Showing 5 open source projects for "open source engine"

View related business solutions
  • Run applications fast and securely in a fully managed environment Icon
    Run applications fast and securely in a fully managed environment

    Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.

    Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
    Try for free
  • Try the cloud dialer that managers trust and employees love to use. Icon
    Try the cloud dialer that managers trust and employees love to use.

    Revolutionize your contact center with CallTools

    Boost your agents’ productivity and enhance customer engagement like never before with CallTools’ powerful suite of call center features, including predictive dialing, call recording, and multi-touch campaigns with email and SMS capabilities. Get a complete 360-degree view of your agents’ performance and take advantage of real-time reporting. With seamless integration options, advanced queue management, and flexible IVR settings, CallTools ensures a streamlined workflow. Effortlessly manage data targeting and caller ID strategies to optimize connection rates and improve outcomes. Empower your team with a user-friendly interface designed to simplify complex tasks while delivering consistent results.
    Learn More
  • 1
    aws-encryption-sdk-cli

    aws-encryption-sdk-cli

    CLI wrapper around aws-encryption-sdk-python

    This command line tool can be used to encrypt and decrypt files and directories using the AWS Encryption SDK. If you have not already installed cryptography, you might need to install additional prerequisites as detailed in the cryptography installation guide for your operating system. Installation using a python virtual environment is recommended to avoid conflicts between system packages and user-installed packages. For the most part, the behavior of aws-encryption-cli in handling files is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    lshell is a shell coded in Python, that lets you restrict a user's environment to limited sets of commands, choose to enable/disable any command over SSH (e.g. SCP, SFTP, rsync, etc.), log user's commands, implement timing restriction, and more.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    steganoroute

    steganoroute

    Send steganographed text messages to mtr with fake hops in the network

    Steganoroute is a tool to send steganographed text messages to another computer over the network. The receiver must make a traceroute to the sender using the mtr program (and pressing 'd' once to switch the display mode to the continuous graph). This tool, the sender, creates several fake hops and makes them answer the ICMP packets (or not) to write the letters one by one on the mtr client screen.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Soicmp is a remote shell system, similar to telnet or netcat that allows a user to connect to a remote shell daemon, by using ICMP protocol instead of classical TCP. http://soicmp.sourceforge.net/ http://billiejoex.altervista.org/Prj_Py_soicmp.shtml
    Downloads: 0 This Week
    Last Update:
    See Project
  • DriveStrike: Remote Wipe | Data Breach Protection Icon
    DriveStrike: Remote Wipe | Data Breach Protection

    . From Fortune 500 to small businesses with remote workers, every industry can gain from premium endpoint security.

    DriveStrike protects devices and data in the event of loss, theft, or use in remote locations. Remotely locate, lock, and wipe devices you manage to prevent data compromise. DriveStrike prevents data breaches to ensure confidentiality, compliance, and a competitive edge.
    Learn More
  • 5
    Live Security/Forensics Linux Distribution, built from scratch and packed full of tools useful for vulnerability analysis, penetration tests, and forensic analysis.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next