Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.
Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
Explore 10,000+ tools
Total Network Visibility for Network Engineers and IT Managers
Network monitoring and troubleshooting is hard. TotalView makes it easy.
This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
JSecureTunneling is a Java SSH client that is entirely oriented in the management of SSH tunnels, offering the ability to establish secure and permanent tunnels to a remote SSH server, transparently just like a simple network connection.
Provides efficient, effective implementations of 32- and 64-bit hash functions based on Rabin fingerprints / irreducible polynomials, in Java. Also provides integration with java.security.MessageDigest API.
Java Mechanic can modify public, private and protected fields and activate methods of live running apps. Also decompiles,or saves any objects or source code. Using a built in java code interpreter, objects can be created on the fly. Contains many tools.
Dun and Bradstreet Risk Analytics - Supplier Intelligence
Use an AI-powered solution for supply and compliance teams who want to mitigate costly supplier risks intelligently.
Risk, procurement, and compliance teams across the globe are under pressure to deal with geopolitical and business risks. Third-party risk exposure is impacted by rapidly scaling complexity in domestic and cross-border businesses, along with complicated and diverse regulations. It is extremely important for companies to proactively manage their third-party relationships. An AI-powered solution to mitigate and monitor counterparty risks on a continuous basis, this cutting-edge platform is powered by D&B’s Data Cloud with 520M+ Global Business Records and 2B+ yearly updates for third-party risk insights. With high-risk procurement alerts and multibillion match points, D&B Risk Analytics leverages best-in-class risk data to help drive informed decisions. Perform quick and comprehensive screening, using intelligent workflows. Receive ongoing alerts of key business indicators and disruptions.
ODESSA - The Open Digital Evidence Search and Seizure Architecture is a cross-platform framework for performing Computer Forensics and Incident Response.
Execution monitor for Java Applications.<br/>
BERSERK implements the Intercepting Filter design pattern. <br/>
Allows composing and runtime editing of execution flow and intercept services with access control, logging or any user-defined filters.
J2MESafe is an end-user Java application that stores sensitive information like passwords on mobile phones with strong encryption. Requires Java Micro Edition (J2ME) with MIDP-1.0, which is available on most current mobile phones.
Sniffer Server - decodes TCP streams and captures packets in general
The captured content may be saved to files or sent to a client over TCP/IP connection (self-defined protocol)
DAT Freight and Analytics operates DAT One truckload freight marketplace
DAT Freight & Analytics operates DAT One, North America’s largest truckload freight marketplace; DAT iQ, the industry’s leading freight data analytics service; and Trucker Tools, the leader in load visibility. Shippers, transportation brokers, carriers, news organizations, and industry analysts rely on DAT for market trends and data insights, informed by nearly 700,000 daily load posts and a database exceeding $1 trillion in freight market transactions. Founded in 1978, DAT is a business unit of Roper Technologies (Nasdaq: ROP), a constituent of the Nasdaq 100, S&P 500, and Fortune 1000. Headquartered in Beaverton, Ore., DAT continues to set the standard for innovation in the trucking and logistics industry.
A full-featured, Java-based back-office suite specifically designed for use in global financial institutions to facilitate straight-through-processing and other much-needed operational efficiencies. Built using best-of-breed, open-source technologies.
This project provides an interface to Sun's JCE (Java Cryptographic Extensions) as a JSP taglib. It brings strong encryption algorithms such as AES and Blowfish to your JSP applications. It uses the bouncycastle.org cleanroom JCE 1.2.1 implementation as
This library extends SUN's JavaMail API by an PGPMime framework. It acts as a middleware layer between a cryptography provider like GnuPG or Cryptix OpenPGP Provider and JavaMail.
TLogin is a java login applet for tomcat that uses a database to track login attempts and the source of those attempts. Tlogin provides features for preventing web based password guessing attack by placing temporary locks on the account after every fail
SWM (Secure WebMail) is an applet that provides confidentiallity and authentication in webmail applications using SHA/RSA algorithms. It can accompany virtually every webmail application, but comes with a plugin for squirrelmail and can run standalone.
A distributed Java implementation of the VISA 3-D Secure(tm) Merchant Server Plug-in (MPI) that allows e-commerce web site to perform payment authentication operations for Internet purchases.
The Entitlements Library provides for the enforcement and administration of application software entitlements or permissions. The Administration component permits the creation of roles and is Servlet based.
Stinger is a Java validation engine for HTTP requests. Deploy it as a J2EE filter or integrated into servlets and JSPs. Specify simple regex-based rules in XML-based Security Validation Description Language (SVDL). Flexible logging and error handling.
Secrets is a complete, standalone, personal encryption solution that works much like PGP (Pretty Good Privacy). With Secrets you can encrypt information before emailing it to a friend or coworker, or before storing it on a removable disk. Secrets is buil