All Things Performance and Partner Marketing, All in One Place
Track calls, leads, and clicks without the manual work
Automatically tie revenue back to campaigns, channels, publishers, and networks through marketing attribution. Spend less time juggling reports, and more time optimizing for growth by using a single operating solution for partner and performance marketing.
Learn More
Top Corporate LMS for Training | Best Learning Management Software
Deliver and Track Online Training and Stay Compliant - with Axis LMS!
Axis LMS enables you to deliver online and virtual learning and training through a scalable, easy-to-use LMS that is designed to enhance your training, automate your workflows, engage your learners and keep you compliant.
fccu.evtreader is a computer forensic tool that will help an investigator to analyze MS Windows event log files.
It is a perl script made to be run under GNU/Linux but should run on other platforms too.
GNet Server - Network compression client/server software. Compresses data over slow networks to save on the cost of bandwidth. Server is developed for Unix and Windows platforms, The client will run on Windows based PCs.
FWReport is a log parser and reporting tool for IPTables. It generates daily and monthy summaries of the log files, allowing the admin to free up substantial time, maintain better control over security of the network, and reduce unnoticed attacks.
Chaosreader is a freeware tool to fetch application data from snoop or tcpdump logs. Supported protocols include TCP, UDP, IPv4, IPv6, ICMP, telnet, FTP, HTTP, SMTP, IRC, X11, VNC, ...
Empower Your Contact Center with Human-Like AI Conversations
Deliver faster resolutions, lower costs, and better CX without hiring another agent.
Enterprise Bot, based in Switzerland, is a pioneer in Conversational AI, Process Automation, and Generative AI. With the trust of esteemed enterprise giants across industries like Generali, SIX, SBB, DHL, and SWICA, Enterprise Bot is revolutionizing both customer and employee experiences. Through its advanced integration with Large Language Models (LLM) such as ChatGPT and Llama 2, and its unique patent-pending DocBrain technology, the company delivers unparalleled personalization, active engagement, and omnichannel solutions across platforms like email, voice, and chat. Furthermore, Enterprise Bot integrates with existing core systems, such as SAP, CRMs, Confluence and more, and with its proprietary middleware, Blitzico, enables the AI to not only respond to queries but also take action to resolve them. This dedication to innovation in four main use case areas, Customer Support, Sales and Marketing, Knowledge Management and Digital Coworker, elevates both CX and employee productivity.
sfick (pronounced as "s-fick") is a two part software system whose function is to assist system administrators with the process of verifying the integrity of critical files. Given a system compromise, system administrators must be able to verify the integ
Alist is a program that collects hardware and software information about systems and stores it in a database for users to browse and search via a Web interface. The program consists of three parts: a client portion that collects the information, a daemon
The FreePKI project aims to create practical, interoperable & free code and services for Certificate and Registration Authorities based on the X.509 standard, including nearly zero-cost ID verification through a PGP-like web of trust scoring system.
Distributed Syslog collector and viewer system with reliable Syslog msgs over tcp, and query with reg ex. using PERL. Supports IETF syslog and syslog relay, JAVA/JINI based, uses postgreSQL, JBOSS. Chain of custody raw to db data link. UTF8, D, F , UK
Picky - a selective syslog to mysql database daemon. Allows completely dynamic specific translation of syslog data to dynamic mysql table(s). The other projects under this one are tools that take advantage of the flexibility of Picky and demonstrate it
Run applications fast and securely in a fully managed environment
Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of Google's scalable infrastructure.
Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
IAN (I Am Normal) is used to minimize the chance of an attacker successfully fingerprinting a honeypot. This is accomplished by creating bogus data and history files, alter creation and modification times, add users, patch x number of programs, etc.
Regular Expression, Arbitrary Protocol, Opensource Filtering Firewall (Reapoff) is a regular expression enabled TCP/IP plug proxy.
The proxy operates on data using a pair of simple rule based configuration files defining the testing and actions on th
This very simple perl script parses you iptables log files and produces a report in text format with a summary based on the prefix of the log ( --log-prefix option of iptables ).
Prefix description is allowed.
This project is intended to provide a means by which one can insert data other than packet data into the snort/ACID IDS system.
We have scrapped the perl version - since some systems don't have perl - or don't have the ram, cpu or diskspace to run the ho
This project is a Linux-PAM module designed for mounting a user's encrypted,
home directory using the user's login credentials as the decryption key. The
module also unmounts the user's home directory at logout to re-encrypt the protected data.
A lightweight (distributed?) network security monitor for TCP/IP+Ethernet LANs. It will capture certain network events and record them in a relational database. The recorded data will be available for analysis through a CGI based interface.
Perl Secure Conf (PSC) is a suid C program which reads a protected configuration file (containing passwords, secret data, whatever) and then drops its privilege. Now, in unpriviledged mode PSC execs a perl
script, leaving a handle to the protected conf.
Checking the integrity of a file on a remote and local untrusted or compromised server is to be achieved with minimal computational and storage requirements on part of a healthy verifier.