With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Cloud tools for web scraping and data extraction
Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.
Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
The package includes tools that make a fully functional user accounting system for a small ISP. Functionality includes: traffic shaping, management of users' accounts, firewall, network monitoring, link quality measurement, alert system, etc.
This is a daemon that emulates Microsoft's Internet Connection Service (ICS). It implements the UPnP Internet Gateway Device specification (IGD) and allows UPnP aware clients, such as MSN Messenger to work properly from behind a Linux NAT firewall.
FBSD-DEV: INSTALL6 is a post installation script that automates several key points and procedures involved in updating and securing FreeBSD. Updating the source and ports, securing system, and the configuration of pf firewall.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
A fast PPTP proxy for any BSD with OpenBSD packet filter installed. It handles multiple transparent bi-directional tunnels, and can be chained from one proxy to another over several servers.
WarpTunnel is a porting of http tunnel 3.3 from C into .NET C# platform. WarpTunnel creates a bidirectional virtual data path tunnelled in HTTP requests through firewall or proxy servers.Support DIGEST proxy & SOCKS4/4a/5.Client for Compact Framework 2.0
A firewall is used to control access to services (eg proxy) depending on the time of day, the day and the hosts the requests come from -- as the need may arise in a school or university. A web interface delegates control of activation to authorized users.
Collection of opensource security tools that enhance the ability of people and companies to secure their environment. These tools will build upon the foundation laid by the security community.
RTelnet is a reverse Telnet, it's increadably useful to get behind firewalls and NAT's or routers running ip masqurading.
very useful for remotely admin someones PC remotely when they don't know how to do anything like opening their firewall.
TRAP is a very innovative and advanced transparent proxy that verifies the integrity of your network communication. It offers a custom scripting language that allows the user full control over the decision making process.
pptp-proxy is a proxy for the Point-to-Point Tunneling Procotol. It handles multiple tunnels on a nat-box driven by pf. pptp-proxy relies on Niels Provos's libevent.
Bruteblock allows system administrators to block various bruteforce attacks on UNIX services. The program analyzes system logs and adds attacker's IP into IPFW table effectively blocking them. Addresses are removed from the table after expiration period
l2tpknock is an add-on plugin for l2tpns servers or clusters and is intended to perform the rule of the port knocking idea, but with l2tp vpns, specifically, the l2tpns project.
BASE+ (Basic Analysis and Security Engine) is based on ACID project. This application provides a web front-end to query and analyze the alerts coming from various IDS systems (e.g. Snort).
A Port Knocking C-based server & client. Stealth mode by closed ports, strong encryption (ARC4 & BlowFish), Daemon mode, compresed sequence, MD5 digest log check, user passwords and user privelege system, action triggers... GPL license.
PacketFlow is a command line utility that processes an XML configuration to generate a set of firewall rules. It is intended to be installed and run directly on the firewall itself. PacketFlow was designed to deal with complex configurations.
ip-session gets info of network trafic, such as sip, dip, sport, dport, etc. from linux kernel; gets account info of each traffic, such as in/out bytes/pkgs, etc.; else, gives session management function, such as query/del, etc.
Auto Proxy Filter Test (APFT) automates the testing of safe and unsafe URLs against a content filtering proxy (such as Dansguardian) and helps prevent regressions. APFT is useful to people who are designing filter rules.
deface-no-tnx is an anti-defacement system that monitors your Web files and notifies you about unallowed changes. It also replaces the defaced page with a standard "error" page,so that no offensive/joking content can be frauodolently added to your site
Web interface written in php for ISC bind and ISC dhcp configuration and administration. It keeps it's own database containing general dns and dhcp information and information about subnets, hosts etc.
Configures DNS, DHCP, firewalls, RADIUS servers..