AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
Try it Free
Stop Storing Third-Party Tokens in Your Database
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
phpWatch is a flexible service monitoring system. Features include multiple contact methods for when services malfunction, multiple query methods, statistics gathering, and a fully extendable architecture for developers.
BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts coming from a SNORT IDS system.
At an early stage of development. Application/middleware usage monitoring/reporting. Focus on business transactions/use cases to help communicate with users. Small footprint, easy to use GUI and a level of statistical analysis to summarise the data.
Kojoney is an easy of use, secure, robust and powerfull Honeypot for the SSH Service written in Python. With the kojoney daemon are distributeds other tools such as kip2country (IP to Country) and kojreport, a tool to generate reports from the log fi
A log player for "The Fourth Coming" ("T4C", http://www.the4thcoming.com).
Given a log-file, this tool will replay a T4C game you've played before.
It will have built-in functionnalities like : merging log files
together, searching and cleaning
The cpp_trace is a flexible and compact logging C++ library. The library provides a facility to filter and route between output streams text trace messages. It uses generic type-safe design and conforms to STL io stream concepts.
Syslog-slogger can be used to generate controlled,random syslogs.Syslogs to be genereated r listed in a file and can contain list of values - one of which would randomly used to create the message. Syslog generation rate can be controlled as well
PFL can either operate as a stand-alone firewall log parser or set up to run and configure ipfw. The major focus is parsing, compressing, and filtering *NIX (to include Mac OSX) firewall logs generated by IPFW for quick and easy admin review.
Syslog Collector listen for syslog messages and parse them following some regular expressions. It then increment some counters which are exposed through SNMP Agent-X interface
Codes debug print statements to reduce size of debug builds, hides debug information from 3rd party people and decreases the effect of longer print lines by printing minimum number of characters to console.
audacity-extra now provides a sleek dark themed version of the Audacity open source sound editor. The project experiments with Audacity variations. There's a vowel-sound target-practice display for language learners and an analog waveform data logger for embedded systems.
Nowiam's job is to ask you, every 15 minutes, what you've done with your time. Helpful for those who need automated nudges to keep their work on track.
A simple IPv4 number randomizer which replaces every found IP number in a file by another random number of the same length and same class/block (public, 10.*.*.*, ...), so the file length is unchanged, as well as access and modification time of the f
Shadowtail is a Java/Spring framework for gathering numerical data (statistics) about a Java application. It is particularly useful as a source of data to feed Orca, the free tool for plotting textual data onto a directory on a Web server.
watches for Regristry-changes of keys like HKLMSoftwareMicrosoftWindowsCurrentVersionRun etc. and pops up if something has changed, logs it, can ask google for the key found. Protects against Trojans and Viruses.
Now you don't need to rack your brains with making a regexp to extract necessary rows from log files. Just run that tool and you'll get the right Regular Expression. Image how to extract rows with the time amoung your log?
The Genalyze log analyzer, a simple yet highly extensible framework for parsing log files, was designed for parsing T-Server log files generated by Genesys contact center software platform, yet is generic and easy enough to adapt for other log formats.
Error log notification web service. Post errors to the Skidder and let it handle sending notifications appropriately to any subscribers. Supports posting from multiple applications from anywhere on the internet.
IBAM is an advanced battery monitor for laptops, which uses statistical and adaptive linear methods to provide accurate estimations of minutes of battery left or of the time needed until full recharge.
A simple Java 5 library for printing human readable differences in time in multiple languages. Each class is responsible for printing a time difference in a certain language. Pure Java 5.0, no external libraries for maximum runtime speed.
The program monitors file size and time stamp modifications and exits when the file stops changing. Purpose of the program is to work as a poor mans mutex e.g. keep on blocking next commands in scripts.
SimpleTracker is a time tracking program to record how much time employees spend on projects and report it in percentages or dollars. An online demo is available to try before downloading. (Java Recording Client/PHP Reporting Site/MySQL)
TILT is a set of terminal logging and playback tools for auditing telnet and SSH connections made from a bastion host. It provides timestamped logs and real time playback of logs for incident reports, incident analysis or as a training aid