With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Gemini 3 and 200+ AI Models on One Platform
Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
This project is to develop a versatile benchmark for High Performance Computing (HPC) network environments, currently the Linux-based Beowulf systems. The goal is to examine the TCP/UPD/MPI communications and their impact to system kernel.
The goals of the project are to empower the Nagios community with Enterprise Performance Monitoring plugins for COTS Applications[Oracle - DB2 - MSSQL - PostgreSQL - Ingres - Weblogic - WebSphere - Jboss - Apache - IIS - DotNet - Documentum - etc] .
Small Linux from Network is a little Linux distro loaded from a network connection using a modified version of the DrakX (Mandriva Linux installer) loader. The OS image can be loaded from an HTTP, FTP or NFS server.
AntiDialer is a QT based broadband dialer for Sify Broadband users in India. It has features comparable to the Sify Windows dialer such as password saving and autologin. Now Sify users no longer have to depend upon the old default dialer provided by Sify
gSTM is a front-end for managing SSH-tunneled port redirects. It stores tunnel configurations in a simple XML format. The tunnels (local, remote and dynamic) can be managed and individually started/stopped through one simple interface.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Wep key changer (wepkc) is a client/server application that allows you to protect your ad-hoc (point to point) Wireless network when you are unable to use (due to software or hardware limitations) sophisticated protocols like WPA.
Zulu is a light weight 802.11 wireless frame generation tool to enable fast and easy debugging and probing of 802.11 networks. It has an intuitive command line interface and operates with the madwifi-ng network drivers.
Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys
based on a active dictionary attack, key generator, distributed
network attack and some other methods, it's based on wepattack and GPL licensed
Meghadoot is a hybrid wireless network architecture that provides improved connectivity, efficient routing, and access to the Internet. Meghadoot
architecture combines the advantages of both single-hop and
multi-hop wireless networks.
Kally is a software agent embedded in OpenOffice. We have created a simple interface to allow agents powered by GLORIA (gloria.sourceforge.net) to act as help assistants for users of OpenOffice, the office suite.
Nanov6 is a minature IPv6 stack for the Microchip PIC16 family of microcontrollers. Its modular design and simple API is designed for easy modification and itegration into a wide variety of next-generation network enabled embedded applications.
ip-session gets info of network trafic, such as sip, dip, sport, dport, etc. from linux kernel; gets account info of each traffic, such as in/out bytes/pkgs, etc.; else, gives session management function, such as query/del, etc.
Automated Incident Reporting (AirCERT) is an Internet-scalable infrastructure to automatically receive, process, and analyze security event information reported from across administrative domains.
Ircproxy is transparent IRC content-filtering application. It may be used whenever there is a need of monitoring IRC connections.It may be used to deny specific connections or to behold suspicious IRC traffic.
Piper is a daemon used to redirect streams. Input and output can be one of: stdin, stdout, fifo, program. It simply does the same as shell's "<", ">", "|" with a difference of: ability to re-open fifos, catch program exits/crashes and restart it.
Universal Print Relay Driver - uprd will be designed to send print information to a server on another platform where a native driver may not be available.
The arpsweep utility is a reimplementation of arping which supports multiple
targets in a single command-line invocation. It can also be used as an ARP
network scanner.
EZtorrent is a tool that simplifies the process of publishing content via BitTorrent. EZtorrent automates the process of generating .torrent metainfo files, as well as starting trackers and seeders.