Alternatives to Nikto

Compare Nikto alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Nikto in 2026. Compare features, ratings, user reviews, pricing, and more from Nikto competitors and alternatives in order to make an informed decision for your business.

  • 1
    Astra Pentest

    Astra Pentest

    Astra Security

    Astra’s Pentest is a comprehensive penetration testing solution with an intelligent automated vulnerability scanner coupled with in-depth manual pentesting. On top of 10000+ tests including security checks for all CVEs mentioned in the OWASP top 10, and SANS 25, the automated scanner also conducts all tests required to comply with ISO 27001, HIPAA, SOC2, and GDPR. Astra offers an interactive pentest dashboard that the user can use to visualize vulnerability analyses, assign vulnerabilities to team members, and collaborate with security experts. And if the users don’t want to get back to the dashboard every time they want to use the scanner or assign a vulnerability to a team member, they can simply use the integrations with CI/CD platforms, Slack, and Jira.
    Compare vs. Nikto View Software
    Visit Website
  • 2
    N-Stalker

    N-Stalker

    N-Stalker

    N-Stalker Web Application Security Scanner X is a sophisticated Web Security Assessment solution for your web applications. By incorporating the well-known “N-Stealth HTTP Security Scanner” and its 39,000 Web Attack Signature database along with a patent-pending Component-oriented Web Application Security Assessment technology, N-Stalker is a “must have” security tool to developers, system/security administrators, IT auditors and staff. Most complete package for developers, IT security and governance professionals. It contains security checks for web application and server infrastructure. For Web Server Administrators and IT Professionals, a solution to assess security of your web server infrastructure. A community edition with a restricted set of security checks for both application and web server infrastructure.
    Starting Price: $499 per year
  • 3
    QuickPatch+

    QuickPatch+

    Imunify360

    Vulnerability scanner for Plesk that provides reliability, configuration recommendations and automatic fixes for servers running Plesk control panel. Quick Patch+: Analyzes your server configuration and allows you to select and fix vulnerabilities from within the UI; Allows you to configure the automatic daily fix of all vulnerabilities, or only critical ones; Provides email and dashboard notifications for automatically fixed vulnerabilities and newly discovered critical vulnerabilities. If your website or web application’s security is compromised, it can become unresponsive, unavailable, or even dangerous. The impact on your business can be substantial. For a small monthly fee, you can protect your web server with a hands-off, automated approach.
    Starting Price: $6 per server per month
  • 4
    Nsauditor Network Security Auditor
    Nsauditor Network Security Auditor is a powerful network security tool designed to scan networks and hosts for vulnerabilities, and to provide security alerts. Network Security Auditing Software and Vulnerability Scanner Network Security Auditing Software and Vulnerability Scanner Nsauditor network auditor checks enterprise network for all potential methods that a hacker might use to attack it and create a report of potential problems that were found. Network Security Auditing Software and Vulnerability Scanner Network Security Auditing Software and Vulnerability Scanner Nsauditor network auditing software significantly reduces the total cost of network management in enterprise environments by enabling IT personnel and systems administrators gather a wide range of information from all the computers in the network without installing server-side applications on these computers and create a report of potential problems that were found.
    Starting Price: $69 one-time payment
  • 5
    DefectDojo

    DefectDojo

    10Security

    Take DefectDojo for a spin and review the demo of DefectDojo and login with sample credentials. DefectDojo is available on Github and has a setup script for easy installation. A docker container with a pre-built version of DefectDojo is available. Know exactly when new vulnerabilities are introduced in a build or remediated. Tracking when a product is assessed is easily accomplished using DefectDojo's API to track security tests that are run on each build. DefectDojo has the ability to track the build-id, commit hash, branch or tag, orchestration server, source code repo, and build server for every on-demand security test. Various reports are available for tests, engagements, and products. Products can be grouped into critical products to track products that are critical to your organization. Similar findings can be easily merged into one finding to provide developers one finding instead of multiple findings.
  • 6
    Vega

    Vega

    Subgraph

    Vega can help you find and validate SQL Injection, cross-site scripting, inadvertently disclosed sensitive information, and other vulnerabilities. It is written in Java, GUI based, and runs on Linux, OS X, and Windows. Vega can help you find vulnerabilities such as: reflected cross-site scripting, stored cross-site scripting, blind SQL injection, remote file include, shell injection, and others. Vega also probes for TLS / SSL security settings and identifies opportunities for improving the security of your TLS servers. Vega includes an automated scanner for quick tests and an intercepting proxy for tactical inspection. The Vega scanner finds, SQL injection, and other vulnerabilities. Vega includes a website crawler powering its automated scanner. Vega can automatically log into websites when supplied with user credentials.
  • 7
    Vulkyrie

