With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Loggy is a Linux Advanced Logcleaner and a tool to hide you in a linux machine
by cleaning or modifing the intruder's ip from all the logfiles in /var
bin and txt logs it find logs, with a recursive search in /var/log and a lot of fantastic features
MIDAS is a Network Monitoring and intrusion detection server. It uses a distributed client/server model that allows it to scale to very large networks. As well its own client It supports both Netsaint plugins and Big Brother Clients.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
This project allows users to create their own lower-level network
(such as TCP/IP or another protocol) stack implementations below
the sockets layer by converting the current socket layer into a
functional API.
Loggerithim is an extensible monitoring and remote management package. It allows you to monitor your systems, proactively spot problems, remotely manage, perform post-mortems, throw alerts when bad things happen, predict future needs, and automate routin
HotSaNIC is a Web-based information center for Unix-based systems. It gives you a graphical overview about certain network- and system statistics. HotSaNIC is programmed (mainly in Perl 5) in a modular way to give you a great flexibility of which items yo
Pothos is an iptables log analyzer. It is used to interpret, in a user-friendly fashion, the logs that ulogd creates with it's MySQL plugin. It's main objective is to be efficient, leaving as small a foot-print as possible.
CBQ.init script demonstrate power of CBQ mechanism in network traffic management under Linux platform. This bash script parses human-readable config files and does all needed manipulation with 'tc' linux kernel utilite. See WebCBQ project for Web GUI.
PRATIMA, an Asynchronous Remote Volume Replicator for Linux:
Pratima performs online, real-time, reliable and efficient block level data replication to a remote computer over a network in both synchronous and asynchronous modes for Linux.
The aimed users of this project are ISP, that uses Linux and Linux-based hosts as routers/servers. Requirements : Perl interpreter, iproute2 and iptables or ipchains. These perl scripts, will configure Linux kernel, routing, packet filter and QoS.
Psniff is a packet sniffer and spoofer based on the PF_PACKET protocol family provided in kernel >=2.0 . Some of the protocols initially supported are IPV4,IPV6,TCP,UCP,BGP,ICMP,RIP, NTP.
Live Security/Forensics Linux Distribution, built from scratch and packed full of tools useful for vulnerability analysis, penetration tests, and forensic analysis.
Horizon is a research project aimed at developing a 32-bit OperatingSystem for the Intel architecture. It's written in C and assembler (GAS syntax) and one of its main characteristics is full network integration.
myNetWatchman Perl Agent is a program that is designed to capture rejected packet information from various firewall logs and forward this attack information to central analysis servers at myNetWatchman.com.
Gspoof is a GTK+ program written in C language which makes easier and
accurate the building and the sending of TCP packet with a data-payload or not.
It's possible to modify TCP/IP fields also Ethernet header working to Link Level.
OpenTop is a cross-platform, high-performance C++ class library providing features similar to (and modelled on) core Java facilities such as resource management, networking, multi-threading, Unicode and XML parsing.
I am writing a software that will display internet traffic usage
per node on a Lan network, ie a node correspond to a machine
on a Lan.
Ideally, the software will run on any platform regardless
of the OperatingSystem. However, version 0.1 will be