Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
Explore Apify Store
BoldTrail Real Estate CRM
A first-of-its-kind homeownership solution that puts YOU at the center of the coveted lifetime consumer relationship.
BoldTrail, the #1 rated real estate platform, is built to power your entire brokerage with next-generation technology your agents will use and love. Showcase your unique brand with customizable websites for your company, offices, and every agent. Maximize lead capture with a modern, portal-like consumer search experience and intelligent behavior tracking. Hyper-local area pages, home valuation pages and options for rich lifestyle data keep customers searching with your brokerage as the local experts. The most robust lead gen tools on the market help your brokerage, teams & agents effectively drive new business - no matter their budget. Empower your agents to generate free leads instantly with our simple to use landing pages & IDX squeeze pages. Drive more leads with higher quality and lower cost through in-house tools built within the platform. Diversify lead sources with our automated social media posting, integrated Google and Facebook advertising, custom text codes and more.
Random Password Generator written in Haskell. It provides easy command-line interface for generating passwords. Options include: number of passwords, random password length, allowed characters.
For companies looking to automate their consolidation and financial statement function
The software is cloud based and automates complexities around consolidating and reporting for groups with multiple year ends, currencies and ERP systems with a slice and dice approach to reporting. While retaining the structure, control and validation needed in a financial reporting tool, we’ve managed to keep things flexible.
Picviz is a parallel coordinates plotter which enables easy scripting from various input (tcpdump, syslog, iptables logs, apache logs, etc..) to visualize your data and discover interesting results quickly.
Rezku is an all-inclusive ordering platform and management solution for all types of restaurant and bar concepts. You can now get a fully custom branded downloadable smartphone ordering app for your restaurant exclusively from Rezku.
fwsnort translates Snort rules into equivalent iptables rules. The iptables string matching capability is heavily used, along with custom signature matching chains built by fwsnort.
Enpct (Easy Network Packet Crafting Tool) allows you to generate network packets to check firewalls or other network equipment. The packets can be precisely described in configuration files. It also supports fragmentation based network attacks.
ARCCIOS aim is to analyze network config through the security prism. It is working at that time for Cisco devices and provide security dashboard, full reports and todo list under html and csv.
Applet loader for the Cyberflex Access Developer 32k and e-gate 32k cards. Will allow you to load the MuscleCard applet onto the smartcard and use it as cryptographic token.
Huskarl is an alternative authentication and key exchange schema for Bluetooth devices.Huskarl produces secure shared link keys between two devices using public key cryptography.
The program uses a number of processes to brute-force crack MD5 hashes.
MD5 brute-force cracking involves hashing all possible strings and each
time compare the obtained hash to the one we are trying to crack
A tool for network defenders to monitor known or suspected malicious infrastructure associated with hackers, spammers, etc. The tool allows many types of infrastructure to be monitored anonymously in multiple ways and alerts sent to many output types.
Tulihänd is a security tool that aims to protect files on a filesystem. It collects information about them and compares with a specification in order to highlight modifications.
rcstagger is a network aware process monitoring system designed to work alongside the init process (Note that it makes no attempt to replace init). It utilizes openssl to maintain PKI authentication to verify the identify of sibling daemons and any control clients.
CMS identifier (cmsident) attempts to identify the content management system used to generate a given web site (and its version). Future versions will automatically look up found versions in vulnerability databases to alert if updates are necessary.
pam-openvpn is a Linux PAM-module which works together with OpenVPN. With this pam-module it is possible to establish vpn connections when a user logs into a system and tear down the connection when the user logs off. This is ideal for mobile systems.
KFW aims to be a simple to use but powerful Firewall/IDS. That will have a GUI designed since its origins, and will use state of the art firewalling and intrusion detection techniques to achieve maximum performance.
Cryptofon - a safe phone with integrated encryption.
The Cryptofon is designed to enable safe and secure communication trough a regular PSTN line. It supports narrowband connections (~2400 bit/s and lower).
The Shibboleth Proxy provides an intermediate filter to the Shibboleth authentication system, enabling Shibboleth unaware applications to connect automatically and make use of Shibboleth protected HTTP-based service providers.