Start from a prompt and build production-ready apps on your data—with security, permissions, and compliance built in.
Vibe coding tools create cool demos, but Retool helps you build software your company can actually use. Generate internal apps that connect directly to your data—deployed in your cloud with enterprise security from day one. Build dashboards, admin panels, and workflows with granular permissions already in place. Stop prototyping and ship on a platform that actually passes security review.
Build apps that ship
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
WinSCP is a free SFTP, SCP, S3, WebDAV, and FTP client for Windows.
WinSCP is a popular free file manager for Windows supporting SFTP, FTP, FTPS, SCP, S3, WebDAV and local-to-local file transfers. A powerful tool to enhance your productivity with a user-friendly interface and automation options like .NET assembly or batch file scripting. Use WinSCP also for file editing, directory synchronization and site management. WinSCP is open-source and well documented.
...With so many passwords to remember and the need to vary passwords to protect your valuable data, it’s nice to have KeePass to manage your passwords in a secure way. KeePass puts all your passwords in a highly encrypted database and locks them with one master key or a key file. As a result, you only have to remember one single master password or select the key file to unlock the whole database. And the databases are encrypted using the best and most secure encryption algorithms currently known, AES and Twofish. See our features page for details.
FileVerifier++ is a Windows utility for calculating hashes using a number of algorithms including CRC32, MD5, SHA-1, SHA-256/224/384/512, WHIRLPOOL, and RIPEMD-128/160/256/320. Supported hash file formats include MD5SUM .MD5, SFV, BSD CKSUM, and others.
ATTENTION: Snare Lite is unsupported legacy software. While it will remain a part of the SourceForge community, it is no longer secure and compliant. For up to date Snare software check out Snare Enterprise.
https://www.snaresolutions.com/try-snare-for-free/
Snare Enterprise was created to keep up with the fast paced security software market. It started with the desire to create premium logging and SIEM tools that were agnostic by nature so they could be used to boost any SIEM...
The OVAL Interpreter is a freely available reference implementation that demonstrates the evaluation of OVAL Definitions. Based on a set of OVAL Definitions the interpreter collects system information, evaluates it, and generates a detailed OVAL Results file.
Developed to demonstrate the usability of OVAL Definitions and to ensure correct syntax and adherence to the OVAL Schemas by definition writers, it is not a fully functional scanning tool nor an enterprise scanning tool. It is a simplistic, command-line application that has the ability to execute OVAL Content on an end system. ...
NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows that can detect the OS, hostname and open ports of network hosts through packet sniffing or by parsing a PCAP file. NetworkMiner can also extract transmitted files from network traffic.
New versions of NetworkMiner are released exclusively on www.netresec.com since version 2.0 of NetworkMiner. This page on SourceForge is only kept to provide hosting of older versions of the software.
To get the latest version of NetworkMiner, please visit:
http://www.netresec.com/?...
File system/directory monitoring utilities with loggin and task processing support (can execute files or make a WCF service call). Multiple configuration options. Source code libraries can be used to create a custom file system monitor.
Certificate-helper is a utility desktop application written in Java designed and created to assist (mainly developers) in creating and viewing keystores and digital certificates. This is done via a user interfaces implemented in Swing.
Dir2Encrypt encrypt a folder with privat files and subfolders into a single password protected archive file. The archive file can be a zip file or a self extracting exe file. Microsoft Net Framwork 2 has to be installed.
Yeastar: Business Phone System and Unified Communications
Go beyond just a PBX with all communications integrated as one.
User-friendly, optimized, and scalable, the Yeastar P-Series Phone System redefines business connectivity by bringing together calling, meetings, omnichannel messaging, and integrations in one simple platform—removing the limitations of distance, platforms, and systems.
A set of tools for querying and modifying the ACL's (access control lists) and ACE's (access control entries) of files, services, registry keys, printers, processes, threads, timers, mutexes, tokens, events, and semaphores in Windows 2000 and later
JMassLogProcess is an next generation SIEM solution, based on high performance syslog and snmp trap collector(up to 20,000 logs/s),Distributed File System(Hadoop),Complex Event Processing Engine and ZK …….
Derived from TrueCrypt 6.3 release, I added some command line options to "TrueCrypt Format.exe" to allow TrueCrypt volumes to be created without using the graphical user interface
Set of perl scripts to analyse and check expiration of user certificates in Microsoft Windows Certification Authority. Output is in HTML with list of expiration state of latest user certificates. Expirated are marked. List can be sent by e-mail.
Power Hasher is a program that allow you to get the hash code of multiple files at once, and export the results to a file, making easy for this file to be imported and the files checked. Currently it supports MD5, SHA1, SHA256, SHA384 and SHA512.
RAS-SMS is a simple extension to Microsoft's Remote Access Service (RAS). RAS-SMS adds two factor authentication to standard VPN/PPTP clients on Windows, Mac-OS and Linux. RAS-SMS uses your mobile phone instead of smart cards, RSA keys or USB tokens.
Corporate Data Protection and Network Security is a IT project targeting policy-based and fully-automated data protection, encryption and transmission. We plan to create self-diagnostic risk-predict enterprise environment with artificial intelligence.
JavaLightServer is a multi-purpose server that can be used to share our desktop across the Internet with other authorized clients. It provides also a secure connection using SSL certificates.
Cnc's IP Data Volume Report:
Logs IP to IP contact, number of packets, bytes, time of contact, Ethernet too!
View via local web interface.
Very simple for those who want to view who your computer is contacting the most!
Cryptology is a Windows shell application that enables users to easily protect their files. It incorporates military grade encryption (256 AES) and secure shredding into a simple user interface
A.L.A.R.M. is A Laptop A/C Removal Monitor for Windows XP and later. If your workstation is locked and A/C power is being removed, it loudly plays a warning signal for theft protection. Slim, sound file can be specified.
TC-Wrapper is a Windows service which opens/closes TrueCrypt containers automatically using an USB-Stick with a key file. Containers are even mounted if you are not logged into your system.
ITkeys automates the security management process for Windows networks (Active Directory groups). Delegates the ability to amend relevant IT access for employees to their managers. Wizzard based web tool requiring no formal training. No more ADUC MMC!
Fingerprint Copy is a forensic copy utility. The utility creates copy of file(s) and verifies this copies with digital fingerprints(checksum) of the source file(s). The utility is in a early development state. Planed: March 2009 First Command-line Utiliy