    Vulkyrie

    Vulkyrie

    More than 100,000 vulnerabilities were reported for commonly used software over the last five years. In 2019 alone, more than 22,000 were reported and 1 out of 3 was given a High or Critical severity rating. Our free vulnerability scanning can help find your security issues before the bad guys do. Our Free plan comes with no limits on the number of IP addresses and URLs, and no limits on the number of vulnerability scans you can run. Unlike free trials, free versions or community editions of other vulnerability assessment tools, you no longer have to choose between your web servers, Windows servers, network devices or virtual machines. Take the first step towards better vulnerability management without the complexity and steep learning curve. Our web-based solution provides you with an easy-to-use interface to manage your security testing. Simply add your IP address or URL to start a scan and use our portal to get the issues and recommended security measures.
    Starting Price: $99 per month
  • 8
    Scuba Database Vulnerability Scanner
    Scuba Database Vulnerability Scanner. Download Scuba, a free tool that uncovers hidden security risks. Scan enterprise databases for vulnerabilities and misconfiguration. Know the risks to your databases. Get recommendations on how to mitigate identified issues. Available for Windows, Mac, Linux (x32), and Linux (x64), Scuba offers over 2,300 assessment tests for Oracle, Microsoft SQL, SAP Sybase, IBM DB2 and MySQL. Scuba is a free tool that scans leading enterprise databases for security vulnerabilities and configuration flaws, including patch levels, that allows you to uncover potential database security risks. It includes more than 2,300 assessment tests for Oracle, Microsoft SQL Server, SAP Sybase, IBM DB2 and MySQL. It’s possible to run a Scuba scan from any Windows, Mac or Linux client. Depending on your database size, users, groups and network connection, an average Scuba scan normally takes 2-3 minutes. No pre-installation or other dependencies are required.
  • 9
    Panoptic Scans

    Panoptic Scans

    Panoptic Scans

    Panoptic Scans is a vulnerability scanning software offering automated security assessments for applications and networks. Leveraging OpenVAS, ZAP, Nuclei, and Nmap, it identifies security issues and scans for OWASP Top 10 vulnerabilities, delivering detailed reports for easy remediation. The Attack Narratives feature illustrates how weaknesses can be exploited in combination by attackers. Scheduled scanning ensures consistent monitoring without manual effort, while OpenVAS and ZAP provide thorough network and application security testing. The platform includes a user-friendly interface, email notifications, and fully managed scanners, removing server maintenance concerns. It supports white-label reporting and ensures reliable performance through its managed infrastructure.
    Starting Price: $25/month
  • 10
    kWS

    kWS

    Kamran Zafar

    kWS is a lightweight and fast Web Server especially designed for Android mobile devices. It can be used to host websites and to serve files over HTTP. kWS implements HTTP-1.0. Basic & digest authentication for secure access. Server side includes (SSI). Directory index, directory downloads in tar, tgz & zip formats. Resumable file downloads, built-in Dynamic DNS updates, up to 20 parallel connections, comprehensive HTTP logs. HTTPS/TLS support with BKS & PKCS12 keystores. Password-based file encryption (128 bit AES & Triple DES). GZip file compression, directory index in JSON & XML formats and index sorting, highly configurable with support for up to 999 per-port parallel connections. Directory level configuration, support for more Dynamic DNS providers like ZoneEdit etc. kWS also provides auto start on boot.
  • 11
    PatrolServer

    PatrolServer

    PatrolServer

    Over half a million servers get attacked on a daily basis due to outdated software. We scan your server real-time for outdated software and exploits. We generate reports which you can view in your dashboard. We support over 160,400 software packages and modules. The team keeps adding new software detections on a daily basis. We spy on software manufacturers and instantly add their newest software version and exploits in our system. This information is instantly available on your dashboard and is sent to you in an email with further details on how to fix. Build great applications using the PatrolServer API and bring the strength of our scanner to your users.
    Starting Price: $9.99 per month
  • 12
    VulnSign

    VulnSign

    VulnSign

    VulnSign is an online vulnerability scanner that is fully automated, customer-orient configurable and has advanced features. VulnSign can scan any type of web application, regardless of the technology it was built with. It uses a Chrome based crawling engine and can identify vulnerabilities in legacy, and custom built, modern HTML5, Web 2.0 applications and Single Page Applications (SPA). It also has vulnerability checks for popular frameworks. The VulnSign vulnerability scanner is very easy to use and most of the pre-scan configuration can be automated. It is an all in one vulnerability management solution, with multi user support and integration capabilities. Though to test it all you need to do is specify the URL and credentials (to scan password protected websites), and launch a vulnerability scan.
    Starting Price: $49/month/team
  • 13
    LoadComplete

