Business Software for GitHub - Page 59

Top Software that integrates with GitHub as of August 2025 - Page 59

GitHub Clear Filters
  • 1
    HuLoop

    HuLoop

    HuLoop

    Get data-driven recommendations on your people, processes, and technologies. Set up automation of complex business processes, across disparate systems and data. Automate repetitive tasks to perform testing that is difficult to do manually. HuLoop platform creates, deploys, and manages intelligent agents as a digital workforce to perform repetitive tasks your people should no longer do. HuLoop digital agents can help you lower costs, improve productivity, and increase the job satisfaction of people across your organization. Helps you see, understand, and change your capabilities, as well as understand how your people, processes, and technologies interact. Automation and orchestration of complex business processes, across disparate systems and data, minimizing human dependency. Controls and executes tests and verifies expected outcomes. Automates repetitive tasks and performs testing that is difficult to do manually.
  • 2
    Sui

    Sui

    Sui Foundation

    Sui is a blockchain built from the ground up to provide a seamless and user-friendly experience for all its users. One of the main features of the Sui network is its ability to support the creation of rich and dynamic on-chain assets while also offering instant settlement and high throughput. In turn, the Sui network is a highly scalable and secure blockchain platform that makes digital asset ownership and management accessible to everyone. Assets are stored securely on chain, evolving with the needs of users. Sui offers what games built on blockchain require, well-rounded functionality, abstraction, scalability, speed, and affordability. Dynamic assets increase engagement and customizable transfer policies offer control. Network capacity expands to meet demand, growing with your business not against it. Sui community events provide opportunities to connect, network, and share ideas.
  • 3
    Ema

    Ema

    Ema

    Meet Ema, a universal AI employee who boosts productivity across every role in your organization. She is simple to use, trusted, and accurate. Ema’s the missing operating system that makes generative AI work at an enterprise level. Using a proprietary generative workflow engine, Ema automates complex workflows with a simple conversation. She is trusted, and compliant and keeps your data safe. EmaFusion model combines the outputs from the best models (public large language models and custom private models) to amplify productivity with unrivaled accuracy. We believe everyone could contribute more if there were fewer repetitive tasks and more time for creative thinking. Gen AI offers an unprecedented opportunity to enable this. Ema connects seamlessly with hundreds of enterprise apps, with no learning curve. Ema can work with the guts of your organization, documents, logs, data, code, and policies.
  • 4
    SiLogy

    SiLogy

    SiLogy

    Our next-generation web platform empowers chip developers and verification engineers to design and debug 10x faster. Build and run thousands of tests in parallel at the push of a button with Verilator. Seamlessly share test results and waveforms with anyone in your organization, tag coworkers directly on signals, track test and regression failures. We use Verilator to compile Dockerized simulation binaries and distribute test runs across our compute cluster. Then we collect the results and log files and optionally rerun failing tests to generate waveforms. With Docker, we can ensure that test runs are consistent and reproducible. SiLogy makes chip developers more productive by enabling faster design and debug times. Before SiLogy, the state-of-the-art for debugging a failing test involved copying lines from log files, debugging from waveforms on a local machine, or rerunning a simulation that might have taken days to run.
  • 5
    BREVIAN

    BREVIAN

    BREVIAN

    AI agent that understands data from your ticketing systems, CRMs, knowledge bases and release notes, and assists your support teams to resolve tickets faster. Automate routing tickets to the right team based on ticket content. Go from reactive support to proactive support by detecting emerging issues earlier. Categorize tickets into common topics and trends, and improve knowledge bases to reduce ticket volume. BREVIAN AI agents have security and safety built-in, so you don’t need to integrate different products to be enterprise-ready. Implement consistent controls independent of your data and models. Business teams can even combine different agents to build an intelligent network across their enterprise data. Knowledge extraction for structured and unstructured data including images.
  • 6
    Lutra

    Lutra

    Lutra

    Lutra is an AI Agent for web research that is natively connected with popular apps you use such as Airtable, HubSpot, Google Sheets, Gmail, and Outlook. It is able to orchestrate tasks across multiple apps, use AI to process data, and can be integrated into your custom Enterprise stack. It is SOC2 certified, ensuring a high degree of data security and reliability. Teams can automate prospecting, outreach, and marketing tasks efficiently - saving time and increasing productivity. Use cases include: - Performing web research over a large list of accounts, and directly updating your CRM. - Identifying key decision makers once you have an account identified. - Extracting lists of information from websites. - Reading and processing emails to extract data for tracking. and more!
  • 7
    Momentic

