AI-Powered Security and IT Operations Without Compromise.
Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can:
Learn More
Attack Surface Management | Criminal IP ASM
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
CSV2XLS is a command line utility that enables the creation of xls files across platforms. It supports multiple sheets, formatting, and the choice of fonts. It requires python. There is also an R/S+ plugin available, which is called DATAFRAMES2XLS.
Natural CLI is a library that provides Java and Python command line developers with an easy way to use human readable command line interfaces. Command line are very easy to define. For examples, visit http://naturalcli.sourceforge.net
Protoreto is a GPL-licensed tool to create prototypes of graphical user interfaces (GUIs).
NOTE: This project is not actively maintained at the moment. If you'd like to continue developing Protoreto, please send an e-mail to: wikipedian@users.sf.net
bocca is a text-based, scriptable, interactive development environment for SIDL/Babel-based development of mixed language C/C++/Fortran/Java/Python code. It manages source and build systems. Bocca automates creating SIDL/Babel code or CCA components.
Instant Remote Support Software. Unattended Remote Access Software.
Zoho Assist, your all-in-one remote access solution, helps you to access and manage remote devices.
Zoho Assist is cloud-based remote support and remote access software that helps you support customers from a distance through web-based, on-demand remote support sessions. Set up unattended remote access and manage remote PCs, laptops, mobile devices, and servers effortlessly. A few seconds is all you need to establish secure connections to offer your customers remote support solutions.
SnapMan is a tiny java program with an integrated timer (opensymphony quartz). It takes snapshots of your desktop in regular intervals and saves it into a specified folder. Intervals and target folder is made configurable. Cron/At compatible expressions.
Built for speed and collaboration, Knak streamlines campaign production with modular templates, real-time editing, simple collaboration, and seamless integrations with leading MAPs like Adobe Marketo Engage, Salesforce Marketing Cloud, Oracle Eloqua, and more. Whether you're supporting global teams or launching fast-turn campaigns, Knak helps you go from brief to build in minutes—not weeks. Say goodbye to bottlenecks and hello to marketing agility.
This is a small C-library to create an maintain the tray icons in your own programs and a set of tiny lightning-fast trayicon utilities to show the cpu-load, mem-load, xkb-layout & mixer-volumes.
WHEREAMI is an intelligent and self-learning network detection and configuration utility. With this capability, a user can just walk to a network range and WHEREAMI will self determine and connect to that network with relevant policies.
This project is an OO-centric design of getopts, based on the standard python implementation of getopts. C-style loop calling of getopts is not OO and does not take advantage of Java's standard library.