Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Learn More
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
The Orchestrator server is responsible for distribution and launch of simple apply/rollback shell scripts in a particular order across multiple servers . If for any reason deployment is failing at a particular stage the process will stop and you can rollback any changes done until then.
In case you want to deploy your code or just call your preferred DSC client to apply the configuration locally the Orchestrator can be a handy tool.
The operation can be started manually or scheduled,...
Do you know all devices connected to your IT network ? Do you know which software or hardware component is installed on a computer ? Are you able to deploy softwares or configuration scripts on your computers ? No, then Try OCS Inventory NG at http://www.ocsinventory-ng.org...
Advisory Check is a tool for monitoring the security of installed software.
It gathers security advisories using RSS/RDF/XML feeds, compares them against a list of known software, and alerts you if you're vulnerable.
Let advchk read advisories for you!
Software repository of the hack://src project. Includes security related software for crypto, vulnerability/patch notification & management, and ultra low level system access for stealth forensics & intrusion detection or malware removal.
Multiple Remote SHell Management On Demand aids in the management of multiple systems via SSH and shared keys. In its simplest form one can run one script on multiple systems returning and logging stdout and stderr for each system on demand.
ATC is a system for configuring and controlling the pre and post building of Unix machines over the network. Predominately it uses JET to deploy Solaris hosts and Kickstart to deploy Linux hosts. Post build ATC is used to do configuration control.