With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Cloud tools for web scraping and data extraction
Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.
Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
xjnm is a java daemon that gathers numbers from arbitrary sources (e.g. cpu usage) and can store it on arbitrary storages (e.g. a jdbc database) for later analysis or react in arbitrary way to the data collected (e.g. inform an administrator by e-mail).
DPytHOS is a means for administrators of large networks to both
monitor and manage the servers under their control.
DPytHOS is implemented in python and uses a generic database
back-end (with MySQL supported and MS-SQL 2000 supported via
XML)
A client/server application designed to let the user monitor a directory
tree on a remote machine by creating snapshots of current file status in order
to later detect file modification, addition and/or removal.
Supply chain managers, executives, and businesses seeking AI-powered solutions to optimize planning, operations, and decision-making across the supply
Logility is a market-leading provider of AI-first supply chain management solutions engineered to help organizations build sustainable digital supply chains that improve people’s lives and the world we live in. The company’s approach is designed to reimagine supply chain planning by shifting away from traditional “what happened” processes to an AI-driven strategy that combines the power of humans and machines to predict and be ready for what’s coming. Logility’s fully integrated, end-to-end platform helps clients know faster, turn uncertainty into opportunity, and transform the supply chain from a cost center to an engine for growth.
Allows JDBC resources to be monitored. You can see when java.sql objects are being opened and closed and can see the line of code where a resource that is still open was originally opened.
This is a collection of polymorphic Visual Basic classes which share a simple interface for clients to submit entries to a log, while each class implements the logging in its own particular fashion (e.g., written to a file, submitted to a syslog server).
Chainsaw is a GUI log viewer and filter for the Log4J package. It listens for LoggingEvent objects sent using the SocketAppender and displays them in a table. The events can be filtered based on Priority, Thread name, Category name and Message. It can als
Passlog is a Visual Basic program to allow windows access to be logged to syslog. While it is not intended to be a high security program it can provide some basic security and logging of user logins.
Network Management Software and Tools for Businesses and Organizations | Auvik Networks
Mapping, inventory, config backup, and more.
Reduce IT headaches and save time with a proven solution for automated network discovery, documentation, and performance monitoring. Choose Auvik because you'll see value in minutes, and stay with us to improve your IT for years to come.
MRTG Front End. An individually configurable dynamix indexmaker for mrtg that can also calculate total incoming/outgoing data for a specified time period, view target configurations and more.
ASC is a tool to count traffic between users and different subnets. The most common usage is to measure individual users amount of traffic to and from the internet. Very easy to configure, see the documentation.
squider.pl is a Squid access.log file splitter written in Perl. squider.pl's only purpose is to split logfiles by date (year, month, day or any combination)!
Intranet Logger is a suite of programs designed to centralize the parsing, analysis and presentation of system log information generated by computers in an intranet.
AVirCAP is a system for manual and / or automated detection of CodeRed and Nimda type of hack attempts and virtually all other kinds of "logable" intrusion attempts. It can work stand alone or together with other additional AVirCAP machines in the LAN/W
AskReg is a command line utility for MS Windows that queries registry keys and values, returning error levels to indicate presence or value matches, and also is capable of generating 'set' strings suitable for writing to batch files.
To keep track of various stuff here at home.
Like books, records (CD, LP), video/DVD etc. There isn't a web based database that I've found that is free that keeps track of all this.
PHP-Vegi is a statistical application mainly intended for those
desiring an easily customizable and easily deployed system. It
relies on the mySQL/PHP interface and displays a wide variety of
useful information based on collected data.
Shadow Watcher is a Peer to Peer log sharing tool for the security analyst. Consider it a "community watch" program which allows you to keep your system secure from the threats on the internet and help others do the same.
A simple script that generate reports for ISC DHCPD 2.x, organized by "shared-network." Optionally, you can run this script as a cron job and have it send out warning email should a scope need attention.