The AI-powered unified PSA-RMM platform for modern MSPs.
Trusted PSA-RMM partner of MSPs worldwide
SuperOps.ai is the only PSA-RMM platform powered by intelligent automation and thoughtfully crafted for the new-age MSP. The platform also helps MSPs manage their projects, clients, and IT documents from a single place.
Learn More
Get full visibility and control over your tasks and projects with Wrike.
A cloud-based collaboration, work management, and project management software
Wrike offers world-class features that empower cross-functional, distributed, or growing teams take their projects from the initial request stage all the way to tracking work progress and reporting results.
This program can encrypt / decrypt strings with the Caesar's Cipher.
It also can try to crack an encrypted string with brute force.
(C) Daniel Steinhauer <pik-9@users.sourceforge.net>
A small program written in java which helps you to manage your passwords in a secure way. Stores all your passwords so you only have to remember one single master password. You can create multiple profiles. 128 or 256 bit AES encryption.
Hide your data from any scans for fingerprints at forensic analysis. Fragger is an concept to fragment files into many small files by scrambling the content of the source file.
A warehouse and inventory management software that scales with your business.
For leading 3PLs and high-volume brands searching for an advanced WMS
Logiwa is a leader in cloud-native fulfillment technology, revolutionizing high-volume fulfillment for third-party logistics (3PLs), B2B and B2C fulfillment networks, and direct-to-consumer brands. Our flagship product, Logiwa IO, is an advanced Fulfillment Management System (FMS) designed to scale operations in the digital era. Logiwa elevates digital warehousing to new heights, ensuring dynamic and efficient fulfillment processes. Our commitment to AI-driven technology, combined with a focus on customer-centricity, equips businesses to adeptly navigate and excel in rapidly changing market landscapes. Discover the future of smart fulfillment and how you can fulfill brilliantly with Logiwa IO.
The aim of this small program is to parse your address book (Evolution address book or VCard file for the moment) and check if some of your contacts have uploaded a PGP public key on a key server.
Logdigest mails interesting lines from log files to the system administrator. Non-relevant lines are filtered out by customizable regular expressions. Logdigest comes with a set of such regexps to provide a good starting point.
Power Hasher is a program that allow you to get the hash code of multiple files at once, and export the results to a file, making easy for this file to be imported and the files checked. Currently it supports MD5, SHA1, SHA256, SHA384 and SHA512.
Lite Security Module: a daemon to handle PKCS11 Secure Boxes
Lite Security Module: a daemon to handle Secure Boxes (files containing cryptographic keys, X509 certificates and data objects), accessible through a PKCS#11 library, supporting non-certified (lite) Software or Hardware Security Modules (www.clizio.com)
A light script to make a black-list system troug iptables. You can create the black-list and manage it troug this program. Please read README file to know better this script.
New, Improved version of VB.Net Registration System. It sends emails to alert you when someone registers your program, if they try to use a used key, and if they try to use a banned key/their key has been banned. Checks every time against ban list.
A GUI (Graphic User Interface) for the OpenSSL encrypting/decrypting mode.
It allows to protect your files without use the console.
GOpenSSL is written with the Mono C# language and the graphic uses the Mono GTK libs.
Tiny program to make a memory snapshot of a running process and also to print out some meta information like open file descriptors and used sockets. Useful for dumping malicious programs or live forensic.
The CRY utility provides the ability to perform AES-256 symmetric key encryption of files. This is a light weight Linux utility and does not depend on PKI infrastructure. Rather, pre-shared encryption keys are used to protect your files.