    Momentic

    Momentic

    We make AI do the heavy lifting for you, finding elements, reasoning about assertions, visual comparisons, and even generating whole tests. Instead of XPath or CSS selectors, our AI locates elements based on their visual appearance and accessibility attributes. Craft assertions from any logical statement or visual condition. Record your interactions and let Momentic generate the test for you. Use the Momentic app to create and run tests locally as you develop. No need to deploy your app. Save Momentic tests in your codebase and keep them in sync during development. Momentic automatically tracks in-flight requests and waits for them to complete. Run arbitrary JavaScript to set up the environment for a test, you have access to libraries like Moment and Axios.
  • 8
    Plandex

    Plandex

    Plandex

    An open source, terminal-based AI coding engine that helps you complete large tasks, work around bad output, and maximize productivity. Plandex uses long-running agents to complete tasks that span multiple files and require many steps. It breaks up large tasks into smaller subtasks, then implements each one, continuing until it finishes the job. It helps you churn through your backlog, work with unfamiliar technologies, get unstuck, and spend less time on the boring stuff. Changes are accumulated in a protected sandbox so that you can review them before automatically applying them to your project files. Built-in version control allows you to easily go backwards and try a different approach. Branches allow you to try multiple approaches and compare the results.
  • 9
    Markprompt

    Markprompt

    Markprompt

    Handle more support volume by giving your team AI superpowers instead of increasing headcount. Markprompt fits in at all touch points in the agent and customer journey. Bring customer support to the next level by deeply integrating it into your product and across touch points. With our REST APIs, JavaScript libraries, and headless React components, you can build customer support as an integral part of the user experience. Give your customer support team the tools they need to automate the mundane, so they can focus on what matters, delighting customers. Configure the instructions, behavior, and design of your chatbots and agent apps, and experiment with them in a playground environment before deploying. Learn how your customers and agents interact with your AI apps to spot deficiencies in your knowledge and address them.
  • 10
    BlueFlag Security

    BlueFlag Security

    BlueFlag Security

    BlueFlag Security provides multi-layer defense, protecting developer identities and their tools throughout the software development lifecycle (SDLC). Don't let uncontrolled developer and machine identities become the Achilles' heel of your software supply chain. Weaknesses in these identities create a backdoor for attackers. BlueFlag seamlessly integrates identity security across the SDLC safeguarding your code, tools, and infrastructure. BlueFlag automates the rightsizing of permissions for developer and machine identities, enforcing the principle of least privilege throughout the dev environment. BlueFlag enforces strong identity hygiene by deactivating off-boarded users, managing personal access tokens, and restricting direct access to developer tools and repositories. BlueFlag's ensures early detection and prevention of insider threats and unauthorized privileged escalation by continuously monitoring behavior patterns across the CI/CD.
  • 11
    Tarsal

    Tarsal

    Tarsal

    Tarsal's infinite scalability means as your organization grows, Tarsal grows with you. Tarsal makes it easy for you to switch where you're sending data - today's SIEM data is tomorrow's data lake data; all with one click. Keep your SIEM and gradually migrate analytics over to a data lake. You don't have to rip anything out to use Tarsal. Some analytics just won't run on your SIEM. Use Tarsal to have query-ready data on a data lake. Your SIEM is one of the biggest line items in your budget. Use Tarsal to send some of that data to your data lake. Tarsal is the first highly scalable ETL data pipeline built for security teams. Easily exfil terabytes of data in just just a few clicks, with instant normalization, and route that data to your desired destination.
  • 12
    SandboxAQ

