Caller ID Reputation provides the most comprehensive view of your caller ID scores across all carriers
Instantly identify flagged caller IDs and decrease flags by up to 95% your first month.
Keep your agents on the phone with increased connection rates by monitoring your phone number reputation across all major carriers and call blocking apps.
Learn More
AI-Powered Identity Governance
For IT Teams and MSPs in need of a solution to simplify, optimize and secure their SaaS, file, and device management operations
Define governance policies, manage access, and optimize licenses with unified visibility across every identity, app, and file.
CSS validation and advanced preprocessor with nesting and variables
CSS Preprocessor is a parser, compiler, and assembler which extends the CSS language to allow nested rules and attributes, variables / @mixin, functions, and especially, strong validation of your source code so you know that it will work the first time you use it in your browser. The library is written in C++ allowing any other C++ project to work with CSS without having to rewrite their own parser.
OSCAR - OpenSource Cablemodem file AssembleR - DOCSIS
OSCAR is a Java-based CableLabs® Configuration File Builder API for DOCSIS®, PacketCable™, DPoE™, and DPoG™
Report Issues: https://github.com/Comcast/Oscar/issues
Github Wiki: https://github.com/Comcast/Oscar/wiki
Html Assembler is a static site generator. It automatically integrates page content such as text and photos in a modifiable page template creating a complete set of html files ready for upload to your site.
Black scalpel is an advanced graphical (Swing gui) security and analysis tool written in Java, C and Assembler (platform independent). Current stage is early alpha, many features are still missing. Use SVN!
Discover the cyber platform that secures and insures SMEs
In a world that lives and breathes all things digital, every business is at risk. Cybersecurity has become a major problem for small and growing businesses due to limited budgets, resources, time, and training. Hackers are leveraging these vulnerabilities, and most of the existing cybersecurity solutions on the market are too cumbersome, too complicated, and far too costly.