Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
Try Retool free
Find Hidden Risks in Windows Task Scheduler
Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.
Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
Qryptix consists of a PAM object and utilities for session- and key-management for encrypted home directories using the International Kernel (CryptoAPI) patches for Linux. It simplifies login/logout, mounting/unmounting, and key generation and changing.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
This is a Shell Script. It transform the logs of the linux in HTML pages, with colored erros.
I dont speak english very well but I think... the name explain everything. the name of the script is LOGhtmlER.
UnityCA is a Certificate Authority "front end" based on the Community-Oriented CA (COCA) model, which was primarily developed for non-profit "free CAs." Organizational and end-user interfaces provide trusted web management of the installed CA (eg ElyCA).
This is a powerful packet monitor program like sniffer that runs under linux's text mode . Its functionalities include the ip/non-ip retrieval and monitor from data-link layer to application layer
It's a modern take on desktop management that can be scaled as per organizational needs.
Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
Fingerprint Laboratory - a portable and layered package of libraries and tools for academic research and productive use that allows people to easily integrate Automatic Fingerprint Recognition technology into their software or system with little know-how.
Automated Security Tools (autosec) aims to provide
automatic tools which network administrators may use
to help check and test the security of their network.
Shoki is a free, opensource network intrusion detection system. The fundamental design goals are simplicity and modularity, and the focus is on traffic analysis rather than content inspection.
Tool to analyse syslog message. It parses log message and alerts the administrator on certain conditions. It can also do some reporting on existing logs.
Logcheck is software package that is designed to automatically run and check
system log files for security violations and unusual activity. Logcheck
utilizes a program called logtail that remembers the last position it read
from in a log file.
Live Security/Forensics Linux Distribution, built from scratch and packed full of tools useful for vulnerability analysis, penetration tests, and forensic analysis.
Bait and Switch combines IDS tech (Snort primarily) and Honeypots into a new, more valuable, reactive system. After receiving an alert, B&S protects your server by silently redirecting hostile traffic to a honeypot while leaving other traffic alone.
FreePFW is a web interface to IPFW firewall on FreeBSD servers. It allows authorized users, from authorized hosts changing *specific* rules at the firewall, granting remote access to the server.
ExamLog is a Log analyzer, developed for syslog messages. It works on a Unix/Linux console, searching for user defined patterns. ExamLog, can divide and clasify syslog messages, and send them to a remote/local postgresql DataBase.
IAN (I Am Normal) is used to minimize the chance of an attacker successfully fingerprinting a honeypot. This is accomplished by creating bogus data and history files, alter creation and modification times, add users, patch x number of programs, etc.