Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.
Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
Build an app in Retool
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
A dynamic Firewall (using the iptables netfilter) which can alter its is rules on detection of certain attacks/events. Very easily modified and expendable, with mySQL back-end and dynamically loaded user-space filters.
The WOLKs are stable and development kernels, containing many useful patches from
many projects. Goal: Stability, Scalability, Performance and most important: Security.
Nariz is a distributed alert correlation system, that performs alarm correlation in two phases, preprocessing locally and distributed postprocessing. By splitting the
correlation system amongst several computers.
CECID is a PHP script designed to anonymize and cloak HTTP requests on restrictive connections. CECID is run on a remote, unrestricted server, and accesses pages for users, editing the page's source in realtime to evade content filtering software.
The algorithm allows any kind of weights (costs, frequencies), including non-numerical ones. The {0, 1, ..., n-1} alphabet is used to encode message. Built tree is n-ary one.The algorithm is based on a set of template classes : Cell(SYMBOL, WEIGHT), Node(
Signelf is a toolset written in c++ for signing elf binaries, specifically linux shared object, though in theory, any elf binary may be signed. It uses openssl's libcrypt to RSA sign the library, and the same to validate the signature.
This is an experimental program that encrypt/decrypt/divide/join files. This program uses a new algorithm made by me, this algorithm is experimental and I working on it, every day this algoritm will be better.
Yeastar: Business Phone System and Unified Communications
Go beyond just a PBX with all communications integrated as one.
User-friendly, optimized, and scalable, the Yeastar P-Series Phone System redefines business connectivity by bringing together calling, meetings, omnichannel messaging, and integrations in one simple platform—removing the limitations of distance, platforms, and systems.
Glitch is an all-round crypto toolkit for your security needs. It relies on a Plug-in interface to access its Cryptography functions, allowing the user maximum customisation, thus allowing them to download what they want, not bloated software.
Secure Key is an uncrackable security mechanism that minimizes trust given to stored keys, and obfuscates key data in random noise. The Secure Key itself is a hardware device that plugs into your PC (and the server the other end). The key is sent to user
The goal of this project is to design and write comercial quality software and aplications with fully respect to free software (like in "free speach"). The software designed by us will target various fields: from scientific applications to multimedia an
The purpose of this project is to provide a biometric security solution by using voice print, fingerprint and/or facial recognition along with a password and/or smart card support using AES to protect data. Please read forums for if interested.
Multiprecision unsigned number template library (MUNTL).
The program is intended for the organization of calculations with the big
precision for unsigned numbers. Program is very fast because do not use any heap call (new, malloc etc.)
This answer to the lack of reaction and the hight resource consuming of network management. It is able to launch
and stop various tools distributed on the network depending on user defined rules, security policy and informations send by tools.
StegoGO is an opensource software that allows the embedding of hidden data in GO games, using GNUGo. It allows both the embedding of hidden data in an already existing GO game, and the creation of new GO games to hide data.
SHMAX is a small sniffing system that is especially designed for system administration and security purpose : SHMAX can easily detect desired packets on the network and react following its configuration, allowing many multiple usages, with full control.