• Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Cloud tools for web scraping and data extraction Icon
    Cloud tools for web scraping and data extraction

    Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.

    Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
    Explore 10,000+ tools
  • 1
    Financial  Supervision  System (SupTech)

    Financial Supervision System (SupTech)

    RegTech / SupTech : Java EE , BI, PM & Report Designer

    ...It significantly reduces time required for performing manual operations - FIRST : Liceninsing Module - EMS : Onsite INspection and Enforcement Module TECHNOLOGY: JBoss / Wildfly ; Enterprise JavaBeans 3.1; Google Web Toolkit GWT ; JBoss WS 4.1.0; Note: Part of project management functionality was moved on JIRA. FINA LLC is a developer of the system.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Query2Report

    Query2Report

    Simple open source business intelligence and reporting solution

    Query2Report provides a simple opensource business intelligence platform that allows users to build report/dashboard for business analytics or enterprise reporting. The application transforms bunch SQL queries to beautiful google charts. The application caters to real time reporting with automatic refresh functionality. Refer to video tutorials Concepts - https://youtu.be/NdEUZ2suiv8 Data Analytics Demo - https://youtu.be/evCf74Ou7kg Data Forecast Demo - https://youtu.be/Nmi1UIDpFpM Report Showcase - https://youtu.be/gxlEGq5iSm8 Getting Started - https://youtu.be/vyU7BUE5rbs Building First Report - https://youtu.be/MZm6rhf2_Ts Source Repo GitHub : https://github.com/yogeshsd/query2report
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Lite Weight Reporter

    Lite Weight Reporter

    Easy, Lite weight, real time, web based, reporting & analytic tool

    ...Each element has title, SQL Query, database connection pointing to database from where data is retrieved and type of graph/table renderer. The application uses google charts (default) or jfree charts to build the charting components. User has to define database connection by providing the username, password, driver and connection URL. We can define multiple database connection pointing to different databases building a report retrieving data from different databases. By clicking on the desired element in the report marks the element to auto refresh every 5 minutes by default (default can be changed).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Downloads: 0 This Week
    Last Update:
    See Project
  • Attack Surface Management | Criminal IP ASM Icon
    Attack Surface Management | Criminal IP ASM

    For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

    Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
    Learn More
  • Previous
  • You're on page 1
  • Next