ToogleBox: Simplify, Automate and Improve Google Workspace Functionalities
The must-have platform for Google Workspace
ToogleBox was created as a solution to address the challenges faced by Google Workspace Super Admins. We developed a premium and secure Software-as-a-Service (SaaS) product completely based on specific customer needs. ToogleBox automates most of the manual processes when working with Google Workspace functionalities and includes additional features to improve the administrator experience.
Learn More
Multi-Entity Cloud Accounting Software for Growing Businesses
Built for small to midsize businesses that have outgrown entry-level accounting or legacy ERP solutions.
Built natively on the Microsoft Power Platform (Dynamics 365), Gravity delivers robust multi-entity financial management with seamless integration to Microsoft 365, Power BI, Teams + Copilot — no third-party add-ons required.
File Type Checker checks the file data to determine the actual file type. As of this writing filetypechecker supports doc, rtf, xls, pdf, jpg, jpeg, and gif. more file support will be added soon.
Jaiom (Java All In One MediaProcessing Server) intends to provide a simple to use webservices based, media processing facade which processes videos, photos, pdf and MS Office media types using many different kind media processing engines.
Comag PVR 2/100CI HD Video Catalogue Tool - A very simple Java Swing application to search in a folder or harddrive for recordings and then read informations from Recording Meta-Files of the Comag PVR.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.