With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Context for your AI agents
Crawl websites, sync to vector databases, and power RAG applications. Pre-built integrations for LLM pipelines and AI assistants.
Build data pipelines that feed your AI models and agents without managing infrastructure. Crawl any website, transform content, and push directly to your preferred vector store. Use 10,000+ tools for RAG applications, AI assistants, and real-time knowledge bases. Monitor site changes, trigger workflows on new data, and keep your AIs fed with fresh, structured information. Cloud-native, API-first, and free to start until you need to scale.
Retrieve files from a remote computer using a PDA/Pocket PC running Windows Mobile.
Can access remote computers regardless the geographical position. Can work under WiFi, GPRS or any other wireless networks.
Know the foreign addresses your system is accessing without your knowledge and
check the enabled ports and IP addresses on your system and remote system.
The GUI is designed in SWT which has a great look and feel with pretty browser and more.
Get an up-to-date view of what's happening in your social network. You can browse based on specific keywords (tags) and see who's talking about what in your proximity.
Zeroconf-to-Zeroconf Toolkit (z2z) extends the reach of the Zeroconf service discovery (aka Bonjour by Apple) beyond local link. Yes, this means that it lets you access your iTunes music shares across the Internet.
Inventors: Validate Your Idea, Protect It and Gain Market Advantages
SenseIP is ideal for individual inventors, startups, and businesses
senseIP is an AI innovation platform for inventors, automating any aspect of IP from the moment you have an idea. You can have it researched for uniqueness and protected; quickly and effortlessly, without expensive attorneys. Built for business success while securing your competitive edge.
Jbi4ejb is a JBI compliant Binding Component that allows existing EJB to interact with a JBI ESB. EJB operations can be called from the ESB without the need to modify or even redeploy the EJB.
Access Point Management Open System, es un prototipo de software desarrollado para el descubrimiento, configuracion y captura de eventos en puntos de acceso de la familia Aironet de Cisco y 3Com
Opensource SNMP library for Java platform. It allows you to expose your spring beans via SNMP transparently using XML or annotations. Standalone (non-spring) applications are also supported.
The High Interaction Honeypot Analysis Toolkit (HIHAT) allows to transform arbitrary PHP applications into a web-based Honeypot. A semi-automatic user interface supports the analysis process, scans for attacks etc.
Companies searching for an Employer of Record solution to mitigate risk and manage compliance, taxes, benefits, and payroll anywhere in the world
With G-P's industry-leading Employer of Record (EOR) and Contractor solutions, you can hire, onboard and manage teams in 180+ countries — quickly and compliantly — without setting up entities.
Fireflier is a firewall tool, which is built on top of the iptables framework. You can create rules based on single incoming network packets or simply allow/deny single packets to pass. This project is discontinued. (see homepage)
WYMIWYG KnoBot is a content management system for the semantic web designed to promote the exchange of content with a P2P and reputation based system. The aim is to create a socio-topical space, a perspective dependent space of information and knowledge.
RUNES is a cross-platform, component-based middleware framework allowing for dynamic reconfiguration of functionality. Its lightweight implementation spans powerful nodes like PDAs and PCs, as well as tiny embedded devices.
jIPRoute is a web tool on top of iproute package. It allows you to view in a human way how network qdisc is configured and also manipulate it, changing classes and filters. It reads the current HTB qdisc state from the kernel. Other queues are been added
A high-performance, multi-stage, event-driven networking framework written entirely in Java using NIO. It is designed to abstract most (if not all) of the networking complexities so that beginner or expert, you can concentrate on what really counts... yo
Alternative implementation of Spring framework remoting subsystem that supports different schemes of remote communication between client and server (1-1, 1-many, dynamic services discovering).
InterStructures a Linux System Administration platform built using MMC familiar to systems administrators.It is a complete server administration platform integrating Linux and Windows servers and providing intuitive and easy point and click administratio
NetWhistler is SNMP monitoring software that offers integrated fault and performance management functionality. This Java program auto-detects networks and presents them on graphical maps, which reflect host status. Mila NNM is a pyQT fork of Netwhistler.
This lightweight, Spring-friendly, broker independent library provides a simple way to make remote calls via JMS API, allows RMI over JMS. The library supports synchronous and asynchronous remote method invocations as well as remote callbacks.
This project constitutes an implementation of a custom-design distributed computing environment. The implementation is based on a form of Nbody simulation, which ran successfully across 33 networked-hosts.
Peepo is a tool for remote analysis of Apache weblogs in real time. It consists of a server that broadcasts Apache logs via UDP and a desktop application that receives, filters and plots them.
The underlayer is a symmetric decentralized parallel computing and load balancing framework, providing c, perl and java APIs for distributed job management.
The Citizen Privacy Service is an asynchronous component using artificial intelligence capabilities including DL decidability and first order logic provenance that provide policy decision and policy enforcement points based on the US Privacy Act of 1974.