Showing 1 open source project for "ai agent"

View related business solutions
  • Project Planning and Management Software | Planview Icon
    Project Planning and Management Software | Planview

    Connect programs, projects, resources, and financials with business outcomes using portfolio management software from Planview.

    Planview® Portfolios enables enterprises to accelerate strategic execution by seamlessly integrating business and technology planning, optimizing resources, and leveraging the power of embedded AI — Planview Anvi™ — to deliver breakthrough products, services, and customer experiences. This unified approach aligns strategy with execution, driving enhanced business performance across the organization.
    Learn More
  • Reliable Phone Service for Your Home or Business Icon
    Reliable Phone Service for Your Home or Business

    Businesses that want a modern business phone system using their current phones

    Calling made modern. Your business number. Your employees' phones. Our amazing features. A dial menu spoken by our voice actors. Callers press numbers to make purchases, hear MP3s, connect to specific staff, and more. Make and answer calls using your number on multiple phones without the caller ever knowing. Employees hear secret in-house menus, transfer calls, and send voicemails to their email, all from their dialpad. These business features require no new software or hardware. Your dialpad come to life. Porting your business or personal number at the press of a button. Select from our menu of modern voice features for your business or personal line. We'll activate these features on your current phone for you. No work (or learning) required from you. We'll be here to transform your number whenever your desires change.
    Learn More
  • 1
    RedAmon

    RedAmon

    AI-powered framework for automated penetration testing and red teaming

    ...It begins with a multi-phase reconnaissance engine that maps the entire attack surface of a target, collecting information such as subdomains, open ports, services, and potential vulnerabilities. RedAmon then uses an AI agent orchestrator to analyze this data, select appropriate tools, and perform exploitation steps such as credential brute forcing or CVE-based attacks. All discovered assets, relationships, and vulnerabilities are stored in a Neo4j knowledge graph, allowing the system to reason about the environment and make informed decisions during the attack process.
    Downloads: 11 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB