Effortlessly manage macOS, iOS, iPadOS and tvOS devices across multiple clients and locations.
The Most Powerful Apple Device Management Tool for MSPs and IT Teams
Addigy solutions accelerate Apple adoption in any environment.
Learn More
Cortex: Boost Developer Coding Skills
Cortex makes coding easier and faster for developers. See how our portal connects tools and cuts busywork.
Cortex is a simple portal that helps developers work smarter by linking all your tools, setting clear rules, and slashing repetitive tasks. It speeds up onboarding, updates old code, and fixes issues fast. Over 100 big companies use it to save time and get better results.
maXbox is a script tool engine, compiler and source lib all in one exe
The Art of Coding: maXbox is a script tool engine, compiler and source lib all in one exe to design and code your scripts in a shellbook! It supports Pascal, Delphi (VCL), Python (P4D), PowerShell and Java Script (Edge WebView).
The startJ is a small but very powerful java integrated development environment, which provides multiple document edit, code reformat, compile, decompile and automaticliy generate C++/delphi JNI wrapper code.
MyL is a hyper productive programming language oriented to concepts, created to simplify and accelerate the development of commercial applications for web and desktop, using a "Straight to the point" syntax.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.