With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure
Native application identity and user-based security for your Azure cloud
Gain integrated visibility across all traffic in a single pass. Deploy Palo Alto Networks VM-Series to determine application identity and content while automating security policy updates via rich APIs.
PySnooper is a simple yet powerful Python debugging utility. Just add a @pysnooper.snoop() decorator, and it logs line-by-line execution with timestamps and local variable tracking—saving you from inserting print() statements manually.
SpoofMAC is a command-line utility for changing and restoring MAC addresses on network interfaces in Linux and macOS systems. The project allows users to randomize or manually configure MAC addresses to improve privacy, testing flexibility, or network anonymity in various environments. It automates low-level networking commands and provides a user-friendly interface for managing interface states and address changes safely.
scanmem is a debugging utility designed to isolate the address of an arbitrary variable in an executing process. scanmem simply needs to be told the pid of the process and the value of the variable at several different times. After several scans of the process, scanmem isolates the position of the variable and allows you to modify its value.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
ClassGhost is a small utility that can redefine class files within a running JVM. ClassGhost allows you to directly inject the newly compiled class files in to the VM without interrupting the running application. Works with multiple as well as remote VMs
This is a simple, modular PHP class designed to record execution time benchmarks throughout different parts of a script. Compatible with virtually any PHP script, the code can be added/removed quickly and with ease. Accurate to the microsecond.
A logging utility for C++ applications. It supports levels of escalation and safety within multiple threads. Optional "ghost" output for specific messages to stream, in order to log and print to screen at the same time.
Java script lightweight logger utility that helps log event messages of different severities debug/info/warn/error.
The logs gets inserted into collapsable div (can be toggled to collapse or expand) on the right top corner of the web page.
GDB patch for debugging embedded ARM system via JTAG debug interface. The embedded and extended Python interpreter make OS-aware debug session possible, and also provide flexible NOR/NAND flash utility.
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Cross-Crash is an enhancement to the existing Crash utility that analyzes the linux kernel core dumps by Linux Kernel Crash Dump (LKCD). It allows the analysis of core dumps on hosts that are not of the same architecture the dumps were originated from.
System monitoring utility, written in plain C. Allows application execution and performance monitoring, saving results into XML files. Monitors CPU, memory, network and disk usage on a per-application or per-system basis.
Serial line sniffer (slsnif).
slsnif is a serial port logging utility. It listens to the specified serial port and logs all data going through this port in both directions.
Jar Browser is a Java development utility for searching and browsing the contents of a set of jar and zip files. It supports searching for classes across multiple jars, plus a variety of other features. Great for solving CLASSPATH issues.
CTrace is a multi-threaded trace debug library written in C. It provides a simple, fast, well documented trace utility for applications and as such is especially suitable for use in real-time embedded applications.
This is a Linux command line utility to preprocess, tokenize, and "burn"
PBasic source files to Parallax Inc.'s Basic Stamp II series of
Microprocessors.
xtrace - eXtended trace utility, similar to strace, ptrace, truss, but with extended functionality and unique features, such as dumping function calls (dynamically or statically linked), dumping call stack and more.
lsstack is a Linux implementation of the "pstack" utility from Solaris
lsstack is a command line utility which (efficiently and quickly) prints the call stacks for all threads in a specified process,
with symbolic names for functions, where symbols ar
httptrace - TCP/HTTP trace utility (for Java or Win32/jview.exe)
Listens on a TCP/IP port, redirects data to another port and writes traces.
Several options (search for patterns, ...).
DragnDrop is a simple cross-platform utility to assist in debugging and monitoring drag-n-drop and clipboard interactions. It is of use to both developers and end users.
This is a memory checker utility that provides memory allocation and release functionality. It uses the memory paging system to allocate a guard page after each page of memory to provide a hardware boundary that can detect memory overflows. This allows for immediate detection of buffer overflow error conditions.
There are many other memory checker programs in existence - why do we need another?