Run applications fast and securely in a fully managed environment
Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.
Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
Try for free
Try the cloud dialer that managers trust and employees love to use.
Revolutionize your contact center with CallTools
Boost your agents’ productivity and enhance customer engagement like never before with CallTools’ powerful suite of call center features, including predictive dialing, call recording, and multi-touch campaigns with email and SMS capabilities. Get a complete 360-degree view of your agents’ performance and take advantage of real-time reporting. With seamless integration options, advanced queue management, and flexible IVR settings, CallTools ensures a streamlined workflow. Effortlessly manage data targeting and caller ID strategies to optimize connection rates and improve outcomes. Empower your team with a user-friendly interface designed to simplify complex tasks while delivering consistent results.
This command line tool can be used to encrypt and decrypt files and directories using the AWS Encryption SDK. If you have not already installed cryptography, you might need to install additional prerequisites as detailed in the cryptography installation guide for your operating system. Installation using a python virtual environment is recommended to avoid conflicts between system packages and user-installed packages. For the most part, the behavior of aws-encryption-cli in handling files is...
lshell is a shell coded in Python, that lets you restrict a user's environment to limited sets of commands, choose to enable/disable any command over SSH (e.g. SCP, SFTP, rsync, etc.), log user's commands, implement timing restriction, and more.
Send steganographed text messages to mtr with fake hops in the network
Steganoroute is a tool to send steganographed text messages to another computer over the network. The receiver must make a traceroute to the sender using the mtr program (and pressing 'd' once to switch the display mode to the continuous graph). This tool, the sender, creates several fake hops and makes them answer the ICMP packets (or not) to write the letters one by one on the mtr client screen.
Soicmp is a remote shell system, similar to telnet or netcat that allows a user to connect to a remote shell daemon, by using ICMP protocol instead of classical TCP. http://soicmp.sourceforge.net/ http://billiejoex.altervista.org/Prj_Py_soicmp.shtml
. From Fortune 500 to small businesses with remote workers, every industry can gain from premium endpoint security.
DriveStrike protects devices and data in the event of loss, theft, or use in remote locations. Remotely locate, lock, and wipe devices you manage to prevent data compromise. DriveStrike prevents data breaches to ensure confidentiality, compliance, and a competitive edge.
Live Security/Forensics Linux Distribution, built from scratch and packed full of tools useful for vulnerability analysis, penetration tests, and forensic analysis.