    LoadComplete

    SmartBear

    LoadComplete is a load testing tool for creating and running automated load tests for web servers and services. It will help you check your web server’s performance under a massive load, determine its robustness and estimate its scalability. Load testing consists in simulating a massive load (requests) on a web server. LoadComplete automates creating load tests by recording actions you perform over web pages and simulating these actions with dozens and hundreds of virtual users working simultaneously. Each virtual user simulates a recorded scenario, and the entire load test simulates a real-life massive load on the server. LoadComplete produces detailed test results for generated traffic. You can also monitor various server metrics (like CPU usage) during the test run.
  • 14
    Yandex DNS
    Yandex has over 80 DNS servers located in different cities and countries. Each user's queries are processed by the server closest to him/her, that's why sites open faster with Yandex DNS in "basic" mode. Some websites on the internet contain malware that is capable of infecting your computer with a virus. Sometimes viruses can be located even on a checked site. Other pages are created by hackers and steal passwords and personal information or take money from telephone accounts. When attempting to open a site in "safe" and "family" modes, Yandex DNS will block the download of any information from it and warn the user. Yandex uses its own anti-virus software that checks sites for malware. Yandex DNS uses its own anti-virus software operating on Yandex algorithms, as well as signature technology by Sophos. Each time you go to a webpage, the browser looks for its address in the DNS system. The faster the nearest DNS server to you works, the faster the site opens.
    Starting Price: Free
  • 15
    Dovecot

    Dovecot

    Dovecot

    Dovecot is an excellent choice for both small and large installations. Dovecot is among the best performing IMAP servers while still supporting the standard mbox and Maildir formats. The mailboxes are transparently indexed, which gives Dovecot its good performance while still providing full compatibility with existing mailbox handling tools. Dovecot is standards compliant. Dovecot passes all IMAP server standard compliancy tests while most other servers fail many of them. Dovecot’s indexes are self-optimizing. They contain exactly what the user’s client commonly needs, no more and no less. Dovecot is self-healing. It tries to fix most of the problems it notices by itself, such as broken index files. The problems are however logged so the administrator can later try to figure out what caused them. Dovecot tries to be admin-friendly. Common error messages are made as easily understandable as possible.
    Starting Price: Free
  • 16
    Shoviv NSF to PST Converter
    Shoviv NSF to PST Converter software provides a fast and safe conversion process to convert Lotus Notes to outlook. The software is capable to convert unlimited mailboxes from Lotus Notes to Outlook PST, EML, MSG in a single attempt. It Supports all MS Exchange, IBM Domino Server, Lotus Notes and MS Outlook. It provides the free trial version of this tool to know how is it works and what type of features inbuilt in this tool. Shoviv NSF to PST software aids to convert NSF email items into customary EML and MSG file formats. By this, a handler can access email items in various email clients. Options of converting NSF files in multiple formats make software feasible for a wide range of customers. The tool does not alter the original data structure while exporting NSF mailboxes to Outlook PST files. It maintains the hierarchy of the folder and the integrity of the data. The highly advanced algorithm of Shoviv NSF to PST Converter makes it a professional utility.
  • 17
    SysTools Exchange Log Analyzer
    Provides a save scan option to load the saved exchange log file. Export scanned Exchange files into multiple file formats. Provides support for export as PDF, MSG, EML, and HTML options. Exchange log analyzer provides the option to repair corrupt Exchange log files. Provision to analyze Exchange server log file along with all data items. It does not impose any edb.log file size limitation. EDB file is necessary to analyze and open Exchange log files. Supports various Exchange versions to extract emails from Exchange database files. Option to perform a date-based filter on Exchange Log files. A user can use the Exchange Log Analyzer tool to view & load transaction edb.log of the Exchange server. The software will first analyze the Exchange log reader file and then, provide a view of all the required data such as emails from Exchange Server 2016, 2013, 2010, and 2007 transaction log files file. However, it is necessary to have an EDB file also to perform log analysis.
    Starting Price: $29 per month
  • 18
    Probely

    Probely

    Probely

    Probely is a web vulnerability scanner for agile teams. It provides continuous scanning of web applications and lets you efficiently manage the lifecycle of the vulnerabilities found, in a sleek and intuitive web interface. It also provides simple instructions on how to fix the vulnerabilities (including snippets of code), and by using its full-featured API, it can be integrated into development processes (SDLC) and continuous integration pipelines (CI/CD), to automate security testing. Probely empowers developers to be more independent, solving the security teams' scaling problem, that is usually undersized when compared to development teams, by providing developers with a tool that makes them more independent when it comes to security testing, allowing security teams to focus on more important and critical activities. Probely covers OWASP TOP10 and thousands more and can be used to check specific PCI-DSS, ISO27001, HIPAA, and GDPR requirements.
    Starting Price: $49.00/month
  • 19
    Gerrit Code Review
    Read old and new versions of files with syntax highlighting and colored differences. Discuss specific sections with others to make the right changes. Gerrit includes Git-enabled SSH and HTTPS servers compatible with all Git clients. Simplify management by hosting many Git repositories together. Schedule git gc over all managed repositories and replicate to geographical mirrors for latency reduction and backup servers for hot spare redundancy. Gerrit Code Review can be extended and further customized by installing server-side plugins. Source code for additional plugins can be found through the project listing.
  • 20
    Edgescan

