With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Context for your AI agents
Crawl websites, sync to vector databases, and power RAG applications. Pre-built integrations for LLM pipelines and AI assistants.
Build data pipelines that feed your AI models and agents without managing infrastructure. Crawl any website, transform content, and push directly to your preferred vector store. Use 10,000+ tools for RAG applications, AI assistants, and real-time knowledge bases. Monitor site changes, trigger workflows on new data, and keep your AIs fed with fresh, structured information. Cloud-native, API-first, and free to start until you need to scale.
The Looper Event / Alert System is an application primarily used for network management to perform alert monitoring and redirection. It is designed with extreme simplicity in mind and is highly modularized. Also used as a Netcool probe or gqateway.
YAML (tm) is a straight-forward data serilization language, offering an alternative to XML where markup (named lists and mixed content) are not needed. YAML borrows ideas from rfc822, SAX, C, HTML, Perl, and Python.
Nasty LKM Defender is a module wich protects Your system against some nasty modules (e.g. rootkits).
Well mainly it protects sys_call_table and some other important functions (get_module_list, sys_query_module)
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
CTrace is a multi-threaded trace debug library written in C. It provides a simple, fast, well documented trace utility for applications and as such is especially suitable for use in real-time embedded applications.
Automated Security Tools (autosec) aims to provide
automatic tools which network administrators may use
to help check and test the security of their network.
sldb is the embedded database for syslog. It captures log messages to a disk-backed database, and sorts them by user-defined subject. Excess messages from each bin are pruned on a first-in, first out basis.
Output spool reader for Snort! This program decouples output overhead from the Snort network intrusion detection system and allows Snort to run at full speed. It takes input and output plugins and can therefore be used to convert almost any spooled fil
Loggy is a Linux Advanced Logcleaner and a tool to hide you in a linux machine
by cleaning or modifing the intruder's ip from all the logfiles in /var
bin and txt logs it find logs, with a recursive search in /var/log and a lot of fantastic features
xrootconsole tails a file in a window on your X11 root window. It aims to be as simple and resource-light as possible, within reason: it should run smootlhy on a P133 laptop. The program is non-interactive; all configuration is done on the command line.
SETILog saves some statistics of a completed SETI@home work-unit in a text CSV file. This file is needed by SETIWatch to keep track of the completed workunits.
Logcheck is software package that is designed to automatically run and check
system log files for security violations and unusual activity. Logcheck
utilizes a program called logtail that remembers the last position it read
from in a log file.
Anarchy is small utility written in C++ designed for Linux and other Unix-like systems. It allows you to change your identity and act as another user (even root!).
Its features are similar to standard su utility, but there is more flexible.
MOTion detectOR is a simple daemon that periodicaly checks for changes in a given file/logfile.
This application will warn you by mail when a change in a monitored file is detected.
It may be used for intrusion detection or hack investigation for examp
Apan, Advanced Performance Addon for Nagios, is a tool that is used to store performance-related data from service-checks done by Nagios (www.nagios.org).
Aware is a high performance distributed event processing framework built for systems management/monitoring. See http://www.elegant-software.com for more info.
SDSC Syslog is a modern reliable replacement for syslogd. It supports the new syslog protocols (RFC 3195) providing support for reliable delivery as well as the older UDP base protocol for backwards compatability.
ILM is a utility for the ISDN Line Monitor, an ISDN line monitoring hardware sold by many dealers in central europe. (e.g. Conrad and EgTel).
It provides functions to:
- retrieve all recorded information
- erase all recorded information
- config
Status Module is a daemon which forwards vital system information (memory usage, active processes, etc.) into the kernel logs by using a kernel module. This is very useful for logging or security purposes.
trafanal monitors your complete network offering realtime statistics who sends/recvs how much packets/bytes from whom
its a really good placed on a router, showing you who takes which bandwidth, and who made how much traffic
A portal project providing useful information for those who have the hard job administering a school network.
Hints, tips, configurations and special software for servers that can be used in educational environments can be found here.