With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Cloud tools for web scraping and data extraction
Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.
Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
You can make a simple MSN control (which users can login), web authentication gateway (Horatio based), load balance (iproute2), traffic shape (QoS), simple packet filter and NAT redirects (DNAT), loadbalance and VPN gateway or roadwarrior and ...
...As no proxy server is involved, jkaptive has no performance penalty, nor does it create problems with non-http traffic. Once the token is accepted, jkaptive is out of the way of any network packets completely.
For presenting the login page, jkaptive has a built-in webserver, so no additional webserver application is needed.
Easy to use tool to block unwanted network access.
The iplock tool is a simple iptables extension that allows you to run iptables commands that otherwise require root access in order to block and unblock IP addresses in your firewall.
This is particularly useful if you have a webserver such as Apache2 running a scripting language such as PHP without root permissions. When you detect that a user is likely a hacker (i.e. tries to access a folder named wp-admin on a non-Wordpress website) then you can use iplock <his-IP-address> to block him.
The iptables commands are defined in the configuration file so you can really tweak your firewall to your liking.
Authenticated network access: a lightweight network firewall authentication tool. Horatio is built around a custom Perl webserver and the Linux firewall tools.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
PACIE (Perl Analysis Console for Intrusion Events) Attempts to be a complete replacement for ACID. Place this cgi script on your internal webserver and receive powerfull reporting on your current snort database.