    Edgescan

    Edgescan

    Validated web application vulnerability scanning on-demand when you want it, and scheduled as often as you need. Validation and rating of risk, trending and metrics on a continuous basis, all available via our rich dashboard for superior security intelligence. You can use the vulnerability scanning and validation service as much as you like, Retest on demand. Edgescan can also alert you if a new vulnerability is discovered via SMS/email/Slack or Webhook. Server Vulnerability Assessment (Scanning and Validation) covering over 80,000 tests. Designed to help ensure your deployment be it in the cloud or on premise is secure and configured securely. All vulnerabilities are validated and risk rated by experts and available via the dashboard to track and report on when required. Edgescan is a certified ASV (Approved Scanning Vendor) and exceeds requirements of the PCI DSS by providing continuous, verified vulnerability assessments.
  • 21
    Macrorit Disk Scanner
    Hard disk bad sector is the most common problem and the disk is not safe to store data any longer. The bad sectors will cause important data loss and blue screen errors sometimes, and even slow disk speed. Macrorit Disk Scanner is a third-party portable disk surface test and hard drive health diagnostic tool, which provides you with better options and performance than a Windows native disk scanner. With the fastest algorithm, this disk scanner-free software usually could reach the maximum speed that is supported by the device. It is compatible with all recent versions of Microsoft Windows - both client and server and supports major storage device types such as IDE, SATA HDD and SSD, SCSI, FireWire, hardware RAID, flashcards, and more. Install and launch the Macrorit Disk Scanner, and choose the disk you want to check. Easy to find where are the bad sectors are in the scan log. Surface test on hard drives and you can define the scan area.
    Starting Price: $18.95 one-time payment
  • 22
    RecoveryTools for SQL Server
    Intelligent SQL database recovery software recommended by various database administrators around the world for repairing SQL Server databases. Scan and repair damaged SQL primary database MDF file and secondary NDF files with all objects. It also retrieves all the records from tables, views, stored procedures, rules, and triggers. If your SQL Server database is damaged and cannot be repaired, you can restore the database from a recent backup. However, the problem arises when you need to perform an object-level recovery instead of a full database backup. The checks performed by Microsoft SQL Server DBCC CHECKDB may fail due to issues such as file system corruption, driver issues, hardware failures, SQL Server engine issues, or page-level corruption in memory. The SQL Server database file becomes unusable due to a ransomware attack on the victim's system and is encrypted with a .wallet file extension.
    Starting Price: $249 one-time payment
  • 23
    Server Check

    Server Check

    FearWorks Media Ltd.

    The Server Check Monitoring System continually monitors your websites and other internet-based services (Ping, SMTP, IMAP, FTP, etc.) and makes sure you're the first to know when there's an outage. Don't lose any more visitors to downtime. Our FREE 10-monitor version of Server Check lets you get started with monitoring in less than five minutes completely free! Get alerted as soon as something stops working: visual alerts, audible alarms, emails and SMS texts to as many admins as you need. Server Check makes sure you know about it so you can fix it! Quick setup of all common protocols, including HTTP & HTTPS, Ping, FTP, SMTP, POP3, IMAP, TCP, MySQL. Monitor them all and stay ahead of any long outages that might lose customers! View statistics for each monitor, response time graphs, outage length reports, web-based stats and uptime pages, and keep track of uptime and downtime over the last 12 months.
    Starting Price: Free
  • 24
    HeavyLoad

    HeavyLoad

    JAM Software

    The freeware stress test tool HeavyLoad was developed to bring your PC to its limits. It can be installed on any edition of Windows and client/server versions (32-bit and 64-bit) currently supported by Microsoft. HeavyLoad puts your workstation or server PC under a heavy load and lets you test whether they will still run reliably. Be mobile: Install HeavyLoad as a portable version e.g. on a USB stick and use it as your benchmarking software to go! Check your most important systems in advance to see whether they can withstand the highest loads with our computer performance test. Thanks to an intuitive graphical user interface and visual feedback, no expert knowledge is required for our benchmarking software.
  • 25
    System Guard for SAP

    System Guard for SAP

    Novaline Information Technologies

    Powerful monitoring tool for SAP with real time alerts. System Guard is a SaaS tool, it's a SAP certified solution. Receive instant critical alert when SAP server shuts down or there is a network & connectivity problem, system crash & failure, failed or stopped process on operating system. Checks server status / availability, makes ping test online to servers every minute. Minimizes unplanned downtime, system & service outages. Automatically creates performance profile & statistics by measuring response time 24 / 7 by diagnostics, determines system baselines & metrics and normal ranges with a smart algorithm without needing any fixed thresholds. Graphically presents performance statistics on dashboards and visualizes load balancing on servers.
  • 26
    RdpGuard