    SandboxAQ

    SandboxAQ

    The emergence of large, fault-tolerant quantum computers poses a significant threat to current public-key cryptography, leaving sensitive data and systems vulnerable to attacks. SandboxAQ was selected by the NIST's National Cybersecurity Center of Excellence for its Migration to Post-Quantum Cryptography project, which partners with industry to help the government develop best practices to transition from current public-key cryptography to post-quantum cryptography algorithms. Easily adhere to new cryptographic requirements and switch between them without requiring additional development or maintenance. Application Analyzer detects and records all calls to cryptographic libraries made by an application at run time, identifying vulnerabilities and policy breaches.
  • 13
    Atlassian Rovo
    Powered by generative AI to help teams make better decisions and reach their goals faster. Rovo helps your teams find information across all their selected SaaS apps, learn and iterate on knowledge as they work, and act faster with virtual agents. Data is scattered across your organization and just keeps growing. Rovo brings you the most relevant results across all your selected SaaS apps, right where you work. It can take a lot of questions to get a deep understanding of organizational topics. Interact with Rovo chat, get connected to the right teams, and uncover critical insights until you feel like you know it all. Even high-performing teams can use a helping hand. Rovo Agents understand complex tasks, taking the right actions to get you to the finish line. Use specialized agents out-of-the-box, from the Atlassian marketplace or quickly build your own. Generate, review, and refine content for all types of communications, product specs, goal setting, and more.
  • 14
    Trag

    Trag

    Trag

    Empower engineering teams to save time and focus on what they do best, which is building products. Create your own patterns, and describe what you will look like while reviewing, Trag will do it before you jump in. Create rules for your use cases for your team, as many as you want, as thorough as you want. Monitor the progress, all the failing rules can be recovered by our AI. We never commit directly, you will get PR with the fix. Connect multiple repositories, multiple repositories at your hand. Invite and collaborate with your teammates. Trag will automatically review PRs with written patterns. Monitor pull request analytics and make faster, better decisions. Write your own patterns using natural language. Trag will automatically match rules with the PR changes and will automatically fix them. Every single piece of data is encrypted and secure, we never commit directly, only through PRs, and we don't use your code for any development purposes.
  • 15
    Anon

    Anon

    Anon

    Anon offers two powerful ways to integrate your applications with services that lack APIs, enabling you to build innovative solutions and automate workflows like never before. The API packages pre-built automation on popular services that don’t offer APIs and are the simplest way to use Anon. The toolkit to build user-permissions integrations for sites without APIs. Using Anon, developers can enable agents to authenticate and take actions on behalf of users across the most popular sites on the internet. Programmatically interact with the most popular messaging services. The runtime SDK is an authentication toolkit that lets AI agent developers build their own integrations on popular services that don’t offer APIs. Anon simplifies the work of building and maintaining user-permission integrations across platforms, languages, auth types, and services. We build the annoying infra so you can build amazing apps.
  • 16
    Vorlon

    Vorlon

    Vorlon

    Continuous near real-time detection and identification of your data in motion between third-party apps with remediation capabilities. By not continuously monitoring third-party APIs, you inadvertently grant attackers an average of seven months to act before you detect and remediate an issue. Vorlon continuously monitors your third-party applications and detects abnormal behavior in near real-time, processing your data every hour. Understand your risks in the third-party apps your Enterprise uses with clear insights and recommendations. Report progress to your stakeholders and board with confidence. Gain visibility into your third-party apps. Detect, investigate, and respond to abnormal third-party app activity, data breaches, and security incidents in near real-time. Determine whether the third-party apps your Enterprise uses are compliant with regulations. Provide proof of compliance to stakeholders with confidence.
  • 17
    Aftra

    Aftra

    Aftra

    Gain valuable insights, protect sensitive data, and strengthen your defenses with our automated scanning, monitoring, and continuous vulnerability detection. Aftra provides the insight; you steer the course. Safeguard your reputation, trust, and assets. Aftra illuminates what needs protection. Aftra is your ally in the fight against cyber threats. Proactive, insightful, and empowering. Aftra empowers you with insights and tools to secure your digital assets, so you can make informed decisions and bolster your defenses with confidence. Aftra offers a comprehensive view of both internal and external digital assets, providing invaluable insights for making informed security decisions. Aftra identifies both known and unknown domains and accounts associated with your organization. Aftra actively suggests domains and accounts that may belong to your organization. Aftra reveals the services and accounts used by your company and identifies employee digital footprints on third-party platforms.
  • 18
    HASH

    HASH

    HASH

    HASH is the open-source platform for decision-making, combining knowledge capture and modeling tools with fast, effective, distributed simulation of complex systems. We're on a mission to eliminate information failure and help everybody make the right decisions.
  • 19
    SecureFlag

