We help you deliver Virtual and Hybrid Events using our Award Winning end-to-end Event Management Platform
Designed by event planners for event planners, the EventsAIR platform gives you the ability to manage your event, conference, meeting or function with
EventsAIR have been anticipating and responding to the ever-changing event industry needs for over 30 years, providing innovative solutions that empower event organizers to create successful events around the globe.
Learn More
Unimus makes Network Automation and Configuration Management easy.
Deploying Unimus to manage your entire network requires only minutes, allowing for rapid deployment without headaches.
We aim to make automation, disaster recovery, change management and configuration auditing painless and affordable for a network of any size.
An application to securely communicate passwords over the web
Give your users the tools to be secure by default. Password Pusher is an open source application to communicate passwords over the web. Links to passwords expire after a certain number of views and/or time has passed. Only enter a password into the box. Other identifying information can compromise security. All passwords are encrypted prior to storage and are available to only those with the secret link. Once expired, encrypted passwords are unequivocally deleted from the database.
Username generator for penetration testing and user enumeration
...Username Anarchy supports numerous formatting styles, allowing security testers to replicate patterns commonly used in enterprise environments such as first.last, flast, or firstinitiallastname. Username Anarchy can also utilize name sources gathered from OSINT techniques such as social networks or other public data to produce realistic username lists.
...TeamSploit should work with any MSF product (including, OpenSource, Express, or Pro).
Features Include:
- Exploitation Automation
- Automated Post-Exploitation
- Information and Data Gathering
- Session Sharing
- Trojans and Trollware
TeamSploit's primary goal is to automate common penetration testing tasks, and provide access and information to fellow team members.
Teams of all sizes and in various industries that want the best time tracking and employee monitoring solution.
It's easy with Hubstaff, a time-tracking and workforce management platform that automates almost every aspect of running or growing a business. Teams can track time to projects and to-dos using Hubstaff's desktop, web, or mobile applications. You'll be able to see how much time your team spends on different tasks, plus productivity metrics like activity rates and app usage through Hubstaff's online dashboard. Most of the available features are customizable on a per-user basis, so you can create the team management tool you need.
ENCAM is an asset management database and configuration backup tool for Cisco network devices. ENCAM pulls configuration data from devices, stores it, reports changes, analyzes configuration defects, generates asset lists and compliance reports.
Laika analyzes and reports on the interoperability capabilities of EHR systems. This includes the testing for certification of EHR software products and networks.
The purpose of SNX is to have a modular series of components that report back to a central repository and 'AI' for pattern recognition and anomoly detection. This is to help with IDS systems, and to move to the next generation of security.
LinuxBSM-2 introduces auditing features in Linux kernel to achieve better security and keep an eye on system activities.
Any kernel-derived data can be audited.
Quality and compliance software for growing life science companies
Unite quality management, product lifecycle, and compliance intelligence to stay continuously audit-ready and accelerate market entry
Automate gap analysis across FDA, ISO 13485, MDR, and 28+ regulatory standards. Cross-map evidence once, reuse across submissions. Get real-time risk alerts and board-ready dashboards, so you can expand into new markets with confidence
Cryptopus is a ruby on rails web application for storing and sharing passwords and other sensitive data. All data is stored encrypted in a database, safe from third party access.