With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
Try free now
Free CRM Software With Something for Everyone
216,000+ customers in over 135 countries grow their businesses with HubSpot
Think CRM software is just about contact management? Think again. HubSpot CRM has free tools for everyone on your team, and it’s 100% free. Here’s how our free CRM solution makes your job easier.
This is dhcpd-pools ISC dhcp shared network and pool range usage analysis. Purpose of command is to count usage ratio of each IP range and shared network pool which ISC dhcpd is in control of. Users of the command are most likely ISPs and other organizations that have large IP space.
Program is written C. Design goal is to get analysis done quickly where there is lots of data. On cheap laptop the speed of analysis is roughly 100k leases per second. Number of ranges, or shared networks, does...
A multi-threaded, multi-database tcp-based database insertion app.
... (and envelope information) into one or more databases using MySql client library or dbi drivers (also on SourceForge).
The client needs no configuration (all input is via command-line). It is intended for hosts to make database entries without needing database client or interface code.
Syslogd2 integration allows DBD2 to act as Syslogd2's database back-end for MySql and other databases supported by the dbi drivers.
Original purpose was to track Linux cluster job status but other uses exist.
this tool tries to repair your broken pcap and pcapng files by fixing the global header respectively packet blocks and recovering the packets by searching und guessing the packet headers or blocks
ttyrpld is a multi-OS kernel-level TTY keylogger and screenlogger with (a)synchronous replay support. It runs on Linux, Solaris, FreeBSD, NetBSD and OpenBSD.
Enterprise-Grade Proxies • Built-in IP Rotation • 195 Countries • 20K+ Companies Trust Us
Get unrestricted access to public web data with our ethically-sourced proxy network. Automated session management and advanced unblocking handle the hard parts. Scale from 1 to 1M requests with zero blocks. Built for developers with ready-to-use APIs, serverless functions, and complete documentation. Used by 20,000+ companies including Fortune 500s. SOC2 and GDPR compliant.
FW1-Loggrabber is a command-line tool to grab logfiles from Checkpoint FW-1 remotely using Checkpoints LEA (Log Export Api), which is one part of Checkpoints OPSEC API.
GoAccess is a real-time Apache web log analyzer and interactive viewer that runs in a terminal and provides fast and valuable HTTP statistics for system administrators that require a visual report on the fly.
Free-SA is report generating tool for web, proxy and mail log files
Free-SA is logs processor and report generating tool. It can be used to control traffic usage, to evaluate conformance to the Internet access security policies, to investigate security incidents, to evaluate web server efficiency and to detect troubles with server configuration.
Sgrep (sorted grep) is a much faster alternative to traditional Unix grep when searching large files, because sgrep searches sorted input files using a fast binary search to find matching lines.
A commandline utility to display statistics about a text file consisting of lines of data. The statistics include counts of line terminator pairs (CR, LF, CR+LF) and line counts. Also shows if there is an unterminated trailing line.
Manage printing in a cost-efficient and eco-friendly way with Gelato.
Gelato offers an extensive catalog of custom products, a zero-inventory business model, and free designing tools—all in one place.
The world's largest print on demand network with 140+ production partners across 32 countries. Gelato offers end-to-end design, production and logistics for individuals looking to start their own business today!
A commandline utility to read a text file containing lines of data, clean up any CR/LF anomalies, and output the lines of text with clean CR/LF terminators to standard output. The binary is a Windows 32 bit console app.
Comprehensive & high performance data distribution &transformation system. Features a simple, user-friendly event driven scripting interface transparently generates & execs highly efficient Perl/C code. Uses:ETL,datawarehousing,statistics,data-cleansing.
Mail Log Filter filters out log entries of message duplicates from the postfix mail log caused by the use of extra MTAs (such as amavis) and thus preventing log analyzers (such as awstats) from seeing and counting the same message twice.
Bruteblock allows system administrators to block various bruteforce attacks on UNIX services. The program analyzes system logs and adds attacker's IP into IPFW table effectively blocking them. Addresses are removed from the table after expiration period
Collector of the traffic on the basis of pcap-library. Data are aggregated and saved under the scheme "DetailHostMatrix Aggregation Schemes" Cisco NetFlow FlowCollector. Data are kept in the form of gzip-files or deduced in stdout.
LogCop is a set of turn-key bash/firewall/awk scripts for enhancing an IDS. It monitors system logs and blocks IP addresses based on such criteria as illegal user names from repeated attacks. In production under Linux, FreeBSD, OS X, Solaris.
imsniff is a pcap-based instant messaging sniffer. It captures the IM traffic in the network and is able to log conversations, contact lists, profile information, incoming email notifications, other MSN events, etc. Tested in Linux and Windows.
Searches arbitrary text input (logs, etc) for regular expression(s) matching, and then executes arbitrary SQL statement(s) with matched substrings used as parameters. Offers daemon, incremental and transactional features.
Visitors processes a Web log file, trying very hard to identify a single "person" as much as possible. This is typically achieved by the use of either an identifying cookie in the log file, or via the IP address, name, and browser ID combination.
Green Screen: A Linux based Advanced Syslog Server for Juniper NetScreen Firewalls - Can be expanded later to support other products. It can capture syslog messages, parse them, store them in a MySQL database. A Web GUI interface is also included.
This project is an approach to automating the testing of performance properties of complex systems.Just like functional specs for software we aim to develop an executable language for asserting performance expectations of a program.This implements Sharon