Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
Explore Apify Store
Skillfully - The future of skills based hiring
Realistic Workplace Simulations that Show Applicant Skills in Action
Skillfully transforms hiring through AI-powered skill simulations that show you how candidates actually perform before you hire them. Our platform helps companies cut through AI-generated resumes and rehearsed interviews by validating real capabilities in action. Through dynamic job specific simulations and skill-based assessments, companies like Bloomberg and McKinsey have cut screening time by 50% while dramatically improving hire quality.
The purpose of on-line is to maintain servers 24/7 connected to the net. It will monitor your network connection and make sure its on-line (if not, it will bring it back). It is capable of syncing your IP (e.g: noip, dns2go). It has a notification system.
RemenDeKO is a file repair program that you can use to generate off-line patch files to apply over damaged files. It's targeted for corrupted downloads, so the downloader just need to re-download a (probably) small file to fix the damaged download.
OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.
Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
ReHash is an easy-to-use console-based hash calculation tool written in C++. It supports many algorithms and output formats and it can be fully configured using some of the many command-line arguments which can be passed to the tool.
The development of a biometric system and applications e.g. Access Control based on the system to recognize and verify people. The primary goal is face recognition, but other human attributes might get used too in the future.
Tattoo will provide a set of command-line scripts for analyzing raw tcpdump files or ASCII hexadecimal representations of network traffic to identify format, function, and communication model.
Open Source Stenography engine usable from the commandline. Uses various techniques for hiding and retriving stenographic information. Includes a small image analysis suite for detecting stenographic images.
Dun and Bradstreet Risk Analytics - Supplier Intelligence
Use an AI-powered solution for supply and compliance teams who want to mitigate costly supplier risks intelligently.
Risk, procurement, and compliance teams across the globe are under pressure to deal with geopolitical and business risks. Third-party risk exposure is impacted by rapidly scaling complexity in domestic and cross-border businesses, along with complicated and diverse regulations. It is extremely important for companies to proactively manage their third-party relationships. An AI-powered solution to mitigate and monitor counterparty risks on a continuous basis, this cutting-edge platform is powered by D&B’s Data Cloud with 520M+ Global Business Records and 2B+ yearly updates for third-party risk insights. With high-risk procurement alerts and multibillion match points, D&B Risk Analytics leverages best-in-class risk data to help drive informed decisions. Perform quick and comprehensive screening, using intelligent workflows. Receive ongoing alerts of key business indicators and disruptions.
CryptoPy is a pure python implmentation of cryptographic algorithms and applications. The algorithms are developed for readability more than speed. The collection now includes IEEE 802.11i specific algorithms that generated the test vectors for 802.11i.
a linux netfilter/iptables firewall log summarizer with graphical and commandline interface that helps the sysadmin in his daily routine. points of interest can be examined closer to gain further information. you can also run it in commandline mode and
AuthClassed is a class, written in PHP, to implement a simple authentification scheme for database-oriented webpages. Using AuthClassed is as simple as putting a single code line at the top of the webpage you would like to protect.
Geheimnis is no longer maintained (use of kpgp is now recommended). Geheimnis was an application for UNIX/KDE that "wraped" around encryption programs and their irksome command-line interface, making it easier for users to use these programs.
Web-Check is a tool for comparing two web pages using md5 digests. It can be run from the commandline or as a daemon. This project plans to become an opensource version of Tripwire for Apache.
Found at www.itadmins.net in the Projects area. The complete Linux Administrators CD. For normal system and network administration, security, forensics tools and utilities.
mod_antihak is an Apache Module designed to eliminate the CodeRed and Nimda
worm\'s network bandwidth consumption. We're working to make
it as easy as writing a line of text to add more worms! :)
GNotary is an asynchronous peer-to-peer digital notary service based on email. The server polls POP3 mail boxes scanning for specified key words in the subject line. A digital signature of the email body is returned to the sender.
BFBTester is great for doing quick, proactive, security checks of binary programs. BFBTester will perform checks of single and multiple argument commandline overflows and environment variable overflows. Versions 2.0-BETA and higher can also watch for tem
...It reveals the tracing ip and hostname. If in promiscuous mode it reveals all incoming traceroute attempts to any workstation on its subnet.
Run as daemonize (-d ) if specified in commandline.
A commandline tool written in C++ that analyzes the source files of a C program to represent the pattern of its system calls in terms of a LALR(1) grammar.