Comet Backup - Fast, Secure Backup Software for MSPs
Fast, Secure Backup Software for Businesses and IT Providers
Comet is a flexible backup platform, giving you total control over your backup environment and storage destinations.
Learn More
Inventory and Order Management Software for Multichannel Sellers
Avoid stockouts, overselling, and losing control as your business grows.
We are the most powerful inventory and order management platform for Amazon, Walmart, and multichannel product sellers. Centralize orders, product information, and fulfillment operations to run more efficiently, sell more products, and stay compliant with marketplace requirements so you can grow profitably.
HVideoSecurity is an open source video surveillance application. HVS allows the user to configure a PC with one or more webcams as a video security. In alert mode, HVS will send an email and/or will run a custom command.
http:///www.cahung.it
ShellTer is an iptables-based firewall. What sets it apart from the rest is that it has built-in SSH brute force protection. It is easy to configure and has an interactive CLI installer.
This project develops a secure P2P framework in Java (SePP). Existing P2P frameworks are not covering security by design but rather implement only some high layer security mechanisms. It has been developed as part of the EU project SMEPP (www.smepp.org)
If you need to protect your confidential files in office or shared desktops, here is the robust command line and GUI utility to do password based encryption using AES. It can encrypt and decrypt a folder structure containing any number of files.
Network Management Software and Tools for Businesses and Organizations | Auvik Networks
Mapping, inventory, config backup, and more.
Reduce IT headaches and save time with a proven solution for automated network discovery, documentation, and performance monitoring. Choose Auvik because you'll see value in minutes, and stay with us to improve your IT for years to come.
tkpgp is a gui front-end to the Gnu Privacy Guard PGP implementation. It provides a selection-based channel that enables simple and convenient integration with other applications.
Unified cloud-based platform for dialing, emailing, appointment scheduling, lead management and much more.
Adversus is an outbound dialing solution that helps you streamline your call strategies, automate manual processes, and provide valuable insights to improve your outbound workflows and efficiency.
deEncrypt is an HTML tool which encrypts arbitrary texts (e.g., password) using AES. It is ideal for use within a business where you have to remember tons of different passwords but not allowed to install any application to help you remember them.
Java based webapp that utilizes TCP Wrappers to grant an IP access to a ssh server. Brute force attacks can be avoided while still allowing password based ssh access from multiple, changing IP values.
Ruby script framework for the encryption and decryption of email according the GPG/MIME Format (RFC 3156). It can be used for e.g. for Apple' Mail as replacement for GPGMail.
This project is a C++ library which allows incorporating DKIM into an existing MTA or other application. It provides full support for signing, verifying, and SSP. It is compliant with RFC 4871.
Provides a set of tools to write and make use of credentials for authorization purposes. RT is a role based language that allows for easy delegation of authority.
USB based memory acquisition tool targeting "warm boot" machines with 4GB of RAM or less. The software requires the use of USB portable media and is built on top of the syslinux platform.
gPWG is a GTK based password generation utility. gPWG allows you to create a completely random password or you can choose the password exact contents. Options include: number of passwords, random password length, allowed characters.
TNV visualizes pcap data to graphically depict network packets, links, and ports for network traffic analysis to facilitate learning what constitutes 'normal' behavior, investigating security events, or network troubleshooting.
This is the extended euclidean algorithm implemented in haskell.
It will put every single step of the algorithm in a file and show the actual result and everything in between.
Zinas : Zinas Is Not A Scanner
a simple tool written in python to be used by penetration-testers
it can brute force FTP,TELNET and POP3 , and verify SMTP users, and fuzzes POP3 password field
This program can encrypt / decrypt strings with the Caesar's Cipher.
It also can try to crack an encrypted string with brute force.
(C) Daniel Steinhauer <pik-9@users.sourceforge.net>
Sleutel is the Dutch word for key. Sleutel is a multi-platform password manager that is written using the Eclipse Rich Client Platform (RCP). Its goal is to manage password/id pairs for accessing web sites and providing an example RCP application.
pwntooth is designed to automate Bluetooth Pen-Testing. It scans for devices, then runs the tools specified in the pwntooth.conf; included blueper, bluesnarfer, Bluetooth Stack Smasher (BSS), carwhisperer, psm_scan, rfcomm_scan, and vcardblaster.