all discovered network devices
Ruxseed processes XCCDF documents used for SCAP (NIST Security Content Automation Protocol) checklists. It performs benchmark resolution, i.e., the 6 "Loading" steps. Given an XCCDF document, it returns a resolved benchmark in the form of an ReXML tree
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
This software is a set of tools that hides C source code in txt files. Also the software is able to restore the txt files to C source code again. This work is based on the tool c2txt2c by Leevi Martilla. Csteg needs a book file in txt format to hide C so
What is a Protocol Debugger? Conditionally break based on BPF filters, modify protocol contents on the fly. Build custom actions that let you manipulate how you speak on the network. Or manually edit protocol fields and send the packets along.
The CredentialCompiler suite compiles the site credentials in grid environments from several LDAP databases. It is possible to feed the credentials in both UNICORE- and Globus-based systems, based on site-specific rules.
OAproject implements a plataform to allow applications to interact. Apps using the platform send/receive messages through a message oriented middleware. Main features are a Single Sign On (SSO), Identity Management System (IMS) and a provisioning system
RubyHtpasswd - Htpasswd apache files class writen in Ruby language
Features:
- Add Users
- Change Password
- Rename users
- Delete users
- Display errors messages
- Get encrypted passwords from the file
- Get an users list
FatNS Analyzes and Tests Name Servers. It is a PCAP-based security tool intended to sniff and detect common attacks on the DNS system, and is designed to be easily expandable with additional attack detectors.
Tattoo will provide a set of command-line scripts for analyzing raw tcpdump files or ASCII hexadecimal representations of network traffic to identify format, function, and communication model.
The purpose of SNX is to have a modular series of components that report back to a central repository and 'AI' for pattern recognition and anomoly detection. This is to help with IDS systems, and to move to the next generation of security.
A software distribution based on Debian/Linux to provide network diagnostics, security monitoring and intrusion detection. The distribution can be easily installed by office personnell.