    RdpGuard

    RdpGuard

    It monitors the logs on your server and detects failed logon attempts. If the number of failed logon attempts from a single IP address reaches a set limit, the attacker's IP address will be blocked for a specified period of time. Many Windows Server machines are under constant attack. Network scanners and RDP brute-force tools work 24/7. Eventually they may find a password to access your server! Moreover, RDP brute-force attacks abuse server resources (CPU, RAM, Disk Space and Network Bandwidth). Take a look at your server's Security EventLog. How many failed login attempts do you see? The log may note thousands of failed login attempts from a single IP address. This means that someone is trying to find a password to access your server.
  • 27
    Pound

    Pound

    Apsis IT Security

    The Pound program is a reverse proxy, load balancer and HTTPS front-end for Web server(s). Pound was developed to enable distributing the load among several Web-servers and to allow for a convenient SSL wrapper for those Web servers that do not offer it natively. Pound is distributed under the GPL - no warranty, it's free to use, copy and give away. Pound is a very small program, easily audited for security problems. It can run as setuid/setgid and/or in a chroot jail. Pound does not access the hard-disk at all (except for reading certificate file(s) on start, if required) and should thus pose no security threat to any machine.
  • 28
    Spam Marshall

    Spam Marshall

    ITA Networks

    Spam Marshall has kept Exchange servers spam-free since 2003, as hundreds of small and medium-sized businesses throughout the world have come to rely on Spam Marshall as their first line of defense in keeping corporate inboxes clean. Spam Marshall's proprietary Customs Rules Engine Technology (CuRE) is a leading-edge tool that prevents spam from infiltrating Exchange Servers on multiple fronts: SpamMarshall features include Real-time monitoring, Usage of content filters, Grey Listing, Anti Phishing, SPF Check, PTR Check, Incoming emails rate control, Domain type checks, Domain age check to name a few. Spa Marshall provides administrators with all the tools to customize filtering options. Spam Marshall is scalable, flexible and affordable and takes a few minutes to install. Licenses begin at only $749, and it runs seamlessly on Exchange 2000, 2003, 2007 and 2010 or any other SMTP Server. It is supported on Windows 2000, 2003, and 2008 and is available in both x386 and 64bit versions.
    Starting Price: $749 one-time payment
  • 29
    ImunifyAV

    ImunifyAV

    Imunify360

    From malicious code such as PHP (WordPress, Joomla or Drupal), or built with classic, static HTML, keeping malicious code out of your files is essential for the protection of your websites. ImunifyAV, the free malware scanner, thoroughly sweeps files and accurately identifies malicious code, notifying you of any issues on your websites. A standard antivirus program that performs regular file checks in the background to keep your server clean. On-Demand Antivirus that can be run at any time by administrators or end-users to check any arbitrary folder against malware. Linux server antivirus is usually recommended in order to ensure that your web-server is protected from malicious attacks, bad bots, spam, worms which could have a negative effect on day-to-day business operations and revenue.
    Starting Price: $12 per server per month
  • 30
    Cardio Server

    Cardio Server

    Epiphany Healthcare

    Make multi-modality and multi-vendor diagnostic test management simple and fast with Cardio Server. Provide flexible workflow solutions for your healthcare organization, from critical access hospitals to large university medical centers, and/or integrated delivery networks. Edit and confirm from virtually anywhere on iOS smart devices with Cardio Server Mobile. Cardio Server recognizes each user at log-in and posts his/her favorites automatically. Different interpretation methods are customizable per physician, per modality. Leverage one interface for all modalities; consolidate multiple device interfaces into one integration. A hardware-independent application that runs on your server on your network in your domain. Use preferred tools for backup, disaster recovery, updates, and anti-virus programs.
  • 31
    10-Strike Network Monitor

    10-Strike Network Monitor

    10-Strike Software

    Organize monitoring of your managed switches, UPS, servers, CCTV systems, IP cameras, DVR, printers, HDD disks, network devices, and services (databases, file or web servers) located on LAN or the Internet. In addition, you can use your own scripts as monitoring checks. Monitor various variables and parameters in managed switches using the SNMP protocol. You can monitor the CPU temperature and various parameters on servers and workstations using WMI. The program generates alerts on failures using sound alarms, log records, screen messages, e-mail or SMS notifications (which can be sent using a USB-connected cell phone or 3G/4G modem that does not require the Internet connection). The flexible alerting mechanism can not only send a notification, but can also try to fix the problem automatically making an attempt to restore the proper device/service operation (by running a script, restarting some service or a PC, etc.).
  • 32
    Eclypsium

