Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
Try Retool free
Outgrown Windows Task Scheduler?
Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.
Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
A Java-based client-server architecture for processing network intrusion detection data. The server receives XML alerts from Snort sensors buffers them for review by clients. The console provides a real-time view of IDS activity.
sud is a daemon to execute interactive and non-interactive processes with special (and customizable) privileges in a nosuid environment
It is based on a client/server model and on the ability to pass file descriptors between processes.
sntm is a Qt based GUI snort monitor. Currently, it is capable of monitoring
multiple snort sensors in a centralized monitor screen. Each snort sensor
creates a SSL encrypted communication thread to connect to the moniter server.
Eliminate the mundain tasks & ease the use of basic http authentication in php. A lightweight php class that handles http authentication, & user mgmt tasks from flatfile or any SQL compliant db server.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
The SWAP (Secure Wireless Access Point) project is intended for use in embedded appliances. These appliances will operate in the role of a WEP (wireless encryption protocol) and IPSEC enabled wireless access point, IPSEC VPN gateway, and firewall.
QuIDScor is a daemon software integrating Intrusion Detection Systems (IDS) and vulnerability assesment and management platforms.
Today QuIDScor correlates and verifies Snort alerts against QualysGuard vulnerability assessment data.
mod_stego is a module for the popular Apache Web Server. It steganograph a file or a message inside the html pages. If you want the message, you should use a a de-steganography software to take it out.
Network Management Software and Tools for Businesses and Organizations | Auvik Networks
Mapping, inventory, config backup, and more.
Reduce IT headaches and save time with a proven solution for automated network discovery, documentation, and performance monitoring. Choose Auvik because you'll see value in minutes, and stay with us to improve your IT for years to come.
Generic clustering/load-balancing platform (over a LAN or internet) using java based P2P Aorta workers that execute java "tasklets". Various tasklets can be implemented to solve fractals, process images, render webpages, crack RSA "brute force".
<b>IVJ MUD (Masive Multiplayer Text Game) is a SSL-based soft:<br>-Client (GUI)<br>-Server (GUI)<br>-Applet (GUI)<br>-Protocol (SSL-based, use of localization files that store strings to reduce trafic and allow for instant i18n.<br>
LOOKING FOR HELP!</b
Bait and Switch combines IDS tech (Snort primarily) and Honeypots into a new, more valuable, reactive system. After receiving an alert, B&S protects your server by silently redirecting hostile traffic to a honeypot while leaving other traffic alone.
Alist is a program that collects hardware and software information about systems and stores it in a database for users to browse and search via a Web interface. The program consists of three parts: a client portion that collects the information, a daemon
Encrypted Messaging and Authentication Protocol, Client and Server. This project is meant to further the development of the Encrypted Messaging and Authentication Protocol.
FreePFW is a web interface to IPFW firewall on FreeBSD servers. It allows authorized users, from authorized hosts changing *specific* rules at the firewall, granting remote access to the server.
PATC is a client/server package for controlling internet access on public terminals (e.g., in a library). Users log in, and are given access to the internet with a time limit determined by the server.
DSBL-helper. Tries to send a special formatted test message to Distributed Server Boycott List through every suspect IP found in complain using several mechanisms (SMTP, HTTP, telnet, SOCKS etc) and reports in.
A Perl CGI JavaScript framework for implementing a MD5 based encryption Secure login on both client and server machines. The password is never stored or transmitted as plain text. Also encrypts cookies to maintain sessions.
php-backdoor all-in-one administration tool designed as a single phpscript for linux and windows os. features are: browse filesystem, download, upload, create dirs and run phpcode. this tool also can be used to test server security.
Remote Nmap (Rnmap) package contains both client and server programs.
Actual idea for this sofware is that various Rnmap clients can connect to
one centralized Rnmap server and do their portscannings.
Server utilize Nmap scanner.
Gobbler: A tool to audit DHCP networks
Includes DHCP rogue server detection, DHCP DoS, distributed spoofed port scanner using DHCP to obtain many source IP addresses, mulitple arp scans, filtered port detection, spoofed OS detection (nmap + port 0)
The goal of Operation Project X is to crack the 2048-bit RSA private encryption key Microsoft uses to sign Xbox media, by using distributed computing. This key could be used by Xbox owners to run homebrew code on their machines.