    SecureFlag

    SecureFlag

    SecureFlag’s hands-on training in real development environments offers a tailored approach to enterprise training needs. 45+ technologies supported and over 150 vulnerability types covered. Each comprises a fully configured development environment. With more than 70% of vulnerabilities introduced during development, writing secure software is more critical than ever. SecureFlag has revolutionized the approach to secure coding training. With SecureFlag’s hands-on labs, participants learn in virtualized environments using the tools they know and love. SecureFlag’s Labs teaches participants how to identify and remediate the most prevalent security issues by doing instead of simply just seeing. Labs run in real, virtualized development environments, and participants learn using the same tools they use at work. Engage with your organization’s developer community and promote learning through enjoyable competition.
  • 20
    Spike

    Spike

    Spike

    Connect your app to users’ real-time data from 300+ devices via a single API. Make that data usable with our white-label AI/ML services. One API with access to all the major wearable and IoT providers. Start testing right away with our easy-to-implement and well-documented API and shorten your development cycles. Enhance the functionality and UX of your application. Deliver personalized insights and increase user retention. Access wearables data in both raw and structured/normalized format while we maintain provider API upgrades, monitor new sensor releases, and API version control so that you don’t have to. Connect to Spike from any platform of your choice with as little as a few lines of code. Receive data that makes sense in an easily digestible format. Leave all that boilerplate management to us and concentrate on building value for your users. Spike technology, REST API end-points, and cloud architecture are designed with data privacy and security at heart.
  • 21
    Tracebit

    Tracebit

    Tracebit

    Tracebit generates and maintains tailored canary resources in your cloud environments, closing gaps in stock protection without time and cost intensive detection engineering. Tracebit generates and maintains dynamic cloud canaries. Tracebit alerts have inherent context that can be understood and actioned by the whole team. We cover a full and growing range of cloud resources, and continue to evolve and refresh your canaries instep with your environment to constantly keep your adversaries guessing. Leverage our infrastructure as code integration and automated canary recommendations to scale our cloud canaries across your estate rapidly.
  • 22
    Leo

    Leo

    Leo

    Choose an inbound assistant or an outbound one that activates on events, like new lead submissions, or on a schedule. Connect your assistant to our integrations and select desired capabilities. our AI phone assistant is ready to start making and receiving calls. Feel free to create as many assistants as you need. Instantly implement your workflows, and have your AI phone assistant ready in under 2 minutes. Each phone agent is tailored with a knowledge base and tools designed exclusively for your needs and use case. No more spending weeks on rep training. Enjoy complete customizability from selecting voices and defining prompts to choosing LLMs. Our phone agents are available around the clock, 24/7/365, whether handling incoming or outgoing calls. Allow callers to request a transfer to a human representative at any moment during the call. Every call is recorded (unless you prefer otherwise), allowing you to travel back in time and review it.
  • 23
    Redactive

    Redactive

    Redactive

    Redactive's developer platform removes the specialist data engineering knowledge that developers need to learn, implement, and maintain to build scalable & secure AI-enhanced applications for your customers or productivity use cases for your employees. Built with enterprise security needs in mind so you can focus on getting to production quickly. Don't rebuild your permission models just because you're starting to implement AI in your business. Redactive always respects access controls set by the data source & our data pipeline can be configured to never store your end documents, reducing your risk on downstream technology vendors. Redactive has you covered with pre-built data connectors & reusable authentication flows to connect with an ever-growing list of tools, along with custom connectors and LDAP/IdP provider integrations so you can power your AI use cases no matter your architecture.
  • 24
    Cloud 66

    Cloud 66

    Cloud 66

    Cloud 66 gives you everything you need to build, deploy and grow your applications on any cloud, without the headache of the server stuff. Works with any programming language or framework you prefer. Natively builds, configures, and manages all major databases and components. Deploys to your account on these cloud providers or non-cloud servers. Connect your git repository to Cloud 66. We support all major Git providers including GitHub, GitLab, Bitbucket, and Azure DevOps. Your code can be in a mono repo or a multi-repo setup. All programming languages and frameworks are supported, either natively or via containers. Connect your cloud provider account to Cloud 66. All major cloud providers including AWS, DigitalOcean, Google Cloud, Azure, and Linode are supported. Cloud 66 will analyze your code to find out the components that are needed to run your application. Static site generators like Gatsby, Hugo, or Jekyll are supported.
    Starting Price: $23 per year
  • 25
    Hiphops

