Other Useful Business Software
PeerGFS PEER Software - File Sharing and Collaboration Icon
PeerGFS PEER Software - File Sharing and Collaboration

One Solution to Simplify File Management and Orchestration Across Edge, Data Center, and Cloud Storage

PeerGFS is a software-only solution developed to solve file management/file replication challenges in multi-site, multi-platform, and hybrid multi-cloud environments.
Learn More
No-Nonsense Code-to-Cloud Security for Devs | Aikido Icon
No-Nonsense Code-to-Cloud Security for Devs | Aikido

Connect your GitHub, GitLab, Bitbucket or Azure DevOps account to start scanning your repos for free.

Aikido provides a unified security platform for developers, combining 12 powerful scans like SAST, DAST, and CSPM. AI-driven AutoFix and AutoTriage streamline vulnerability management, while runtime protection blocks attacks.
Learn More
Software for managing apps and accounts | WebCatalog Icon
Software for managing apps and accounts | WebCatalog

Tired of juggling countless browser tabs? WebCatalog Desktop turns your favorite web apps into dedicated desktop apps

Turn websites into desktop apps with WebCatalog Desktop—your all-in-one tool to manage apps and accounts. Switch between multiple accounts, organize apps by workflow, and access a curated catalog of desktop apps for Mac and Windows.
Learn More
Attack Surface Management | Criminal IP ASM Icon
Attack Surface Management | Criminal IP ASM

For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
Learn More
Find out just how much your login box can do for your customer | Auth0 Icon
Find out just how much your login box can do for your customer | Auth0

With over 53 social login options, you can fast-track the signup and login experience for users.

From improving customer experience through seamless sign-on to making MFA as easy as a click of a button – your login box must find the right balance between user convenience, privacy and security.
Sign up

Additional Details for diff-so-fancy

Operating Systems

Linux, Windows

Programming Language

Perl

Registered

2021-04-12

Last Updated

Categories

Source Code Analysis, Code Review

Maintainers

sf-editor1

Keep Me Updated!