AI-powered SAST and AppSec platform that helps companies find and fix vulnerabilities.
Trusted by 750+ companies and performing 200k+ code scans monthly.
ZeroPath (YC S24) is an AI-native application security platform that delivers comprehensive code protection beyond traditional SAST. Founded by security engineers from Tesla and Google, ZeroPath combines large language models with advanced program analysis to find and automatically fix vulnerabilities.
Learn More
SalesTarget.ai | AI-Powered Lead Generation, Email Outreach, and CRM
SalesTarget.ai streamlines your sales process, providing everything you need to find high- quality leads, automate outreach, and close deals faster
SalesTarget is ideal for B2B sales teams, startup founders, and marketing professionals looking to streamline lead generation and outreach. It also benefits growing SaaS companies and agencies aiming to scale their outbound efforts efficiently.
Allows the editing of CSV files using SQL commands
This program allows a user to modify a CSV file using SQL commands. This program uses a temporary H2 database to contain the CSV file, and accept SQL commands. You can then save this back to a CSV file without any data being distorted. This project only supports CSV comma delimited files. Currently any other CSV files are not supported. When editing the CSV you are sending SQL statements to a H2 database with a single table named CSV.
Example command: DELETE FROM CSV WHERE...
Database Record Selector and Editor (DB-RSE) is a PHP program intended to be a very simplified MySQL database record selector and editor. Having only three files, it is simple to install and setup. Select a table, select a record, edit, and save. Version 2 now also lets you add new records and copy existing records.
Free tool designed to make client side hacking easy
Free tool designed to make client side hacking easy.
ALL actions this software takes are user initiated so we take no responsibility for any damaged dealt to software, data or hardware. Codelists found on the web are the responsibility of both the user and the original hacker.