Showing 2 open source projects for "linux command line"

View related business solutions
  • Finance Automation that puts you in charge Icon
    Finance Automation that puts you in charge

    Tipalti delivers smart payables that elevate modern business.

    Our robust pre-built connectors and our no-code, drag-and-drop interface makes it easy and fast to automatically sync vendors, invoices, and invoice payment data between Tipalti and your ERP or accounting software.
  • A powerful, white-label, seamlessly embedded, and easily integrated reporting and dashboard solution Icon
    A powerful, white-label, seamlessly embedded, and easily integrated reporting and dashboard solution

    For companies that want to elevate their reporting journey effortlessly with dReveal’s desktop authoring tools.

    A powerful, white-label, seamlessly embedded, and easily integrated reporting and dashboard solution, resulting from 20+ years of design development, targeted user feedback from internal auditors, and extensive GRC/audit management expertise. Thousands of users, from thousands of companies, benefit from using dReveal's highly customizable state-of-the-art reporting tools to easily transform their unrelated data into valuable internal audit management reports and dashboards.
  • 1
    Sn1per

    Sn1per

    Attack Surface Management Platform | Sn1perSecurity LLC

    Sn1per Professional is an all-in-one offensive security platform that provides a comprehensive view of your internal and external attack surface and offers an asset risk scoring system to prioritize, reduce, and manage risk. With Sn1per Professional, you can discover the attack surface and continuously monitor it for changes. It integrates with the leading open source and commercial security testing tools for a unified view of your data.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 2
    PAVS

    PAVS

    PHP Application Vulnerability Scanner

    PAVS scans the PHP based web application source code and identifies the potential security problems in that application. PAVS also identifies the loop holes in PHP configuration file settings. Attacks addressed by PAVS are Cross-site Scripting SQL Injection File Manipulation File Inclusion Command Execution Code Evaluation
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next