Clear visibility and insights into how employees work. Even remotely
Our computer monitoring software allows employees, field contractors, and freelancers to manually clock in when they begin working on an assignment. The application will take screenshots randomly or at set intervals, which allows employers to observe the work process. The application only tracks activity when the employee is clocked in. No spying, only transparency.
BackBox seamlessly integrates with network monitoring and NetOps platforms and automates configuration backups, restores, and change detection. BackBox also provides before and after config diffs for change management, and automated remediation of discovered network security issues.
TALPA is a high-performance filesystem access interception package providing facilities for user-mode programs to 'vet' filesystem operations before they are executed.
You can turn your USB sticks and even your removable hard disks into a portable safe and securely carry your all sensitive data or work. The USBK protects your privacy. www.usb-k.com
A set of tools for querying and modifying the ACL's (access control lists) and ACE's (access control entries) of files, services, registry keys, printers, processes, threads, timers, mutexes, tokens, events, and semaphores in Windows 2000 and later
Unlock call analytics that provide actionable insights with our call tracking software, empowering you to identify what's working and what's not.
Every customer interaction is vital to your business success and revenue growth. With Jiminny’s AI-powered conversation intelligence software, we take recording, capturing, and meticulous analysis of call recordings to the next level. Unlock call analytics that provide actionable insights with our call tracking software, empowering you to identify what's working and what's not. Seamlessly support your biggest objectives across the entire business landscape with our innovative call tracking system.
This is the repository of my (PP) personal tools, scripts, programs, specifications and writings. I'm giving most of my smaller work to the world to use it, for free.
Open1X is an open source implementation of the IEEE 802.1X protocol. This project includes support for the supplicant, while other projects (e.g., FreeRADIUS) provide support for the authentication server.
Software to retrieve password of administrative system users stored in a MySQL database, designed for Nagios to access servers via expect or via SSH when you have not the Public key. Not exclusive to Nagios, but very desirable to sysadmins.
Device driver to enable the TPM chip as described by specifications at http://www.trustedcomputinggroup.org.
The TPM chip will enable you to use hardware to securely store and protect your keys and personal data. See also theTrouSers project.
This driver is integrated into the mainline Linux Kernel - code downloads on this page are only for historical reasons.
Latest Code can be found at:
https://github.com/PeterHuewe/linux-tpmdd
Patchwork:
https://patchwork.ozlabs.org/project/tpmdd/list/
OS independent implementation of the Trusted Network Connect (TNC) specification from Trusted Computing Group (TCG). Functions for loading and communicating with TNC plugins, sample IMC and IMV plugins, TNCCS-XML support on Windows, Linux, Mac, *BSD
Using Dialogflow, you can provide new and engaging ways for users to interact with your product.
Dialogflow can analyze multiple types of input from your customers, including text or audio inputs (like from a phone or voice recording). It can also respond to your customers in a couple of ways, either through text or with synthetic speech. Dialogflow CX and ES provide virtual agent services for chatbots and contact centers. If you have a contact center that employs human agents, you can use Agent Assist to help your human agents. Agent Assist provides real-time suggestions for human agents while they are in conversations with end-user customers.
Program for brute force recovering a Oracle password hash. This is my first ever Linux program(after some hello world programs) Still learning how to program C
Mpctp is a tool for raw packets manipulation of the TCP/IP family that allows a large number of options. It is able to send certain types of packets to any specific target and manipulate various of its fields at runtime.
Bruter is a parallel network login brute-forcer on Win32. This tool is intended to demonstrate the importance of choosing strong passwords. The goal of Bruter is to support a variety of services that allow remote authentication.
Hyenae is a highly flexible platform independent network packet generator. It allows you to reproduce several MITM, DoS and DDoS attack scenarios, comes with a clusterable remote daemon and an interactive attack assistant.
*** Hyenae is back ***
Hyenae will be continued here: https://sourceforge.net/p/hyenae-ng
SoupToNuts is a repository of technical articles and example software covering Postfix, OpenSSH, C and C++, Live Linux CD, MySQL, SQLite, Berkeley DB, Bash and System Administration.
Slogger is a session keystroke logging utility. The goal of the design is to provide the same features available in many commercial products, but under the GNU license.
FBAC-LSM is a Linux Security Module based implementation of the Functionality-Based Application Confinement (FBAC) model. Policies to confine processes are created using reusable abstractions which describe the functionalities applications perform.
Expand a TrueCrypt volume on the fly without reformatting. All kind of volumes (container files, disks and partitions) formatted with the NTFS file system are supported.