With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
WebPAJ (pronounced "web page") is an XML based Java application that simulates multiple concurrent users and can be used to identify bottlenecking and capacity constraints on your web site and web applications.
JSMAN provides open source, high level interoperable Java-based components to enable <b>seamless integration and cooperation</b> of both legacy and highly innovative paradigms in the element, network and service management arena.
Open Ecommerce Labs focuses on enabling a scalable, federated, and interoperable Ecommerce environments by developing software for identity management, policy management, and security. Project 1 (q1 '05):SAML Policy, Attribute, and Configuration Editor.
This Project aims to provide a fully portable Java based RTFM network meter and Network monitoring/managementsystem
It uses pcap which is simplify using jpcap library ( JAVA PCAP binding )
Dun and Bradstreet Risk Analytics - Supplier Intelligence
Use an AI-powered solution for supply and compliance teams who want to mitigate costly supplier risks intelligently.
Risk, procurement, and compliance teams across the globe are under pressure to deal with geopolitical and business risks. Third-party risk exposure is impacted by rapidly scaling complexity in domestic and cross-border businesses, along with complicated and diverse regulations. It is extremely important for companies to proactively manage their third-party relationships. An AI-powered solution to mitigate and monitor counterparty risks on a continuous basis, this cutting-edge platform is powered by D&B’s Data Cloud with 520M+ Global Business Records and 2B+ yearly updates for third-party risk insights. With high-risk procurement alerts and multibillion match points, D&B Risk Analytics leverages best-in-class risk data to help drive informed decisions. Perform quick and comprehensive screening, using intelligent workflows. Receive ongoing alerts of key business indicators and disruptions.
ossITSM is a full function ITSM(IT Service Management) system. References ITIL, etc. Includes 5 big parts: Service Strategy, Service Design, Service Transaction and Service Operation.Continue Service Management.Also CMDB and Monitoring System.
Its a software which can be used to simulate and emulate the mobility management in the wireless network, this implements the mobility management algorithm,
it uses the Blue tooth as a communication media between a wireless terminal and
Simple GUI tool for creating and manipulating WSN topologies
TOPO is a simple tool that allows the user to create and manipulate arbitrary Wireless Sensor Network (WSN) topologies without worrying about the anomalies that could arise using a text-base topology description. It is fast and easy to use and can accelerate small scale projects such as network simulation.
The tool is still undergoing development stage and is open to extension. One the candidate component to be soon integrated is a WSN discrete event simulator.
Monitoring tool with support to Websites, RSS, Webservices and Databases. Has notifications by email and RSS and you can access metrics like availability, latency and load time by a web-based GUI. Runs standalone with an embedded HTTP server.
Yeastar: Business Phone System and Unified Communications
Go beyond just a PBX with all communications integrated as one.
User-friendly, optimized, and scalable, the Yeastar P-Series Phone System redefines business connectivity by bringing together calling, meetings, omnichannel messaging, and integrations in one simple platform—removing the limitations of distance, platforms, and systems.
FreeACS is Free Auto-Configuration Server. The project has just started, but we hope (and plan) to provide a free (GPL) full implementation of the CPE WAN Management Protocol (CWMP).
VeriNeC (Verified Network Configuration) is a network configuration management application. It allows to import configuration, simulate and verify the network and distribute configuration to devices.
WiFi Direct File Transfer is a experimental app that will allow sharing of data between Android devices running Android 4.0 or higher using a WiFi direct connection without the use of a WiFi access point. This will enable data transfer between devices without relying on any existing network infrastructure