Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.
Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
Explore 10,000+ tools
SIEM | API Security | Log Management Software
AI-Powered Security and IT Operations Without Compromise.
Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can:
Bash script that uses iproute2 and shapecfg (shaper.o) to limit incoming and outgoing traffic on a linux router. Also haves option for supporting more than 100 shapers via kernel patch.
sftp server patch for openssh:
- user based ftp session transaction logging
- disable / enable ftp client's ability to chown and chgrp the filesystem
- designate a umask value
This project's single goal is to maintain a patch that allows chrooting of users in OpenSSH.
This patch will cause sshd to chroot when it encounters the magic token '/./' in a users home directory. The directory portion before the token is the direc