Showing 957 open source projects for "command-line"

View related business solutions
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • BoldTrail Real Estate CRM Icon
    BoldTrail Real Estate CRM

    A first-of-its-kind homeownership solution that puts YOU at the center of the coveted lifetime consumer relationship.

    BoldTrail, the #1 rated real estate platform, is built to power your entire brokerage with next-generation technology your agents will use and love. Showcase your unique brand with customizable websites for your company, offices, and every agent. Maximize lead capture with a modern, portal-like consumer search experience and intelligent behavior tracking. Hyper-local area pages, home valuation pages and options for rich lifestyle data keep customers searching with your brokerage as the local experts. The most robust lead gen tools on the market help your brokerage, teams & agents effectively drive new business - no matter their budget. Empower your agents to generate free leads instantly with our simple to use landing pages & IDX squeeze pages. Drive more leads with higher quality and lower cost through in-house tools built within the platform. Diversify lead sources with our automated social media posting, integrated Google and Facebook advertising, custom text codes and more.
    Learn More
  • 1
    A command line utility for managing passwords and other login information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Random Password Generator written in Haskell. It provides easy command-line interface for generating passwords. Options include: number of passwords, random password length, allowed characters.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    tesse is Transparent Extensible Steganographic fileSystem with Encryption
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Web Security Assessment Tool (WSAT) is a tool that search for vulnerabilities in Web applications. It is in the very early phase of development
    Downloads: 0 This Week
    Last Update:
    See Project
  • Financial reporting cloud-based software. Icon
    Financial reporting cloud-based software.

    For companies looking to automate their consolidation and financial statement function

    The software is cloud based and automates complexities around consolidating and reporting for groups with multiple year ends, currencies and ERP systems with a slice and dice approach to reporting. While retaining the structure, control and validation needed in a financial reporting tool, we’ve managed to keep things flexible.
    Learn More
  • 5
    Java based codesigning tool for windows and linux. Use to sign Firefox and Thunderbird extensions
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A blind SQL injection tool inspired by sqlmap and written in the Python language.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    APing2 is an improved (and C rewritten) version of APing. [dev has ceased, we are waiting for the official NPing project to start]
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    A small modification to the allow calling external auth plug-in when EAP is used in Free RADIUS.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Picviz is a parallel coordinates plotter which enables easy scripting from various input (tcpdump, syslog, iptables logs, apache logs, etc..) to visualize your data and discover interesting results quickly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Rezku Point of Sale Icon
    Rezku Point of Sale

    Designed for Real-World Restaurant Operations

    Rezku is an all-inclusive ordering platform and management solution for all types of restaurant and bar concepts. You can now get a fully custom branded downloadable smartphone ordering app for your restaurant exclusively from Rezku.
    Learn More
  • 10
    fwsnort translates Snort rules into equivalent iptables rules. The iptables string matching capability is heavily used, along with custom signature matching chains built by fwsnort.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Enpct (Easy Network Packet Crafting Tool) allows you to generate network packets to check firewalls or other network equipment. The packets can be precisely described in configuration files. It also supports fragmentation based network attacks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    ARCCIOS aim is to analyze network config through the security prism. It is working at that time for Cisco devices and provide security dashboard, full reports and todo list under html and csv.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Applet loader for the Cyberflex Access Developer 32k and e-gate 32k cards. Will allow you to load the MuscleCard applet onto the smartcard and use it as cryptographic token.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Huskarl is an alternative authentication and key exchange schema for Bluetooth devices.Huskarl produces secure shared link keys between two devices using public key cryptography.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    The program uses a number of processes to brute-force crack MD5 hashes. MD5 brute-force cracking involves hashing all possible strings and each time compare the obtained hash to the one we are trying to crack
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Malicious Infrastructure Monitor
    A tool for network defenders to monitor known or suspected malicious infrastructure associated with hackers, spammers, etc. The tool allows many types of infrastructure to be monitored anonymously in multiple ways and alerts sent to many output types.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Tulihänd is a security tool that aims to protect files on a filesystem. It collects information about them and compares with a specification in order to highlight modifications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    rcstagger

    secure network aware process monitoring system

    rcstagger is a network aware process monitoring system designed to work alongside the init process (Note that it makes no attempt to replace init). It utilizes openssl to maintain PKI authentication to verify the identify of sibling daemons and any control clients.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    CMS identifier (cmsident) attempts to identify the content management system used to generate a given web site (and its version). Future versions will automatically look up found versions in vulnerability databases to alert if updates are necessary.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    pam-openvpn is a Linux PAM-module which works together with OpenVPN. With this pam-module it is possible to establish vpn connections when a user logs into a system and tear down the connection when the user logs off. This is ideal for mobile systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Panel Management Messaging Panel web management e-mail servers. The system is written in PHP using Symfony 1.2 framework
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    KFW aims to be a simple to use but powerful Firewall/IDS. That will have a GUI designed since its origins, and will use state of the art firewalling and intrusion detection techniques to achieve maximum performance.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Cryptofon

    Cryptofon

    Cryptofon - a safe phone with integrated encryption.

    The Cryptofon is designed to enable safe and secure communication trough a regular PSTN line. It supports narrowband connections (~2400 bit/s and lower).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    The Shibboleth Proxy provides an intermediate filter to the Shibboleth authentication system, enabling Shibboleth unaware applications to connect automatically and make use of Shibboleth protected HTTP-based service providers.
    Downloads: 0 This Week
    Last Update:
    See Project