With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
The Open Host Monitor provides an open extensible solution to monitoring availability of all aspects of ICT equipment and infrastructure. It makes use of various technologies including SNMP and custom agents running on the target hosts.
An open source data version repository model based on true INSERT only logic. Contains high performance support for data versioning and history. Enables point-in-time query and CDC sourcing including mapping each change to a transaction.
BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts coming from a SNORT IDS system.
Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.
Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
At an early stage of development. Application/middleware usage monitoring/reporting. Focus on business transactions/use cases to help communicate with users. Small footprint, easy to use GUI and a level of statistical analysis to summarise the data.
Kojoney is an easy of use, secure, robust and powerfull Honeypot for the SSH Service written in Python. With the kojoney daemon are distributeds other tools such as kip2country (IP to Country) and kojreport, a tool to generate reports from the log fi
A log player for "The Fourth Coming" ("T4C", http://www.the4thcoming.com).
Given a log-file, this tool will replay a T4C game you've played before.
It will have built-in functionnalities like : merging log files
together, searching and cleaning
a java based monitoring tool,logs all the user actions and errors with runtime data, displays execution performance and executed method lines. It doesnt modifiy class source files and no need for coding, just put it in your class path and see the mir
A simple keylogger written in python. It is primarily designed for backup purposes, but can be used as a stealth keylogger, too. It does not raise any trust issues, since it is a set of [relatively] short python scripts that you can easily examine.
My work as a system administrator and developer includes debugging software. I scan and filter logfiles many times a day. This tool can help you to color and filter your logfiles. So you can concentrate on the interesting things to do!
Prolix is an extension appender for the log4net logging framework. Prolix directs logging for an ASP.NET session to a separate tab in the browser. Since communication is over HTTP, users can watch logging data regardless of security constraints.
The cpp_trace is a flexible and compact logging C++ library. The library provides a facility to filter and route between output streams text trace messages. It uses generic type-safe design and conforms to STL io stream concepts.
Syslog-slogger can be used to generate controlled,random syslogs.Syslogs to be genereated r listed in a file and can contain list of values - one of which would randomly used to create the message. Syslog generation rate can be controlled as well
PFL can either operate as a stand-alone firewall log parser or set up to run and configure ipfw. The major focus is parsing, compressing, and filtering *NIX (to include Mac OSX) firewall logs generated by IPFW for quick and easy admin review.
NLog is a logging platform for .NET with rich log routing and management capabilities. It uses familar logger pattern known from log4xxx. Advanced routing options include buffering, asynchronous logging, load balancing, failover, and more.
Syslog Collector listen for syslog messages and parse them following some regular expressions. It then increment some counters which are exposed through SNMP Agent-X interface
Codes debug print statements to reduce size of debug builds, hides debug information from 3rd party people and decreases the effect of longer print lines by printing minimum number of characters to console.
audacity-extra now provides a sleek dark themed version of the Audacity open source sound editor. The project experiments with Audacity variations. There's a vowel-sound target-practice display for language learners and an analog waveform data logger for embedded systems.
Nowiam's job is to ask you, every 15 minutes, what you've done with your time. Helpful for those who need automated nudges to keep their work on track.
A simple IPv4 number randomizer which replaces every found IP number in a file by another random number of the same length and same class/block (public, 10.*.*.*, ...), so the file length is unchanged, as well as access and modification time of the f
Shadowtail is a Java/Spring framework for gathering numerical data (statistics) about a Java application. It is particularly useful as a source of data to feed Orca, the free tool for plotting textual data onto a directory on a Web server.