OneTimePIM is a comprehensive Product Information Management System designed to streamline the import and distribution of product data.
A single source of truth for all of your product information with easy ways to distribute that data to wherever it needs to go, including the most powerful e-commerce connectors in the industry.
Learn More
Securely stream and govern industrial data to power intelligent operations with agentic insights.
For IoT Developers, Solution Architects, Technical Architects, CTOs, OT/IT Engineers
Trusted MQTT Platform — Fully-managed and cloud-native MQTT platform for bi-directional IoT data movement.
This project aims to develop a method to use runit and SysV init to enable parallel service startup during boot for Fedora Linux. Standard Fedora Init scripts will be ported to runit init scripts maintaining full functionality. Docs are in the wiki.
Getwifi allows Linux users to join wireless networks easily by joining available networks in an order specified by the user. Getwifi is configured using a single file which specifies networks, optional WEP keys, and the order in which to join networks.
Do you hate having a few giant directories that hold all of your packages? Do you hate installing something only to find that it doesn\'t work properly, and it doesn\'t have a make uninstall? If so, this script is for you.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.