Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.
Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
Sign Up Free
Go From AI Idea to AI App Fast
One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
LogShark is a simple log monitor. It can monitor multiple directories, and for each directory a different set of filename patterns can be used. Because LogShark does not lock anything, it does not prohibit removal of the files and/or directories.
GPX Log is simple, yet convenient C++ logger which utilizes standard iostream library. Its main feature is the ability to distribute logging streams output into any number of ostream objects.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
"Java log viewer" is a GUI to easily view the java application logs generated by the "java.util.logging" package. The log must be formatted by the XMLFormatter class. It provides facilities in order to filter, to sort and to find log records.
Feed State is used to view (and store) log files of different formats from many different processes over a network. A massive variety of logs are supported: XML, database, all ASCII log files, all parsed into a common format for viewing and analysis.
A hardware supported hypervisor originally built for malware analysis. Features: Linux VM introspection, minimal detectability, small (~150KB), simple, and well documented. Can be used for other purposes. Support for Intel-VT & Windows coming soon.
Scripts to log (to a database) the information about Command Line Interface (CLI) scripts: start time, end time, run time (derived), script output, and exit status.
In this project I will try to create logging analysis tool which will be very simple & can generate variety of report. I get this idea by using InsightUI which is inspired by chainsaw.
Microlog is a small, yet powerful logging library for mobile devices based on the Log4j API. Supports Java ME (J2ME) and Android. Logs to device, to PC or to servers online. Used in all phases from development on emulator/device to outdoor field-testing.
phpWatch is a flexible service monitoring system. Features include multiple contact methods for when services malfunction, multiple query methods, statistics gathering, and a fully extendable architecture for developers.
LOG4PLSQL is a PLSQL framework for logging in all PLSQL code
this project was born from the log4J spirit (and use it). You have the possibility to log apart from transaction and use all LOG4J feature.
The Open Host Monitor provides an open extensible solution to monitoring availability of all aspects of ICT equipment and infrastructure. It makes use of various technologies including SNMP and custom agents running on the target hosts.
BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts coming from a SNORT IDS system.
An open source data version repository model based on true INSERT only logic. Contains high performance support for data versioning and history. Enables point-in-time query and CDC sourcing including mapping each change to a transaction.
At an early stage of development. Application/middleware usage monitoring/reporting. Focus on business transactions/use cases to help communicate with users. Small footprint, easy to use GUI and a level of statistical analysis to summarise the data.
Kojoney is an easy of use, secure, robust and powerfull Honeypot for the SSH Service written in Python. With the kojoney daemon are distributeds other tools such as kip2country (IP to Country) and kojreport, a tool to generate reports from the log fi
A log player for "The Fourth Coming" ("T4C", http://www.the4thcoming.com).
Given a log-file, this tool will replay a T4C game you've played before.
It will have built-in functionnalities like : merging log files
together, searching and cleaning
a java based monitoring tool,logs all the user actions and errors with runtime data, displays execution performance and executed method lines. It doesnt modifiy class source files and no need for coding, just put it in your class path and see the mir
A simple keylogger written in python. It is primarily designed for backup purposes, but can be used as a stealth keylogger, too. It does not raise any trust issues, since it is a set of [relatively] short python scripts that you can easily examine.
My work as a system administrator and developer includes debugging software. I scan and filter logfiles many times a day. This tool can help you to color and filter your logfiles. So you can concentrate on the interesting things to do!