AI-powered SAST and AppSec platform that helps companies find and fix vulnerabilities.
Trusted by 750+ companies and performing 200k+ code scans monthly.
ZeroPath (YC S24) is an AI-native application security platform that delivers comprehensive code protection beyond traditional SAST. Founded by security engineers from Tesla and Google, ZeroPath combines large language models with advanced program analysis to find and automatically fix vulnerabilities.
Learn More
Top Corporate LMS for Training | Best Learning Management Software
Deliver and Track Online Training and Stay Compliant - with Axis LMS!
Axis LMS enables you to deliver online and virtual learning and training through a scalable, easy-to-use LMS that is designed to enhance your training, automate your workflows, engage your learners and keep you compliant.
sem is a command line interface for working with named semaphores. This allows you to easily coordinate multiple shell scripts, enforce one at a time access to files, etc.
CPD is a Dance Dance Revolution simulator written in Java with OpenGL and a tiny touch of C. It supports DWI files natively, mp3 audio, provides a modern DDR experience, and easy installation.
The Netjuke is a Web-Based Audio Streaming Jukebox powered by PHP 4, a database and all the MP3, Ogg Vorbis and other format files that constitute your digital music collection. Supports images, language packs, multi-level security, random playlists, etc
CloudZero automates the collection, allocation, and analysis of your infrastructure and AI spend to uncover waste and improve unit economics.
CloudZero is the leader in proactive cloud cost efficiency. We enable engineers to build cost-efficient software without slowing down innovation. CloudZero's next-generation cloud cost optimization platform automates the collection, allocation, and analysis of cloud costs to uncover savings opportunities and improve unit economics. We are the only platform that enables companies to understand 100% of their operational cloud spend and take an engineering-led approach to optimizing that spend. CloudZero is used by industry leaders worldwide, such as Coinbase, Klaviyo, Miro, Nubank, and Rapid7.
This is a program that watches your system log files, looking for hack attempts. It instanty reacts to potential security breaches by (for instance) adding firewall rules to cut off the attacker.
Songer is an ID3 tagger designed for the ROX desktop that supports the drag-and-drop nature of ROX. It is designed to be a simple tagging utility. Songer currently only supports MP3s and ID3 version 1 tags. Future support of ID3v2 and OGG files is planne
XDoclet module to generate MySQL and PostgreSQL DDL from class and method tags. Generates CREATE TABLE or ALTER TABLE statements. Supports all MySQL and PostgreSQL extensions. Turns .java files into .sql files.
pam_krb5 is designed to allow smooth integration of Kerberos 5 passwordchecking with applications built using PAM. It also supports session-specific ticket files (which are neater), Kerberos IV ticket file grabbing, and AFS token-grabbing.
Easily build robust connections between Salesforce and any platform
We help companies using Salesforce connect their data with a no-code Salesforce-native solution.
Like having Postman inside Salesforce! Declarative Webhooks allows users to quickly and easily configure bi-directional integrations between Salesforce and external systems using a point-and-click interface. No coding is required, making it a fast and efficient and as a native solution, Declarative Webhooks seamlessly integrates with Salesforce platform features such as Flow, Process Builder, and Apex. You can also leverage the AI Integration Agent feature to automatically build your integration templates by providing it with links to API documentation.
This utility will provide grep-like functionality to return multi-line (record) matches for blank-line deliminated files such as LDIF files used by LDAP. A match on any line will return all lines from the previous blank line until the following one.
The NEO Project uses the NEO-c (Network Exchange Operation for Charity) platform to participate in various computing challenges and projects, and donates any winnings to the charities specified by its users.
Secure locate provides a secure way to index and quickly search for files on your system. It will also check file permissions and ownership so that users will not see files they do not have access to.
This product sniffs web traffic on a Linux/Unix machine and creates log files for each website in CLF, Accrue, or a Verbose format. It can be configured with any IP address/Port Number combination, or it can be configured with domain names or virtual h
\'elf\' is a comfortable command-line ELF object file header analyzer. Unlike many other similar projects this project is aimed at the analyzation of the ELF header, this allows for a much deeper look into the internals of this integral section of an
Java library and utils for HP 200LX.
Include: Filer communication, an ftp server to share palmtop files with desktop. Database manipulation. And finaly a syncronization software for contact, appoinment, task, etc.
The mpdist distribution consists of three programs:
mp - pretty prints files to a PostScript printer.
mptool - a graphical frontend to mp.
mimep - allows users to print multimedia messages composed with any UA respecting the MIME standar
bcrypt is a lightweight blowfish file encryption utility which aims for cross-platform portability of not only the actual code, but the encrypted files as well. In addition to providing 448-bit encryption, bcrypt overwrites input files with random garbage
Utility to test and create .sfv and test .par on Unix and Windows. Easy scripting. Also Handy in dos environment. Recursive directories handling. Tested files database.
ProSum is a terminal based program that protects your files, sys_call_table and IDT like tripwire way (All in user space, without kernel modules) In addition, database with files etc. could be encrypted with Blowfish algorythm and more.
A Gnome applet which monitors several mailbox files of type mbox. Each
mailbox can be assigned to a priority between 0 and 2 and it can have
its own time interval for checking. For each priority there is a
different icon. As additional Information ...