With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Cloud tools for web scraping and data extraction
Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.
Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
Packet Auth. Sniffer (or Sequence) Allows you to set on your server this little daemon (pasmal) monitoring tcp/ip & icmp, and on the exact good sequence (the one you only know) run processes (a firewall) - such as access list update, iptables,ipchains.
Open Firewall is a way to agregate some good technologies to make a complete, robust and fast application level firewall. It will provide an open framework for developpers who wish to implement protocol filters.
ferm is a tool to maintain and setup complicated firewall rules. It allows one to reduce the task of carefully inserting rules, thus enabling you to spend more time on developing good rules, and less time on writing them.
LFR is a Linux/Netfilter based firewall/router on a single floppy disk.
Think of it as a micro Linux distribution with a purpose. With LFR you
can take that old 486 with 4 MB of RAM that you have in the closet and
put it to good use. With a pair of ch
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.