Component Content Management System for Software Documentation
Great tool for serious technical writers
Paligo is an end-to-end Component Content Management System (CCMS) solution for technical documentation, policies and procedures, knowledge management, and more.
Learn More
No-code email and landing page creation
Make campaign creation fast and easy with Knak
Built for speed and collaboration, Knak streamlines campaign production with modular templates, real-time editing, simple collaboration, and seamless integrations with leading MAPs like Adobe Marketo Engage, Salesforce Marketing Cloud, Oracle Eloqua, and more. Whether you're supporting global teams or launching fast-turn campaigns, Knak helps you go from brief to build in minutes—not weeks. Say goodbye to bottlenecks and hello to marketing agility.
Bypass your ISP's firewalls and connect to the internet!
...There are many SSH and OpenVPN Server providers in the internet, one is https://www.tcpvpn.com
HTTP Proxy responses override (sourcecode): https://github.com/AlizerDoesJava/respite-proxy-override
Please rate, any feedback is appreciated. The application and server providers are free.
SOCKS Server and Library for Java. Support for versions 4 and 5 of SOCKS protocol. Designed to be easily expandable to support different encryption/authentication/authorization methods. Sample server and client are available.
Carbon is a java based SERVER implementation which caters to different server falvors eg: raw data,HTTP, FTP and so on.
Spawning off from Carbon are different server implementations for HTTP/SOCKS proxy, FTP, HTTP, J2EE which are available in a jar.
This project intends to make a SOCKS compatible tunnel proxy which communicates to the server part, running on your nameserver, over standard DNS (UDP) protocol. That way you can bypass network firewalls allowing no other IP traffic but DNS.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.