Wiz: #1 Cloud Security Software for Modern Cloud Protection
Protect Everything You Build and Run in the Cloud
Use the Wiz Cloud Security Platform to build faster in the cloud, enabling security, dev and devops to work together in a self-service model built for the scale and speed of your cloud development.
Learn More
DialedIn: Cloud Contact Center Software
Cloud Based Contact Center Software that Drives Success
DialedIn is a modern call center software designed to transform customer interactions and streamline your operations, helping teams achieve more daily. By automating and optimizing key workflows across inbound, outbound, and blended environments, DialedIn helps you boost agent productivity and deliver better outcomes across every call.
Rapid Application Development PHP Hosting Environment
A Rapid PHP Application Development Environment designed for webmasters, developers, and hosts to enforce website uniformity, hardening, and light weight enough to function within shared hosting, in the presence of other scripts, and nested within itself.
**THIS PROJECT IS NOT MAINTAINED ANYMORE
**CHECKOUT http://poppy.dc-development.de to see its follow-up
Poppy is a visual markup editor that runs in a browser.
- Best Browser: Use Mozilla-FireFox!
- Take Care: for local testing/development only!
Features:
- Multiple Projects
- Build/Edit Master and Pages Visually
- Clean formatted output only elements you specified
- Filemanager
New:
- Installer for easy setup
- Poppy demo project for...
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.