With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
FireHOL is a language (and a program to run it) that builds secure, stateful firewalls from easy-to-understand, human-readable configurations. The configurations stay readable even for very complex setups. FireQOS is a program that sets up traffic shaping from an easy-to-understand and flexible configuration file. Both programs abstract away the differences between IPv4 and IPv6. so you can concentrate on the rules you want. You can apply rules for IPv4 or IPv6, or both, as you need.
Perl logfile analyzer for DELL Sonicwall Firewall logfiles. This Perl program (Windows /Linux / Mac), creates an HTML file containing: hits per protocol, mean, median and variance on hourly and weekday basis, RBL statistics, IPS stats, VPN stats, virus stats, surfing statistics, CFS blocked sites stats.
SonicReader is used to view and save reports of the internals of a Sonicwall Configuration file. This is useful for those people that wish to know the settings within their saved Sonicwall Configs. I have no affiliation with Dell Sonicwall. Please do not contact Dell Sonicwall regarding the use of this program.
Drop specified IP n seconds remotely, auto-undrop it when timeout.
It's a IDS-receiver and written in C.
Sometimes I want to drop remote IP xx seconds, and Undrop it when timeout;
Sometimes my sniffer-server find a hack-action and I want to tell another server/server-group "Drop xxx.xxx.xxx.xxx IP xx seconds".
So I written this program -- dynipdrop("dynipdrop" daemon and "ipdrop_local" to send a drop-msg from localhost, and "ipdrop_udp" to send a drop-msg to another server(installed the dynipdrop daemon).
And I think: "Maybe I can make a client...
Award-Winning Medical Office Software Designed for Your Specialty
Succeed and scale your practice with cloud-based, data-backed, AI-powered healthcare software.
RXNT is an ambulatory healthcare technology pioneer that empowers medical practices and healthcare organizations to succeed and scale through innovative, data-backed, AI-powered software.
The program implements the CIDR merging with whitelisting (network exclusion). Output will be summarized to be as small as possible. The program has been widely used for blacklist merge and optimization.
The goal of this project is to create an interface for managing firewall using the IpTables program. The application will offer both a GUI for creating IpTable based scripts and a set of Wizards for speed-up the protection of typical LAN layout.
A simple port-relaying program written in Java; sits on specified ports for either TCP or UDP, re-sends packets to the given IP. Doesn't forward packets, actually receives and re-sends them. Could be handy to learn Java Sockets/networking. Public Domain.
JavaTunnel is a java, free, tunneling program.
It can function in two ways: 1 It can open TCP/IP tunnel between two computers, using HTTP as a transport(not yet). 2 It can open a connection directly, witht he help of a SSL-HTTP proxy(avaible now).
CBQ.init script demonstrate power of CBQ mechanism in network traffic management under Linux platform. This bash script parses human-readable config files and does all needed manipulation with 'tc' linux kernel utilite. See WebCBQ project for Web GUI.
All-in-one security tool helps you prevent ransomware and breaches.
SIEM + Detection and Response for IT Teams
Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.