With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
A firewall configuration project based on Linux 2.6.x and iptables. It has a web interface with an intuitive Webmin module, or you can edit a XML file. You can define the different firewall elements (zones, hosts, networks) and then set the services
These three tools build Checkpoint, Cisco ASA or Netscreen policys from logfiles. They write dbedit, access-list or set address, set service and set policy commands for the traffic seen in the logs, that can be cut and pasted into the firewalls. WOOT
A package of scripts to watch for snort alerts, change / create firewall rules to block high priority alerts, and record recent blocks. It will increase block times based on previously recorded blocks
Martus Solutions provides seamless budgeting, reporting, and forecasting tools that integrate with accounting systems for real-time financial insights
Martus' collaborative and easy-to-use budgeting and reporting platform will save you hundreds of hours each year. It's designed to make the entire budgeting process easier and create unlimited financial transparency.
Enables tunneling of network connections through restrictive HTTP proxies. Features: Portmapping, SOCKS4, SOCKS5, web-based admin interface, possibility to use standalone server (perl) or hosted server (PHP), optional authorization from LDAP or MySQL
This is an NIDS/HIDS, Network plus Host based Intrusion Detection System. Este é um NIDS / HIDS, Sistema de Detecção de Invasões Baseado em Redes e em Máquinas.
inundator is a tool used to anonymously inundate intrusion detection logs with false positives to obfuscate a real attack, leaving the IDS analyst feeling completely inundated.
IP-Updater is a Perl-Script to manage dynamic IP-adresses (DynDNS). It reads the IP via Telnet from the Router (Zyxel, Netgear) or get it from the web. Different updates to Dyn-IP-Services or FTP-Upload to a hompage are possible. With logging.
OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.
Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
Lomalarga is a VPN-like service based on SSH and Linux.
Lomalarga is a port forwarding (VPN-like) service based on SSH & Linux. Based entirely on opensource. The client is written in C# and the administration is based on Linux/lighttpd/PostgreSQL/PHP, with the UI written with Google Web Toolkit.
BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts coming from a SNORT IDS system.
PACtory is a highly customizable way for handling proxy configuration settings with a dynamically created .pac-File, also known as "Windows Proxy Auto Detection" or "wpad.dat"-File, which is generated on the fly while the client is requesting it.
EasyBSD is a modular automation script designed to assist in the extensive post installation process that is required in FreeBSD. The following are modules that are included with EasyBSD, Checks, Update, Security, Networking, Firewall, and more...
PFL can either operate as a stand-alone firewall log parser or set up to run and configure ipfw. The major focus is parsing, compressing, and filtering *NIX (to include Mac OSX) firewall logs generated by IPFW for quick and easy admin review.
PHANTUM - Punch-Hole Access for NAT Traversal of UDP in a Module; Built on top of Samy Kamkar's 'chownat' script, PHANTUM allows for pure client-agnostic TCP services to be tunneled over UDP and hosted behind NAT infrastructures.
GTCop Professional Security Appliance aims to provide a powerful tool for satellite communications, with enhanced QoS and bandwidth controls. As derived from IPCop Firewall, it is a stable, secure, easy to configure and maintain GNU/Linux firewall box.
FOSSWALL project is now merged under the OpenSource Security Network (OSSN) project. OpenSource Security Network is a community who are dedicated to working in different aspects of IT Security, Network Security, Application Security, Email Security etc
The ADSL optimizer is an accurate packet scheduling solution for ADSL connections, based on Linux and HTB. The solution guarantees low latency while maintaining full utilization of both upstream and downstream, without wasting link capacity.
sddelta shows the differences in the configuration of SmartDefense between two exports from a Check Point NGX SmartCenter. sddelta requires Perl and has only been tested on Linux so far.
SquidRestrict is a Web based tool that allows multiple time restrictions to be placed on internet usage for firewalls that use the Squid Web Cache (http://www.squid-cache.org/).
Resheto is a firewall management tool with (not yet)optimizing rule compiler. By now it is iptables/ipset oriented but will support PF in the future(and may be others) It is suitable for big(thousands) object databases with hierarchical(nested) groups an
Authdefender is a filtering application that, in combination with iptables, blocks malicious users from accessing any aspect of the server in question. Malicious users are defined by brute force ssh/ftp attempts and blocked regardless of tcp wrappers.