    Eclypsium

    Eclypsium

    Eclypsium® ensures the health and integrity of enterprise devices at the fundamental firmware and hardware layers that traditional security fails to protect. Eclypsium provides a new layer of security to defend the critical servers, networking gear, and laptops at the heart of every organization. Unlike traditional security that only protects the software layers of a device, Eclypsium brings security to the hardware and firmware. From the earliest boot process to the most fundamental code on a device, Eclypsium finds and fixes the low-level weaknesses and threats that attackers use to defeat traditional security. Get high-fidelity views into all enterprise devices including servers, networking gear, and laptops. Automatically find vulnerabilities and threats in all hardware and firmware components inside each device. See into devices both on-premises or deployed remotely including remote work and BYOD devices.
  • 33
    Amazon Unified Ad Marketplace (UAM)
    Improve earnings with one simple server-to-server header bidding integration. Access unique demand from Amazon and other buyers. We combine unique product ads from Amazon and demand from buyers. All bidders compete equally and transparently. One integration connects you to all buyers. Automatically set up ad server line items with a few clicks. Access all demand with one click-through agreement. We combine all earnings and send you one payment in just 60 days. Access ads from Amazon and other buyers. Reduce latency with one ad call to our server. Unified Ad Marketplace is an invitation-only service. Generally speaking, UAM is designed for web publishers who directly or exclusively represent their site and use Google Ad Manager (formerly DoubleClick for Publishers or DFP) as their ad server. Buyers on UAM include OpenX, Pubmatic, Magnite Index Exchange, Smaato and more. We are always integrating new demand partners so this list will be updated over time.
  • 34
    CubexSoft Outlook Export

    CubexSoft Outlook Export

    CubexSoft Technologies

    Download CubexSoft Outlook Export on your Windows Operating Systems, which allows you to convert Outlook PST emails, contacts, calendars, tasks to MBOX, PDF, MSG, EML, NSF, Office 365, Thunderbird, Outlook.com, Exchange Server, Hosted Exchange Server, Gmail, G Suite, Yahoo Mail, and IMAP Server. The Outlook Converter is easy export whole of your Outlook PST data file without any error. Sometimes, users want to convert only a desired item folders instead of saving entire Outlook PST data files. To help them easily do so, CubexSoft Outlook Converter provides selective data conversion option and support advance preview function for users to check their selected PST files before the final process. Through this options, users can select only the desired folders which you need to convert to any file format. The tool will automatically do it for you, without any worries of data loss and changes.
    Starting Price: $35.00/one-time/user
  • 35
    Kernel for Exchange Recovery
    Kernel Exchange Recovery Tool works well with any version of Exchange Server Large size recovered EDB files can be chunked and saved in small size PST files. The recovered data is stored in the same mailbox hierarchy as it was before the conversion. It comes with an interactive graphical interface, and hence the user can retrieve inaccessible data from Exchange EDB files and save them to secure formats in no time. It is a savior in sudden Exchange breakdown situations. Offers a three-step process with Copy-Paste and Drag-Drop functions. Can preview all the recovered files before saving them. Saves data in PST format, Exchange Server, Outlook profiles & Office 365. Can be easily used by a layman without any technical knowledge. Can restore from different versions of Exchange like 2019 & 2003. The tool works with all Outlook versions, Exchange versions, and Office 365. This tool comes with a free trial version using which you can save up to 25 items per folder.
    Starting Price: $299
  • 36
    Unibase
    Each year, in the United States alone, there are millions more forms filled out and in need of processing. Most of that forms processing is provided by specialized data entry service providers throughout the world. To remain competitive, service providers must stay current in the area of data capture solutions. Whether it’s called data capture, or forms processing, DMAC is a world leader in the development of data entry and image entry (key from image) software. DMAC works to keep Unibase by DMAC current with operating system changes, image technology changes, and industry changes. Correcting for Windows 7 as part of its branch caching changes dropping records on file updates while Windows 8 does not drop records is an example of operating system related updates. Running with higher pixel density screens in windows 10 is another example. Checking that the latest version of Unibase by DMAC runs on Windows Server 2008R2, Server 2012, Windows Server 2012R2 and on Windows Server 2016.
    Starting Price: $750 per license
  • 37
    CIAgent

    CIAgent

    SNMP Research

    CIAgent® is a ready-to-run SNMP agent that provides both Web-based and SNMP access to manage open systems and servers, including mission-critical Web servers, DNS servers, file servers, and print servers. CIAgent is a foundation for acquiring system status and for processing information from open systems and servers. CIAgent is built on the EMANATE® Master Agent and includes many subagent extensions for system and application management. agent may be configured to perform policy-based automated actions based on threshold events and commands from management applications. In addition, a powerful subagent development kit for building custom extensions can also be purchased as an option. This intelligent agent supports SNMPv1, SNMPv2c, SNMPv3, and HTTP. CIAgent is optionally available as an SNMPv3-Only Edition that supports SNMPv3 and HTTP. This is a special version of CIAgent that has been hardened for use in network environments having the most stringent security requirements to protec
  • 38
    MailHog

