BidJS enables online timed and webcast bidding on your own website.
For companies wishing to sell by auction
Bidlogix provide auction software to auction houses around the globe.
We offer timed auction software, webcast auction software along with an optional invoicing management system.
Our software is embedded on your site with fully customisable styling.
Based in Brighton, UK Bidlogix started providing auction software in 2013. Our 2 in-house development teams are constantly evolving the product with in excess of 10 auctions per day being run using our software.
Our software can cater for the largest of auctions, all in real-time and can support multiple languages.
Get Started Now
No-Nonsense Code-to-Cloud Security for Devs | Aikido
Connect your GitHub, GitLab, Bitbucket or Azure DevOps account to start scanning your repos for free.
Aikido provides a unified security platform for developers, combining 12 powerful scans like SAST, DAST, and CSPM. AI-driven AutoFix and AutoTriage streamline vulnerability management, while runtime protection blocks attacks.
Use prime numbers and pseudorandom number generators to create pseudorandom permutations to "shuffle" bits of given data (passwords, logins, PINs, files, directories). It is designed to be very secure (I hope so).
Al2 is a language, close to C++ and Java, designed for use in mathematics and science, but is procedural unlike Mathematica and Maple. Like C++, class operators can be defined. Like Java, there is no need for header files. Aled is an interface to AL2.
Cypher is an encryption program that uses the AES (Rijndael) algorithm to encrypt and decrypt files. You can use Cypher to protect sensitive data from unwanted access.
Dynamic Work and Complex Project Management Platform | Quickbase
Quickbase is the leading application platform for dynamic work.
Our no-code platform lets you easily create, connect, and customize enterprise applications that fix visibility and workflow gaps without replacing a single system.
A toolkit of nitty-gritty classes from real-life projects. Contains generic snippets along with things like server-side DOM implementation or RSA or code generation tools.
KeyStone is an editor program for Java keystore files, licensed under the GPL. KeyStone may help make your life easier if you're working with symmetric cryptography in Java.
Open Eraser securely delete files by overwriting them. Every character in the file is overwritten so it is secure: softwares couldn't recover erased files by OpenEraser. Try it at http://www.aessepi.it/OpenEraser/dist/launch.html
For organizations that need to automate secure file transfers to protect sensitive data.
Diplomat MFT by Coviant Software is a secure, reliable managed file transfer solution designed to simplify and automate SFTP, FTPS, and HTTPS file transfers. Built for seamless integration, Diplomat MFT works across major cloud storage platforms, including AWS S3, Azure Blob, Google Cloud, Oracle Cloud, SharePoint, Dropbox, Box, and more.
Chameleon will provide malware resistance by allowing easy use and management of files and applications that are partitioned into separate roles. Components in Chameleon may also be helpful for using multiple X servers together.
A lightweight Windows HTA Application useful as your regular google hacking tool on Windows platform.A comprehensive search form bundled with sensitive keywords. It's capable of saving searches on disk and directly modifying keyword files.
This software is a set of tools that hides C source code in txt files. Also the software is able to restore the txt files to C source code again. This work is based on the tool c2txt2c by Leevi Martilla. Csteg needs a book file in txt format to hide C so
ccsrch is a tool that searches for and identifies unencrypted and contiguous credit card numbers (PAN) and track data on windows and UNIX operating systems. It will also identify the location of the PAN data in the files and record MAC times.
Steganography program. Crypture encrypts (1024 bit key) and stores files in Windows bitmap files. Only 6 KB, with no install required. Fills all bits with noise, to slip by standard steganalysis methods. Data header is encrypted and scattered as well.
Generic file fuzzer. It has some "advanced" features like deep tracing into child child's and also it can "recognize" text format of the input files (if they are ASCII).
Sudo inventory web-tool (SIWT) is a web interface to view and administer information related to /etc/sudoers files on multiple servers. The database contains data on servers, users, aliases, dates, etc. This tool is helpful for internal audits.
JDO is a Java DeObfuscator that works on class files directly. JDO contains a simple and easy to use GUI that makes automatic deobfuscation of Java projects a one-click operation!
How do you find anything in the mountain of data on your PC? How do you organise, maintain, archive and protect your files? How do you avoid surrendering to the Powers of Darkness? Checkpoint Commander, the vital tool for Information Management!
KismetToolSuite contains a couple of command-line tools to analyze, convert and merge Kismet log files (.csv, .gps and .xml). It is also a windows version for the Kismet to NetStumbler converter available!
Changetrack logs modifications of a set of files, and allows recovery of the tracked files from any stage of development. The changes are presented in a powerful web-based form, a text file, or an email message. A handful of options allow situation-specif
Hurby is a small plugin-based program for cleaning private data of any kind. Currently there are plugins for cleaning data from Irfan-View, Total-Commander, Virtual-Dub, Winamp, eMule and windows recent files list.
Vinetto is a tool intended for forensics examinations. It is a console program to extract thumbnail images and their metadata from those thumbs.db files generated under Microsoft Windows. Vinetto works under Linux, Cygwin(win32) and Mac OS X.
stegotools is a suite of UNIX command-line applications to read/write hidden information from/in files using steganography. It currently fully supports 24bpp bitmap images.
Bork is a very small, cross-platform file encryption utility. It is written in Java and designed to be included along with the files it encrypts for long-term storage (eg on CD-R). Its minimal external dependencies make it fairly futureproof.