Build experiences that drive engagement and increase transactions
Connect your users - doctors, gamers, shoppers, or lovers - wherever they are.
Sendbird's chat, voice, and video APIs power conversations and communities in hundreds of the most innovative apps and products. Sendbird’s feature-rich platform, and pre-fab UI components make developers more productive. We take care of a ton of operational complexity under the hood, so you can power a rich chat service, and life-like voice, and video experiences, and not worry about features, edge cases, reliability, or scale.
Learn More
Contractor Foreman is the most affordable all-in-one construction management software for contractors and is trusted by contractors in more than 75 countries.
For Residential, Commercial and Public Works Contractors
Starting at $49/m for the WHOLE company, Contractor Foreman is the most affordable all-in-one construction management system for contractors. Our customers in 75+ countries and industry awards back it up. And it's all backed by a 100 day guarantee.
Started as part of the Google Summer of Code 2005, this tool adjusts security settings on Linux systems, including firewall and SELinux policies. This tool aims to replace the system-config-securitylevel tool from Red Hat and Fedora Core systems.
Project Identity aims to develop an Open source Biometric Solution i.e. complete set of tools and libraries for Biometric identifiction systems.
This project has intial code done by students as their summer project at Echo IT Labs Pvt. Ltd.
GPL PHP AntiVirus for webmasters. Scans your web server's file system for dangerous and malicious code in public HTML, PHP, CGI and text files, usually caused by defacement or security holes in shared hosting accounts.
Apify is a full-stack web scraping and automation platform helping anyone get value from the web.
Get web data. Build automations.
Actors are serverless cloud programs that extract data, automate web tasks, and run AI agents. Developers build them using JavaScript, Python, or Crawlee, Apify's open-source library. Build once, publish to Store, and earn when others use it. Thousands of developers do this - Apify handles infrastructure, billing, and monthly payouts.
Set of tools and libs for
managing structured data
in a very flexible way:
Imp./Exp. ASCII, XML, SQL,
PS, Tex/LaTex, RTF
GUI: X-Windows, MS-Windows
Interface to C++, DBs, Perl,
PHP, Java, TCP/IP
LISP-like interpreter
written in C++ using C-LIB
This site is intended as a location containing a suite of tools to (1) Aid in the design of db APIs to be utilized in a J2EE environment and (2) generate stubs for the db API, Java classes and SQL DDL necessary to support the MVC pattern and the Data Own
...You can monitor specific
packets to/from network interfaces, internet protocol addresses
and also define specific filters for protocol, port and flag
properties of a packet. Output can be directed to database,
p
Project Planning and Management Software | Planview
Connect programs, projects, resources, and financials with business outcomes using portfolio management software from Planview.
Planview® Portfolios enables enterprises to accelerate strategic execution by seamlessly integrating business and technology planning, optimizing resources, and leveraging the power of embedded AI — Planview Anvi™ — to deliver breakthrough products, services, and customer experiences. This unified approach aligns strategy with execution, driving enhanced business performance across the organization.
Twe (Twe Whitelist Enforcer).
Language: php4.
Twe is used to enforce pre defined html code.
Twe takes (evil) html as input and returns html matched against
a flexible and easy to extend set of rules. Use Twe to avoid cross side scripting (xss).
...It supports functionality/algorithms that are supported by libgcrypt, including Symetric Ciphers (3DES, AES, Twofish, Blowfish), Cryptographic Hashing (MD5, SHA1, RIPE-MD160), P
A user-space solution for configurably disabling the ability of a process to access the internet. It is especially useful for foiling code that is suspected of containing spyware.
Java Mechanic can modify public, private and protected fields and activate methods of live running apps. Also decompiles,or saves any objects or source code. Using a built in java code interpreter, objects can be created on the fly. Contains many tools.
P.A.T.H is a collection of tools for inspecting and hijacking network connections written in Perl.
By now it includes a packetgenerator, a rst deamon, a sniffer, an ICMP redirection tool, an ARP redirection tool, an IDS testing tool and an automatic hij
A criteria selection for guiding and assuring activities concerned with the analysis of digital evidence, It covers legal, police and operational aspects. It is not a technical manual for computer forensic analysis, It is a criteria-based manual.
The FreePKI project aims to create practical, interoperable & free code and services for Certificate and Registration Authorities based on the X.509 standard, including nearly zero-cost ID verification through a PGP-like web of trust scoring system.
The goal of Operation Project X is to crack the 2048-bit RSA private encryption key Microsoft uses to sign Xbox media, by using distributed computing. This key could be used by Xbox owners to run homebrew code on their machines.
The sandbox system call API is a simple yet powerful mechanism for
confining untrusted code. It is similar to chroot() and BSD jails, but has
much greater flexibility and expressive power. The code is mostly complete
but not yet fully functional.
Protowatch is a userspace extension to Linux\'s 2.4 iptables firewalling code. Userspace will dynamically start a server to accept the packet, and log whatever the client sends. Useful for discovering what protocols are in use.
Libike is a cross-platform C library for managing IKE negotiations.The library implements RFC-standard ISAKMP/IKE exchanges and utilizes callbacks to delegate tasks of the packet transmission and security policies management to the external code.
AuthClassed is a class, written in PHP, to implement a simple authentification scheme for database-oriented webpages. Using AuthClassed is as simple as putting a single code line at the top of the webpage you would like to protect.
bcrypt is a lightweight blowfish file encryption utility which aims for cross-platform portability of not only the actual code, but the encrypted files as well. In addition to providing 448-bit encryption, bcrypt overwrites input files with random garbage