With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Context for your AI agents
Crawl websites, sync to vector databases, and power RAG applications. Pre-built integrations for LLM pipelines and AI assistants.
Build data pipelines that feed your AI models and agents without managing infrastructure. Crawl any website, transform content, and push directly to your preferred vector store. Use 10,000+ tools for RAG applications, AI assistants, and real-time knowledge bases. Monitor site changes, trigger workflows on new data, and keep your AIs fed with fresh, structured information. Cloud-native, API-first, and free to start until you need to scale.
Collector of the traffic on the basis of pcap-library. Data are aggregated and saved under the scheme "DetailHostMatrix Aggregation Schemes" Cisco NetFlow FlowCollector. Data are kept in the form of gzip-files or deduced in stdout.
LogCop is a set of turn-key bash/firewall/awk scripts for enhancing an IDS. It monitors system logs and blocks IP addresses based on such criteria as illegal user names from repeated attacks. In production under Linux, FreeBSD, OS X, Solaris.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Netmon is a simple program for monitoring bandwidth and data usage on linux machines. It is useful for those with a broadband connections that pay for their data or have download limits.
imsniff is a pcap-based instant messaging sniffer. It captures the IM traffic in the network and is able to log conversations, contact lists, profile information, incoming email notifications, other MSN events, etc. Tested in Linux and Windows.
Snort2c attempts to be a improved version of snort2pf wrote by Stephan Schmieder with some advantages: kqueue, pf table support, pf ioctl's calls and others. It works monitoring snort's alertfile and blocking attackers ip using pf calls.
Visitors processes a Web log file, trying very hard to identify a single "person" as much as possible. This is typically achieved by the use of either an identifying cookie in the log file, or via the IP address, name, and browser ID combination.
Searches arbitrary text input (logs, etc) for regular expression(s) matching, and then executes arbitrary SQL statement(s) with matched substrings used as parameters. Offers daemon, incremental and transactional features.
M-ICE is a modular hostbased intrusion detection framework. It is used as middleware to close the gap between IDS research and IDS development. M-ICE consists of various parts that can be connected together by using network-or interprocess-communication
Green Screen: A Linux based Advanced Syslog Server for Juniper NetScreen Firewalls - Can be expanded later to support other products. It can capture syslog messages, parse them, store them in a MySQL database. A Web GUI interface is also included.
Small utility written in C allowing easy access to Apache mod_log_sql generated logs for the purpose of log analyzers such as webalizer. Takes any or none of parameters virtual host, month, and year to generate Common Log Format dump to STDOUT.
Pathalizer is a tool to visualize the paths most users take when browsing a website. This information can then be used to decide how to improve the navigation of the site, and which parts are most worth improving and keeping up to date.
lease-parser is a simple daemon that records the lease state changes of an ISC
DHCP server to a database for historical reference. The data can be searched
via a web search form that is provided with the tool.
This filter allows Apache log files to converted from one time
zone to another. This is especially useful if you are using a
hosting service that produces its logs in another timezone
and you want to make sense of your log statistics.
This project is an approach to automating the testing of performance properties of complex systems.Just like functional specs for software we aim to develop an executable language for asserting performance expectations of a program.This implements Sharon
Track Attack is a system for analysing data contained in log
files. Track Attack can process different types of log files in
parallel so as to get a time-ordered view of how events unfolded.
Traffic accounting suite for Linux that comes with a webinterface written in PHP. Requires iptables, its ULOG target and MySQL for data storage. This system uses categories which are fed by iptable rules that can be defined using the webinterface.
The Big Brother Log Analyzer (BBLA) is a package consisting of an HTTP logger and of a log analyzer. It provides a lightweight and free solution (with no banners!) for individual users and/or systems administrators willing to track their audience.