Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.
Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
Explore 10,000+ tools
Rezku Point of Sale
Designed for Real-World Restaurant Operations
Rezku is an all-inclusive ordering platform and management solution for all types of restaurant and bar concepts. You can now get a fully custom branded downloadable smartphone ordering app for your restaurant exclusively from Rezku.
Hoppy the {H}ttp {O}tions {P}rober in {PY}thon checks the availability of http methods on a specified server. It will probe these methods to see if they are active and in some cases disclose configuration issues leaking system information
Identityflow provides a framework for building protocol flows that perform distributed Identity operations. Examples of Identity Operations are Single Sign-On (SSO) and Attribute queries.
JMS Assurance Integration Kit (JAIK) is a collection of Java APIs that allows Java developers to transparently incorporate assurance into JMS messages while wrapping JMS connectivity.
Security for usb flash drives. Uses basic encryption to make sure your data is safe, on all platforms. This application is written in C++, GUI is still to be considered. PRE-ALPHA STAGE, DO NOT USE ON IMPORTANT DATA!
Teradata VantageCloud Enterprise is a data analytics platform for performing advanced analytics on AWS, Azure, and Google Cloud.
Power faster innovation with Teradata VantageCloud
VantageCloud is the complete cloud analytics and data platform, delivering harmonized data and Trusted AI for all. Built for performance, flexibility, and openness, VantageCloud enables organizations to unify diverse data sources, run complex analytics, and deploy AI models—all within a single, scalable platform.
PHP security system that protect your web applications adding on your source ONLY ONE LINE OF CODE! Administrators can manage policies, authentication and authorisation for as many users and groups, all through a single and intuitive Ajax based interface
Pure managed C# implementation of well-known cryptographic hash functions such as SHA-family (SHA0, SHA1, SHA2), MD-family (MD2, MD4, MD5), RIPEMD, Tiger, Haval, Snefru and others.
Moved to Github: https://github.com/AndreyRusyaev/acryptohashnet
A reverse HTTP shell to execute commands on remote machines behind firewalls. Once you run the script on the target machine, it periodically polls its designated server for commands to execute. Traffic traverses firewall as outgoing GET/POST requests.
The Most Powerful Software Platform for EHSQ and ESG Management
Addresses the needs of small businesses and large global organizations with thousands of users in multiple locations.
Choose from a complete set of software solutions across EHSQ that address all aspects of top performing Environmental, Health and Safety, and Quality management programs.
Talos is an environment-agnostic authorization engine that uses the most expressive API you can find, so you can write authorization statements in code that reads almost like english.
SecureSqueak is a fork of Squeak Smalltalk (http://www.squeak.org/) which is designed to be able to run remotely loaded, untrusted bytecodes in a secure sandbox.
Orizon is a framework intended to provide tools and facilities to test java sources for security flaws. The main goal is to detect common threats as described in Owasp top 10 vulnerability document.
PFL can either operate as a stand-alone firewall log parser or set up to run and configure ipfw. The major focus is parsing, compressing, and filtering *NIX (to include Mac OSX) firewall logs generated by IPFW for quick and easy admin review.
Originally made to crack /etc/passwd files from *nix utilizing the GPU. Uses GLSL and OpenGL. Acts as a parallel to John the Ripper, but for the GPU. Supports both ATI and nVidia, anywhere OpenGL can run.
SQLPrevent, implemented in J2EE, is an effective and efficient tool for detecting and preventing known as well as unseen SQL injection attacks without efforts from web developers.
It provides fast connections to Linux/Unix hosts over SSH protocol. You don't need to remember the IP address, hostname, login, or password. Just select server from the list and press "Connect".
To run fortify scan using fortify software, we are using apache-ant till now . There is no maven plugin for fortify.
So i wrote a maven plugin which will do all tasks similar to ant such as fortify parse,scan and clean etc.
This is a simple ANSI-C implementation of Triple-DES (as described in NIST Special Publication 800-67.) This implementation also includes an 8-bit version that can be used in microcontrollers with memory constraints.
This tool provides the same interface as a SiteErrorLog but provides the ability to specify who should receive error emails, what error emails are sent, and extra information to put in the headers of the error emails to provide easier mail filtering.
This tool encrypts text using polyalphabetic codetables, like the encryption systems in the middle ages. It can be used for simple text encryption with a small password or as a One-Time-Pad with a random codetable for 100% secure text encryption.
Java based Portable hashing application capable of multiple individual file signatures or proprietary group signatures (1 signature for a folder and all its contents). GUI and command line in the same executable. -sha1 -sha256 -sha51 -md5 -crc32
BioWebAuth (Biometrics for Web Authentication) is an opensourceJava framework intended to provide single sign-on web authentication based on BioAPI-compliant biometric software or devices. It uses the JA-SIG Central Authentication Service architecture.