For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
#1 Customer Rated CLM Any Contract. Every Department. One Platform.
LinkSquares is the leading Contract Lifecycle Management (CLM) software designed to help legal, procurement, and business operations teams master the entire contract lifecycle, from creation to execution and renewal. The platform transforms how companies manage agreements by centralizing data, automating routine work, and providing actionable insights powered by AI. This single, connected source of truth helps teams eliminate manual processes, streamline workflows, boost visibility, and ensure compliance across thousands of contracts, ultimately reducing risk and administrative burden.
Travis's Cross Compiler Collection is a collection of scripts that build cross compilers targetting different, specific, platforms. All requisite files are grabbed by ftp, so most cross compilers are just a "make install" away.
Endpoint Protection Software for Businesses | HYPERSECURE
DriveLock protects systems, data, end devices from data loss and misuse.
The HYPERSECURE endpoint protection platform is a comprehensive suite of products and services enhanced by European third-party solutions. It ensures our customers’ IT security, regulatory compliance, and digital sovereignty.
sfick (pronounced as "s-fick") is a two part software system whose function is to assist system administrators with the process of verifying the integrity of critical files. Given a system compromise, system administrators must be able to verify the integ
Syscheck monitors the reliability/integrity of critical system files (config files and
binaries) by identifying changes made to them. It does this through an "automated
verification regimen run at regular intervals" against a local or remote database
Program written in PHP-CLI to utilize a database (via adodb) to store MD5 hashes of files and to then compare various hosts to those hashes to ensure files have not changed. If changes occur, notify appropriate people.
JavaCat is an app for managing files on your different drives (cds, hdds...). It's especially usefull for searching files on your exchangeable drives such as cds and dvds. Instead of digging through several disc just use JavaCat to find reqired file and
Share files on a peer to peer network using a peer web server. Then people use a web browser to surf to the peer web site. This package is complete and ready to use. It includes the Jetty web server, JSP Wiki, a VNC server and clients Putty and WinSCP.
Manage your hosting business with our vacation rental software
Empowering your short-term rental business to succeed
Whether you’re a new or established business, you can rely on Lodgify’s vacation rental property management software for support through every step of your journey.
ESR Backup (Easy, Secure, Remote) is a backup system for UNIX and Linux that is easy to use and configure. It automatically performs full and incremental backups on files you choose, and automatically rotates and archives your backups, encrypts archives
This project is old and i recommend you use Nefarious IRCu, it has all of the Boxen IRCu features. Click on the link below or go here http://sourceforge.net/projects/evilnet
An Avalon based J2EE Framework which minimizes the complexity and coding effort for middle tier programming by externalize SQL, business logic and workflow logic into XML configuration files.
Upload files, Information and Organize/Search them in an online database with user level permissions. Comes both as a Windows Ready to run Package with MySql. Also comes as a Mod_Perl/CGI package on Linux/Unix/CygWin for Apache, MySQL/PostgreSQL.
Logcheck is software package that is designed to automatically run and check
system log files for security violations and unusual activity. Logcheck
utilizes a program called logtail that remembers the last position it read
from in a log file.
pdtpd is a high-performance server for the Peer Distributed Transfer Protocol (PDTP), which provides BitTorrent-like content distribution of files in a directory heirarchy.
Yap2lc (Yet Another Passwd 2 LDIF Converter) is an LDAP migration tool, which extracts information from passwd, shadow/passwd, and master.passwd formatted files, filters out unwanted/misshapen accounts and writes an LDIF file for easy importing.
mkDoxy is to makefiles what Doxygen is to source files: it parses a makefile and produces HTML documentation of available targets and macros. Only comments starting with ## are considered, so it is easy to control what documentation is generated.
Masser is a perl-based fastcgi-driven application framework. It uses PHP- or JSP-like way of embeding code to HTML pages. It supports multiple database connections, configuration files, multiple language and selectable schemas support.
DBIx::Connect is a Perl module module which facilitates configuration and creation of Perl DBI , DBIx::AnyDBD , or Alzabo
-style database connections via configuration files
and/or command-line arguments.
EasyBackup is an easy to use back up tool for programmers who work on several projects and would like to backup to CD, DVD or to an FTP location. Easybackup compresses on the fly so required disk space during backup is as low as possible.