Stop wasting engineering hours. Build secure, production-grade apps that connect directly to your company’s SQL and APIs.
Create internal software that meets enterprise security standards. Retool connects to your business data—databases, APIs, and vector stores while ensuring compliance with granular permissions and audit logs. Whether on our cloud or self-hosted, build the dashboards and admin panels your organization needs without compromising on security or control.
Learn More
Find Hidden Risks in Windows Task Scheduler
Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.
Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
A set of tools (command line and GUI) to provide a complete digital photo workflow for Unixes. EXIF headers are used as the central information repository, so users may change their software at any time without loosing any data.
A simple application that renames files from one extension to another
As a PHP developer I often find myself presented with a website where all the files are with a .html extension and I either have to manually rename all of the files or mess around with a shell. This tiny but powerful app takes away all that hassle.
Adds a message authentication code (MAC) to a file
A tiny command line program to create a secure file authentication code and verifier. This can be used to verify if a file has been altered or modified by a 3rd party.
Monolith (lith) is a tiny, java-based embedded file-system like implementation. It allows you to store and retreive multiple sets of named data in a single file and access it without the speed costs typically associated with file archives.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.