Generate interest, access liquidity without selling, and execute trades seamlessly. All in one platform.
Geographic restrictions, eligibility, and terms apply.
Get started with Nexo.
Earn up to 15% annual interest with Nexo.
Access competitive interest rates on your digital assets.
Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform.
Geographic restrictions, eligibility, and terms apply.
Native Python and Ruby bindings for LibVNCServer and LibVNCClient .
Native Python and Ruby language bindings for LibVNCServer and LibVNCClient libraries. Project started with LibVNCClient Python binding implementation. For now only Python versions of 2.7.x and Linux platform are supported.
A MUD-Client for Windows (Win32) and KDE, featuring perl, python and ruby scripting, as well as multi-window output. The main focus is a very strong scripting engine (nearly everything is accessible from a script) while trying to stay user friendly.
A GTK+ MUD client with support for MCCP, MXP, support for the zChat and MudMaster peer-to-peer chat protocols, the MUD sound protocol (MSP), Telnet GA support, regexp trigger support, aliases, Perl and Python plugin support.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.