With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
secheck is a script which imitates currently existing log checkers but with a focus on security. secheck does some basic system security checking, then emails to output to a given user.
Clockwork Eye is the agent daemon with modules, monitors your machine's resources, watches your services and sends traps. This project aims to provide a monitoring service and a relationship as agent-manager.
Syslog2db, Syslog to Database, is a log parser that inserts log entries into databases through the PERL DBI and DBD interfaces. In its current beta form, it takes advantage of syslog-ng's ability to format the output of its syslog entries.
Never miss a sale. Square payment processing serves customers better with tools and integrations that make work more efficient.
Accept payments at your counter or on the go. It’s easy to get started. Try the Square POS app on your phone or pick from a range of hardworking hardware.
A Java utility library oriented toward server or batch process developers. Contains support for assertion checking, command-line processing, and event dispatching/logging.
xjnm is a java daemon that gathers numbers from arbitrary sources (e.g. cpu usage) and can store it on arbitrary storages (e.g. a jdbc database) for later analysis or react in arbitrary way to the data collected (e.g. inform an administrator by e-mail).
AI-Powered Security and IT Operations Without Compromise.
Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can:
Linup is a client for the Uptimes Project (now in http://uptimes.wonko.com/), written in C, for Linux.
The purpuse is to create a lightweight, simple client for the project.
A client/server application designed to let the user monitor a directory
tree on a remote machine by creating snapshots of current file status in order
to later detect file modification, addition and/or removal.
Store and display syslog data through a MySQL engine. This software can also optionally break down embedded format data in the message string into unique database fields for later viewing.
Allows JDBC resources to be monitored. You can see when java.sql objects are being opened and closed and can see the line of code where a resource that is still open was originally opened.
it is used to fetch several System V IPC message queue infos, which ordinary implementation of ipcs didn\'t provide, e.g. scanning the system for active queues or. also, it comes with a tool to creat/destroy message queues and send messages over them.
Chainsaw is a GUI log viewer and filter for the Log4J package. It listens for LoggingEvent objects sent using the SocketAppender and displays them in a table. The events can be filtered based on Priority, Thread name, Category name and Message. It can als
MRTG Front End. An individually configurable dynamix indexmaker for mrtg that can also calculate total incoming/outgoing data for a specified time period, view target configurations and more.
Complete System Resource and Task Organizer (csrtd) monitors the status and behavior of the system and network resources. The daemon logs events and accepts client requests, which is used to retrieve data and administer the daemon.
Apache Log Rotator will rotate your Apache log files based on their size without having to restart Apache. You can also give it an option to gzip the log file after it has been rotated.
logconf is a centralised configuration control for logging software. Configurations are included for syslog-ng (multi-host), logrotate, and logwatch; others will be added in future.
Adding a new host is as simple as adding a word to a config file.
Poor man's SMS. Sisyphus provides Server and Desktop Asset Management. Generates reports on PCs and logins by:Make and Model, User, Location, CPU Speed, Department or Software Installed.Web or ODBC reporting.Beta tested at sites with 300 to 2000 Desktops.
squider.pl is a Squid access.log file splitter written in Perl. squider.pl's only purpose is to split logfiles by date (year, month, day or any combination)!
Intranet Logger is a suite of programs designed to centralize the parsing, analysis and presentation of system log information generated by computers in an intranet.