Manage your hosting business with our vacation rental software
Empowering your short-term rental business to succeed
Whether you’re a new or established business, you can rely on Lodgify’s vacation rental property management software for support through every step of your journey.
Learn More
Track time for payroll, billing and productivity
Flexible time and billing software that enables teams to easily track time and expenses for payroll, projects, and client billing.
Because time is money, and we understand how challenging it can be to keep track of employee hours. The constant reminder to log timesheets so your business can increase billables, run an accurate payroll and remove the guesswork from project estimates – we get it.
The OpenCoin project provides resources for creating virtual currencies: documentation, format and protocol definitions, an open-source reference implementation for issuers, users and traders. It is based on David Chaum's electronic cash concept.
A lightweight, responsive, adaptive firewall intended for small netoworks and workstations. This project takes advantage of existing Open Source material to create a greater, more cohecive whole.
OpenSQLi-NG is the next generation open source sql injection tool. It silently test and exploit (on-demand) SQL injections conditions. Please refer to the project web site to have the complete description: http://opensqling.sourceforge.net/?page_id=8
The project is being migrated to http://code.google.com/p/ciform...
IMPORTANT : The project is now being hosted at http://code.google.com/p/ciform
Plug'n Auth is an API providing easy integration of different authentication mechanisms into web applications. Within a few steps web admins will be able to change both the authentication backend and the logon frontend at any time with no further effort
Next-generation security awareness training. Built for AI email phishing, vishing, smishing, and deepfakes.
Track your GenAI risk, run multichannel deepfake simulations, and engage employees with incredible security training.
Assess how your company's digital footprint can be leveraged by cybercriminals. Identify the most at-risk individuals using thousands of public data points and take steps to proactively defend them.