With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Get the most trusted enterprise browser
Advanced built-in security helps IT prevent breaches before they happen
Defend against security incidents with Chrome Enterprise. Create customizable controls, manage extensions and set proactive alerts to keep your data and employees protected without slowing down productivity.
DPytHOS is a means for administrators of large networks to both
monitor and manage the servers under their control.
DPytHOS is implemented in python and uses a generic database
back-end (with MySQL supported and MS-SQL 2000 supported via
XML)
Phasault is a EMail Tool-Client, which provides some features you can't see in other E-mail Clients. Coded in Python using Tk as GUI. Works in Win32 and Unix/Linux (with python interpreter installed), and also planning to create stand-alone distribution o
Build gen AI apps with an all-in-one modern database: MongoDB Atlas
MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
Shadow Watcher is a Peer to Peer log sharing tool for the security analyst. Consider it a "community watch" program which allows you to keep your system secure from the threats on the internet and help others do the same.
NetgearDG tools is a collection of command line utilities to administer Netgear routers running DGTeam firmware. Currently the only supported router is the Netgear DG834GT.
Open source Penetration Testing Suite for IT professionals and penetration testers. SecTest automates the boring repetitive procedures of penetration testing.