With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
Collection of opensource security tools that enhance the ability of people and companies to secure their environment. These tools will build upon the foundation laid by the security community.
Enable Linux firewall to support connection tracking and NAT of H.323 protocol. It supports RAS, Fast Start, H.245 Tunnelling, Call Forwarding, Signal Proxy/Softswitch, RTP/RTCP and T.120 based audio, video, fax, chat, whiteboard, file transfer, etc.
RTelnet is a reverse Telnet, it's increadably useful to get behind firewalls and NAT's or routers running ip masqurading.
very useful for remotely admin someones PC remotely when they don't know how to do anything like opening their firewall.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
TRAP is a very innovative and advanced transparent proxy that verifies the integrity of your network communication. It offers a custom scripting language that allows the user full control over the decision making process.
pptp-proxy is a proxy for the Point-to-Point Tunneling Procotol. It handles multiple tunnels on a nat-box driven by pf. pptp-proxy relies on Niels Provos's libevent.
Bruteblock allows system administrators to block various bruteforce attacks on UNIX services. The program analyzes system logs and adds attacker's IP into IPFW table effectively blocking them. Addresses are removed from the table after expiration period
l2tpknock is an add-on plugin for l2tpns servers or clusters and is intended to perform the rule of the port knocking idea, but with l2tp vpns, specifically, the l2tpns project.
A Port Knocking C-based server & client. Stealth mode by closed ports, strong encryption (ARC4 & BlowFish), Daemon mode, compresed sequence, MD5 digest log check, user passwords and user privelege system, action triggers... GPL license.
ip-session gets info of network trafic, such as sip, dip, sport, dport, etc. from linux kernel; gets account info of each traffic, such as in/out bytes/pkgs, etc.; else, gives session management function, such as query/del, etc.
deface-no-tnx is an anti-defacement system that monitors your Web files and notifies you about unallowed changes. It also replaces the defaced page with a standard "error" page,so that no offensive/joking content can be frauodolently added to your site
brutesshd is an application written in c/php in order to prevent bruteforce attacks through ssh. Brutesshd uses iptables/pfctl tools to block this type of attacks
TuxGuardian is an application-based firewall with a graphical interface. It's main task is to control and forbid transmission & reception of data by unauthorized applications; it can be thought as the Linux equivalent to apps such as ZoneAlarm and Kerio
CRYPT extension for Netfilter/Iptables allows you to create an encrypted communication using stream and block ciphers. It also authenticates the packets.
netadm project provides monitoring tools for network performance and network control system. the above monitoring tool is called 'npt(Network Perfermance Tool) and the above network control system is called 'gwc (GateWay Control~). npt program provide
Documents for developers of Peer-to-Peer applications that need to be able to communicate across middleboxes such as firewalls and network address translators, and software tools for testing middleboxes for P2P friendliness.
syndetector is a software which can detect and drop packet when a synflood attack is detected ! Based on a simple detection system (by the use of iptables and libipq) and on a simple use It is realy easy to setup this software.
Allows users of a Linux workstation to control which programs access the Internet. This can be done statically by listing them in a file or dynamically via a GUI dialog box that appears when a new program attempts to connect to the Internet.
Crowd Control is an small, cross-platform HTTP proxy (a fork of the elhttp project) designed for systems with little RAM, such as a home router. It can filter URLs using SquidGuard blocklists, and has the unique ability to filter HTTPS domains as well.
LogCop is a set of turn-key bash/firewall/awk scripts for enhancing an IDS. It monitors system logs and blocks IP addresses based on such criteria as illegal user names from repeated attacks. In production under Linux, FreeBSD, OS X, Solaris.
nf-HiPAC is a high performance packet filter for Linux. It provides the same rich feature set as iptables but uses an advanced algorithm to minimize the number of memory lookups per packet.