With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Fwpass is a daemon that executes commands in response to specific sequence of incoming IP packets. It does not use TCP/IP sockets but relies on ULOG functionality of Netfilter (Linux kernel built in firewall).
To develop an auditing package that is compliant with the U.S. Governments C2 standards for security and, if possible, provides a mechanism for allowing the information collected to be admissible as evidence in a court of law.
Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.
Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
IPKungFu is an iptables-based Linux firewall. The primary design goals are security, ease of use, and performance, in that order. It takes advantage of advanced features of iptables, tcpwrappers, and the Linux kernel.
KISS is a kernel-side host-oriented security tool, which may bring you file integrity checking, file and process hiding and actions handling on special internal events (using a tiny scripting language).
A linux kernel module and supporting user space environment which allow interception and modifying system calls that match user defined criteria. Think of it as strace on steroids.
stands for Active Integrity Software, provide quick alert of elf file modifications.
Based on Gnu/Linux OS, with a daemon to analyse datas give by the kernel module, written in C.
The Firewall Configurator for Webmin is a Webmin module written in Perl/CGI. It helps to build rules for common proxy server Squid and common paketfilter Iptables ( linux kernel 2.4.x ).
ProSum is a terminal based program that protects your files, sys_call_table and IDT like tripwire way (All in user space, without kernel modules) In addition, database with files etc. could be encrypted with Blowfish algorythm and more.
The Entropy Gathering Daemon is a portable perl script which provides a source of randomness on systems that lack an in-kernel /dev/random. GnuPG, OpenSSH, and the OpenSSL toolkit can use EGD to seed their random number generators.
RSA-IP is a Linux kernel net _protocol_ which encrypts IPv[4;6] using RSA public/private key.Think of it as a kernel level implementation of ssl. RSA needs prime number so we release a prime searcher.
The Linux Transparent Encryption project aims for integrating transparent read/write access to encrypted data into the linux
kernel. This enables any application to use encrypted data
without modifying the application itself.
LinuxBSM-2 introduces auditing features in Linux kernel to achieve better security and keep an eye on system activities.
Any kernel-derived data can be audited.
This is an add on for the Linux Kernel Patch named Medusa DS9 developed by Marek Zelem, Milan Pikula, and Martin Ockajak. This program will activate and deactivate medusa protections securely. Medusa is at http://medusa.fornax.sk/
How to set up a Linux system to use encryption in disk and network accesses. This document describes how you can use the International Kernel Patch and other packages to make harddisk contents and network traffic inaccessible to others by encryption.
A challenging project that attempts to get a Linux distro to run under Google's NaCl.
NaCl untime environment is very different from traditional posix systems. There is several hurdles to overcome in order to get a standard linux distribution to run under NaCl.
There is a library called nacl_io in the Google NaCl sdk. It mimics the function of a posix files and sockets on top of ppapi. Similarly in naclports there is a crude nacl-spawn library which mimics processes by creating multiple...