    MailHog

    MailHog

    Inspired by MailCatcher, easier to install. MailHog is an email testing tool for developers: Configure your application to use MailHog for SMTP delivery. View messages in the web UI, or retrieve them with the JSON API. Optionally release messages to real SMTP servers for delivery. See MailHog libraries for a list of MailHog client libraries. ESMTP server implementing RFC5321. Support for SMTP AUTH (RFC4954) and PIPELINING (RFC2920). Web interface to view messages (plain text, HTML or source). Supports RFC2047 encoded headers. Real-time updates using EventSource. Release messages to real SMTP servers. Chaos Monkey for failure testing. See Introduction to Jim for more information. HTTP API to list, retrieve and delete messages. See APIv1 and APIv2 documentation for more information. HTTP basic authentication for MailHog UI and API. Multipart MIME support. Download individual MIME parts. In-memory message storage. MongoDB and file-based storage for message persistence.
  • 39
    OpenVAS

    OpenVAS

    Greenbone Networks

    OpenVAS is a full-featured vulnerability scanner. Its capabilities include unauthenticated and authenticated testing, various high-level and low-level internet and industrial protocols, performance tuning for large-scale scans and a powerful internal programming language to implement any type of vulnerability test. The scanner obtains the tests for detecting vulnerabilities from a feed that has a long history and daily updates. OpenVAS has been developed and driven forward by the company Greenbone Networks since 2006. As part of the commercial vulnerability management product family Greenbone Enterprise Appliance, the scanner forms the Greenbone Vulnerability Management together with other Open Source modules.
  • 40
    OutageScope

    OutageScope

    OutageScope

    OutageScope is a community-driven gaming server status monitoring platform built to help gamers quickly understand the real-time health of online game servers. Instead of relying only on official status pages or basic uptime checks, OutageScope combines player-submitted reports, trend analysis, and verified data signals to show whether game servers are operational, experiencing issues, or trending with outages. The platform tracks server status across a wide range of popular games and highlights problem trends over different timeframes, making it easier to spot recurring issues or sudden disruptions. Each game page also includes recent community feedback, allowing players to read real experiences such as login failures, connection drops, or matchmaking problems.
  • 41
    AWebServer
    AWebServer will let you share your files from your phone to any device or computer easily. You can explore the files with any SO or browser through wireless. AWebServer is an easy and friendly solution to publish your own web in your Android device with PHP and all the features that Apache brings. MariaDb the old MySQL server is also included and the MyPhpAdmin application has been installed and ready to work with. Has integrated a FTP server to upload the contents and is compatible with Android 4 and above. This app is based on the famous and stable Apache 2 server, known by its stability in Android devices. Improved look of Apache indexes files. Updated servers for 64 bits arch and phpMyAdmin. Distributed appbundle to reduce size of the app.
  • 42
    Nevron Vision for SSRS

    Nevron Vision for SSRS

    Nevron Software

    Nevron Vision for SSRS delivers exclusive enhancements to your reports in all versions of Reporting Services. No other solution for SSRS offers more data visualization power, features, performance, and flexibility – all integrated inside the native Reporting Services designer and server environment. All aspects of enterprise report authoring are significantly enhanced by this suite of SSRS custom report items. The suite includes superior Chart, Gauge, Map, and Barcode custom report items (CRI) that feature unmatched flexibility, advanced visual editors, and a feature set that supersedes the native SSRS report items. The CRI items in the suite easily integrate with your data and provide 100% backward and forward reports compatibility, which allows you to easily migrate reports across different versions of SQL Server. If you’re looking for a set of CRI items that extends the data visualization capabilities of SSRS then Nevron Vision for SSRS is the only option.
    Starting Price: $2299.00
  • 43
    Count Inventory
    Count all your inventory quickly and easily. Install the Server App onto any QuickBooks Desktop that will be turned on during counting , or install it onto your QuickBooks Data Server. It runs in your System Tray. Works with any Android device. You can use your Android phone, or a more ruggedized Android device with a built in Scanner. We can help you select a device or we can optionally provide the scanner device. You are free to use any Android based device! No more confusion to get set up and running. We will help. We can guide you through the process, access your computer to help, and also provide short help video’s to make it easy. Scan your QuickBooks Item Barcode or Enter it manually. We retrieve all inventory information on the item so you can verify , and update the Quantity to the proper Value.
  • 44
    dbForge Unit Test
    dbForge Unit Tests for SQL Server is a GUI-based tool available as an add-in for SQL Server Management Studio. This tool enables users to implement and automate unit testing directly within SSMS. Key Features: Customizable unit tests for SQL Server databases Direct test execution with the convenient single-tab Test List Manager Access from the SSMS Object Explorer Extensive tSQLt management Unit tests in T-SQL Predefined unit tests Test class management You can always find the latest version of the product on t
    Starting Price: $169.95
  • 45
    Servers Ultimate

