With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
Log Searcher provided full indexed searchengine for log files on each servers. It supported many powerful query types such as phrase queries, wildcard queries, proximity queries, range queries and more with Lucene and Solr technology. It comes with Web interface to search and generate chart accordingly. This project is Open Source project with Apache 2.0 license for allowing you to extra development on top of Log Searcher project.
Photo Searcher is under Apache 2.0 license. It's using photo to search the photo in the database. You should upload and save the photo by using Photo Searcher feature in order to build the database.
This web based application user can view the log file.
This is a web application, using thing application user can see the log file with multiple search critria.
This application supports Log4J and log4Net.
This tool is used to filter the log file, based on multiple criteria. Admin user can configure multiple applications and group the application up to three levels. Application name will be displayed in tree structure based upon grouping. Application will be displayed based on roles.
System will allow the user to filter the log file not...
Dun and Bradstreet Risk Analytics - Supplier Intelligence
Use an AI-powered solution for supply and compliance teams who want to mitigate costly supplier risks intelligently.
Risk, procurement, and compliance teams across the globe are under pressure to deal with geopolitical and business risks. Third-party risk exposure is impacted by rapidly scaling complexity in domestic and cross-border businesses, along with complicated and diverse regulations. It is extremely important for companies to proactively manage their third-party relationships. An AI-powered solution to mitigate and monitor counterparty risks on a continuous basis, this cutting-edge platform is powered by D&B’s Data Cloud with 520M+ Global Business Records and 2B+ yearly updates for third-party risk insights. With high-risk procurement alerts and multibillion match points, D&B Risk Analytics leverages best-in-class risk data to help drive informed decisions. Perform quick and comprehensive screening, using intelligent workflows. Receive ongoing alerts of key business indicators and disruptions.
A PHP application to search for matching strings in log files. It was mainly designed for usage in a syslog server environment with big log files, where you cannot log to databases due to the size, but to plain text files which will be searched.
The Internet Censor is a multi-platform, Internet clustering program, for which the resulting data will be used in the creation of a non-profit content-filtering Internet SearchEngine for children.
The Open Log Engine is a powerful tool for advanced logging in games or programs. It easily allows you to make logging outputs in your program and analyse them afterwards with the Open Log Viewer, which provides you a powerful filtering system.