    Hiphops

    Hiphops

    Meet Hiphops, the DevOps control plane that makes it easy to create bespoke internal tools without adding more maintenance burden, spending time on boilerplate, or burning out your team. Helping modern tech teams thrive at enterprise scale. Set up CRON jobs in just 1-line of config and let your flows run themselves. Leverage and combine your everyday tools in unique ways not possible before. Enable even your least technical team members to interact with and trigger flows. Develop and run flows locally. No more fix, push, wait, repeat. Create flows using simple, declarative syntax that's extensible with custom code. Self-host on your own infrastructure or get deployed in minutes via Hiphops cloud. You can create bespoke internal tools without adding even more maintenance burden, and without spending time on boilerplate. We give teams a platform that has all of the pieces you need to automate the process, integrate your existing tools, and run everything.
  • 26
    DROPS

    DROPS

    DROPS

    DROPS is a release management tool designed to simplify, secure, and centralize the deployment of applications across data centers, hybrid, and multi-cloud infrastructures. It supports a wide range of platforms, integrates seamlessly with various CI/CD pipelines, and offers both agent-based and agentless operations. With features like full-stack release management, automated infrastructure provisioning, and 24/7 availability, DROPS aims to streamline deployment processes and ensure consistent, reliable delivery. The tool is flexible enough to manage both legacy and modern applications, catering to diverse enterprise needs. Select agent-based or agentless operation. No need for agent installation and management. DROPS adapts to your configuration and if agents are needed, they are provisioned automatically. Plan and organize your application deployment from the web console with no scripting needed. Ease collaboration between stakeholders and technical teams.
  • 27
    AirMDR

    AirMDR

    AirMDR

    AI-powered virtual analysts automate 80-90% of routine tasks, delivering faster, higher-quality, and more affordable alert triage, investigation, and response, all supported by human experts. Say no to expensive, slow, poor quality, and inconsistent investigations. Say hello to precision investigations at blazing-fast speed. Traditional MDRs rely on human analysts for case triage, but at AirMDR, our intelligent virtual analyst processes these cases 20 times faster with greater consistency and depth. At AirMDR, human analysts have to manually triage over 90% fewer cases. Experience high-quality investigation, triage, and response for every alert, with 90% of alerts investigated in under five minutes. Every alert is automatically enriched, investigated, and triaged by our virtual analyst, serving as the first responder. This process is continuously supervised and enhanced by our team of human security experts, ensuring a seamless and efficient security operation.
  • 28
    Maven AGI

    Maven AGI

    Maven AGI

    By integrating with existing go-to-market systems across sales, customer success, and support, Maven AGI enables organizations to deliver faster, more consistent, and more personalized interactions. The platform addresses common challenges such as siloed teams, fragmented data, and disjointed handoffs, helping companies streamline operations and improve the customer experience. Maven AI agents autonomously resolve up to 93% of support inquiries and reduce related costs by as much as 80%. The platform integrates with over 100 systems, goes live in a matter of days, and does not require infrastructure replacement.
  • 29
    otto-js
    otto-js understands what it takes to work with small & mid-sized businesses. While many SMBs choose otto-js directly through one of our many no-code platform plugins, for large partners, who also service the SMB market, we have a flexible, robust, API capable of onboarding thousands of customers in a flash. We work with others to help consolidate vendor sprawl, consolidating costs & integration time. otto-js is committed to being there when you need us, regardless of platforms, stack, and integrations. That's why we've kept our learning curb low and our return on value high. Shoppers are more than 90% more likely to buy online from brands they trust. Proving you are a safe and compliant website is one of the number one ways to develop trust quickly and increase conversions.
  • 30
    Aembit

    Aembit

    Aembit

    Replace manual and insecure access to non-human identities with our automated and secretless Workload IAM platform. Manage your workload-to-workload access like you do your users: with automated, policy-based and identity-driven controls, so you can proactively eliminate the risk of non-human identities. Aembit boosts security by cryptographically verifying workload identities, in real time, ensuring that only trusted workloads have access to your sensitive data. Aembit injects short-lived credentials into requests just-in-time so you never have to store or protect secrets. Dynamically enforce access rights based on real-time evaluations of workload security posture, geography and other key behavioral characteristics. Aembit secures access amongst workloads in the cloud on-prem and in SaaS.