Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
Explore Apify Store
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
This is a apache v2.0 authentication module. Based on html form authentication and cookie authentication session. Cookie session are stored in memcache deamon. Can be used has an simple "Single Signe-On" (SSO).
All the code source and the bug tracking has migrated to github:
https://github.com/ZenProjects/Apache-Authmemcookie-Module
All the documentation are here:
https://zenprojects.github.io/Apache-Authmemcookie-Module/
The WiKID Strong Authentication System is a public-key based two-factor authentication system. It is a flexible, extensible, and secure alternative to tokens, certs and passwords. Application & API support exists for Java, ASP, PHP, Ruby, OpenVPN, TACACS+, etc.
Read our eGuide on how to setup your network with two-factor authentication: http://www.wikidsystems.com/learn-more/two-factor-authentication-white-papers
Framework for making Windows applications that are one .exe file in AutoHotKey_L,C++,C#, VB.NET,Java,Groovy,Common Lisp,Nemerle,Ruby,Python,PHP,Lua,Tcl,Perl,Jint,S#,WSH VBScript,HTML/JavaScript/CSS,COM, PowerShell without compiling . For .NET 4.
Paglo Crawler discovers all devices connected to a network - including workstations, servers, switches, routers, printers, etc and gathers rich information about each device. This information is then searchable through an account at http://paglo.com/
Ruby/LDAP is an extension library for Ruby. It provides the interface to some LDAP libraries (e.g. OpenLDAP, Netscape SDK and Active Directory). The common API for application development is described in RFC1823 and is supported by Ruby/LDAP.
RogueScanner is a network security tool for automatically discovering rogue wireless access points by scanning a wired network. In addition to finding access points, it will classify all discovered network devices
This tool runs as a window service to start and stop rails server on a path and port specified in the .config "C:|Program Files|MA|Rails App Launcher" file on the windows OS.
slink-n-up is a one-stop dashboard of your Linux servers' status. You can immediately see any problems, such as: network connectivity loss, service outages, and so forth. Performing changes to all the servers at once is effortlessly handled.
Ruby/MaxL is a portable extension module for the Ruby scripting language that allows Hyperion Essbase MaxL statements to be executed from within a Ruby program.
OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.
Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
Lucie enables parallel network installation of large numbers of nodes from one single administration server. It is designed to be scalable and efficient, so a complete Linux cluster can be built from scratch in a short amount of time.
The purpose of SNX is to have a modular series of components that report back to a central repository and 'AI' for pattern recognition and anomoly detection. This is to help with IDS systems, and to move to the next generation of security.
A software distribution based on Debian/Linux to provide network diagnostics, security monitoring and intrusion detection. The distribution can be easily installed by office personnell.
LinuxBSM-2 introduces auditing features in Linux kernel to achieve better security and keep an eye on system activities.
Any kernel-derived data can be audited.