Power through agendas and documents, make more informed decisions and conduct board meetings faster.
For team managers searching for a solution to manage their meetings
iBabs not only captures the entire decision-making process – it takes all the paperwork out of meetings. iBabs empowers everyone who has ever organized or attended, a meeting. With a seemingly simple app that offers complete control and a comprehensive overview of all those fiddly details. With about 3000 organizations and over 300,000 users, iBabs gives you peace of mind. So you can quickly organize effective meetings, and good decisions can be made with confidence. iBabs didn’t just happen overnight. We started analyzing and simplifying board meeting processes many years ago. We understand all the work that goes into meetings, and how to streamline everything so it all flows smoothly. On any device, confidentially, securely and automatically. Make good decisions with confidence.
Learn More
Assembled is the only unified platform for staffing and managing your human and AI support team.
AI for world-class support operations
Assembled is the only platform that unifies AI agents and intelligent workforce management to power fast and flexible support operations. Built for scale, we help teams automate over 50% of customer interactions, forecast with 90%+ accuracy, and optimize staffing across in-house and BPO teams. Orchestrate every chat, email, or call, balancing workloads between human and AI agents in real time — without sacrificing quality or control. Trusted by Stripe, Canva, and Robinhood, Assembled transforms support from a cost center into a strategic advantage. Our Workforce and Vendor Management tools connect forecasting, scheduling, and performance for smarter staffing decisions. AI Agents automate conversations across channels with your workflows and brand voice. AI Copilot empowers agents with real-time guidance, suggested replies, and one-click actions for faster, higher-quality resolutions.
Sun's XACML Implementation is an access control policy evaluation engine written entirely in the Java(tm) programming language. It supports XACML 1.x and 2.0 core features, and provides a number of powerful extensions and extensibility points.
Steganography framework with support for several carrier file formats: Pixel graphics, RIFF WAVE format, any sound to save lossy/analog, standard MIDI File Format, IL or .NET assemblies, XML documents, unsorted text lists.
A web-based system to assign a set of known persons anonymous ids, such that every person only receives one id. The ids cannot be mapped to the corresponding persons afterwards.
Fdump is a general low-level file/directory manipulation program. Fdump can split, reconstruct, scan, update, encode/decode, extend and compare any kind of file. It dumps files in several formats, while re-encoding from: B2/B16/B32/B64/B85.
flowdit is a connected worker platform tailored for industry needs in commissioning, quality, maintenance, and EHS management.
Optimize Frontline Operations: Elevate Equipment Uptime, Operational Excellence, and Safety with Connected Teams and Data, Including Issue Capture and Corrective Action.
TorK is an Anonymity Manager for the KDE Desktop. Browse anonymously on Konqueror/Firefox/Opera. Send anonymous email via the MixMinion network. Use ssh/irc/IM anonymously. Control and monitor your anonymous traffic on the Tor network.
adlc (amp-off debian livecd) is a security-oriented debian livecd. It contains tools and frameworks to perform security audits. for login try: root/toor and have a look at adlc.sourceforge.net. It's like a README ...
EDSS stands for Easy Debian Security Script and it is a very easy to use script that installs additional software, configures the software, and scans a GNU/Linux Debian server for possible security risks.
Captive Portal to use with IPTables (with ip_set module). It's permit to control access from a sub-net to internet or to another sub-net. Uses unix account to validate users. It's an alternative to Natacl, Sphirewall, Zorp, Nocat, Nufw and others.
Derived from TrueCrypt 6.3 release, I added some command line options to "TrueCrypt Format.exe" to allow TrueCrypt volumes to be created without using the graphical user interface
Leverage every email as an opportunity to brand consistently and minimise the security risks associated with the tampering of HTML signatures.
BrandMail®, developed by BrandQuantum, is a software solution that seamlessly integrates with Microsoft Outlook to empower every employee in the organisation to automatically create consistently branded emails via a single toolbar that provides access to brand standards and the latest pre-approved content.
Kotak is just another cracking tool which is based on Java. It is used to crack various types of hash functions with various types of attacks. It's developed to be as simple as possible, so that anyone can use this tool easily.
Amnesia is a design-rich 'host-proof' web application that encrypts and remembers all sorts of personal information from passwords to private notes. Project now hosted at Google Code: https://code.google.com/p/amnesia-app/
efw-toolbox. Is a collection of applications/scripts and other odds and ends that are useful to have. These are currently not available in the current Endian Firewall Project. This project is intended to work alongside with Endian Firewall project .
Sinapsis-HIS is a Health Information System designed as a collection of Hospital Information Systems that synchronize their databases with a single region-wide database that contains all medical records and other information in a unified format.
This is a simple encryption tool to work with home-grown encryption algorithms.
It can run as either a GUI, a command-line application, or a network proxy.
Q Disassembler is a flexible disassembly engine that aims to provide precise information about machine instructions while maintaining OS-independence and performance.
inundator is a tool used to anonymously inundate intrusion detection logs with false positives to obfuscate a real attack, leaving the IDS analyst feeling completely inundated.
phpKeyMgr is a PHP based SSH key managing software.
You can create multiple keys, define servers, and choose valid keys for each servers.
After this you can export the authorized_keys file with ease.
A Javascript implementation of the Blowfish Encryption Algorithm described by Bruce Shneier circa 1993. Blowfish is a keyed, symmetric block cipher common in cipher suites and was placed, by Mr. Shneier, in the public domain.
This is a revival of the old DMitry (Deepmagic Information Gathering Tool) Linux tool. Original upstream appears to be dead so I've decided to to continue the work. Attribution for versions <= 1.3a: James Greig James@mor-pah.net
BBSGen is an improved Blum-Blum-Shub pseudorandom number generator. It consists of a C library (libbbsgen) and command-line tool (bbsgen). BBSGen can be used in applications and command-line as secure, unpredictable and strong PRNG.
DotNetSSH is a pure .NET implementation of the SSH2 client protocol suite. DotNetSSH development is alive and active. DotNetSSH is a fork of Tamir's excellent SharpSSH, itself is a port of JCraft's java Jsch.
This project automates the reporting of improper Internet use by the X-ARF format. The two schemas specified abuse_login-attack and abuse_malware are currently implemented. Fixing a Bug and the Date / Timestamp issues. Now it should work fine :)
Allows to transparently encrypt repository contents with AES 256. The main advantage is that no additional software needed to be installed in untrusted location. Files are automatically encrypted on the fly when doing git push from trusted location.