    Servers Ultimate

    Ice Cold Apps

    Now you can run almost every server you can think of. For example a web server, database server or storage server! Start a server easily on the 'Simple' tab or go advanced and add users, allowed IP's and more! Multiple servers can be run at the same time and no root is needed. This app will work for 7 days after which you will need to buy the paid version. You can only add two servers in this version. Unfortunately, we need to do this to support development. Provides 18 network tools! Remote control support, includes a PHP Server, NAS Server, dedicated server and/or honeypot! Encryption for settings and password support! Tasker/Llama support! Start and stop servers using WIFI/SMS/call/power or cronjob rules! Or use the 'Trigger Server' for more! Set a port, network interface to listen on, backlog, logging (to file), etc. If rooted set a port below 1024. Provides Widget support and much more!
  • 46
    Accelix Online Auction System
    The Accelix online auction system is a flexible solution for supporting online auctions. The system has been designed to be highly-scalable and capable of supporting large numbers of bidders in an active auction. The Accelix auction system is oriented toward lot-based block auctions where a catalog of items is prepared for entry into the system in advance, and the auction takes place for all the items in the catalog over a fixed period of time. Unlike the commodity auction programs that cost a few hundred dollars, run on Windows servers, and can handle a few hundred people before they break under load, the Accelix auction system is an enterprise-based system that runs on several servers in order to distribute database I/O and web transactions. While it is possible to run the system on a single server, we generally recommend a minimum of three database servers and three web servers.
  • 47
    Speed Test WiFi Analyzer
    Expert network testing and analysis tools, for WiFi, Ethernet, 4G/LTE and 5G/NR. Internet and iPerf3 speedtests. Wireless coverage 360 analysis. WiFi scanner and channel maps (inc. beacon signal IE decodes). LAN connected device scanner, who’s using the network. Internet or iPerf3 (server & client included). Concurrent ping, DNS, and HTTP latency results, in multiple servers with the configurable load. Remote uptime monitoring 24/7 of outages or slowdowns. Analyze wireless network coverage, in a home, a business or a venue. Using the Internet or iPerf3 speed testing (alongside WiFi analysis and concurrent ping/DNS/HTTP loads). Detailed network performance statistics, overall and for every specific location. Immediate results, no need to prepare, upload or manage floor plans. With detailed stats for RSSI, Phy speed, local and Internet pings, and much more. Quick and easy to use (no need for floor plans).
    Starting Price: $23 one-time payment
  • 48
    XBOW

    XBOW

    XBOW

    XBOW is an AI-powered offensive security platform that autonomously discovers, verifies, and exploits vulnerabilities in web applications without human intervention. By executing high-level commands against benchmark descriptions and reviewing outputs it solves a wide array of challenges, from CBC padding oracle and IDOR attacks to remote code execution, blind SQL injection, SSTI bypasses, and cryptographic exploits, achieving success rates up to 75 percent on standard web security benchmarks. Given only general instructions, XBOW orchestrates reconnaissance, exploit development, debugging, and server-side analysis, drawing on public exploits and source code to craft custom proofs-of-concept, validate attack vectors, and generate detailed exploit traces with full audit trails. Its ability to adapt to novel and modified benchmarks demonstrates robust scalability and continuous learning, dramatically accelerating penetration-testing workflows.
  • 49
    whatsmydns.net

    whatsmydns.net

    whatsmydns.net

    whatsmydns.net lets you instantly perform a DNS lookup to check a domain name's current IP address and DNS record information against multiple nameservers located in different parts of the world. You can test changes made to new or existing domains and see if they have been updated correctly without the need to manually query remote servers. This gives you immediate insight into how users globally may be resolving DNS records for your website, email or other online service. Many operating systems include DNS tools to check DNS records manually for diagnosing problems. However, using these tools can be complicated to understand for non-technical people which is why the whatsmydns.net DNS checker was created to help with quickly checking DNS propagation.
    Starting Price: Free
  • 50
    DNS Inspect

    DNS Inspect

    DNS Inspect

    DNSInspect helps you to spot domain errors through comprehensive tests. This tool checks your name, mail, and web servers for common problems and errors generating a nice report. The DNS (Domain Name System) is a big and hairy beast. This tool was built based on what We've learned over the years with great support from the users. We're constantly improving this tool, after the inclusion of IPv6 support our next goal is to add support for DNSSEC.
    Starting Price: Free