With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts coming from a SNORT IDS system.
At an early stage of development. Application/middleware usage monitoring/reporting. Focus on business transactions/use cases to help communicate with users. Small footprint, easy to use GUI and a level of statistical analysis to summarise the data.
F2F is an XSLT scriptable strong-encrypted XML-VM with an F2F communications framework. Installed on a webserver, an F2F servers make up a decentralised network for securely sharing of XML data and requests with friends, friends of friends, foafoaf etc.
The project aims to develop an open-source Linux-based DNS system, A more flexible domain name and IP address mapping system can be developed by using a variety of plug-ins to achieve DDNS, along with load balancing capabilities. from Beijing China.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
A Perl and ExtJS based server monitoring and tracking system with SNMP modules for IBM Bladecenter Management Modules (AMM & MM), IBM xSeries RSA II Cards, and libvirt based virtual machines.
Nodogsplash offers a simple way to provide restricted access to an internet connection. It is intended for use on wireless access points running OpenWRT (but may also work on other Linux-based devices).
A PHP 5 library for querying game servers. Currently supporting over 160 games, including source (half-life), unreal and quake engine games, ase & gamespy protocols. Newer games supported are Crysis & Call of Duty 5. Also supports Teamspeak 2.
The SWAG (Simple Wireless Authentication of Guest) will assist those in need of creating guest user accounts on a Cisco WLC. This tool prompts for a WLC user and password along with the guest firstname and lastname, then prints out the Credentials.
IP Reg is a IPAM tool to keep track of assets, nodes (IP addresses, MAC addresses, DNS aliases) within different subnets, over different locations or even VLAN's. Written in PHP, used with a MySQL-database to have a unique insight in your local network!
This is an application to allow collecting, presenting and administering Cisco flows from routers and layer-3 switches. It contains a Collector, a Grapher and a PHP administration environment. Netflow packet supported version is 5
Cislog is a syslog server that specifically targets Cisco devices and their implementation of the syslog protocol. It consists of a Django web interface and a syslog listener with a database between them.
IPHPLog (IP PHP Log) is a simple software written in PHP, JS and SQL that runs over a MySQL database manager system . IPHPLog can log the information of your visitors and organize that on a data base with GeoIP.
Corazones Web Toolbox es una compilación de herramientas para realizar auditorías de seguridad informática. Entre sus herramientas incluye: | MAC spoofing | Admin panel Finder | Port scanner | MD5 multi search | Metasploit web launcher | etc...
JMIBBrowser is a java based MIB Browser. It supports GET and SET queries for SNMP enabled devices. MIB Files can be dynamically loaded and can be browsed in the MIB Tree. It is a great tool if you want to get started with the SNMP protocol. Check out htt
System Information Monitor is a java based program that monitors various system information, it supports many platform including Windows, Linux and Unix. The underlying API utilizes Hyperic SIGAR API, JFreeChart and Swing Application Framework.
Laika analyzes and reports on the interoperability capabilities of EHR systems. This includes the testing for certification of EHR software products and networks.
If you use tripwire, you have to review and accept changes on a daily basis. Logging into multiple servers to accept the changes is troublesome. Enter CentralWire: a web-based centralized console to review and accept changes detected by tripwire.
TPCAT is based upon pcapdiff by the EFF. TPCAT will analyze two packet captures (taken on each side of the firewall as an example) and report any packets that were seen on the source capture but didn’t make it to the dest. See docs for info.
phpDHCPAdmin Manage the ISC DHCPD Service. Groups, User access levels, PXE, Multiple subnets, lease management, graphing features, classes support, multiple pool support. Built with security, flexibility and usage for large scale dhcp environments
TheWirelessObserver is a monitoring framework for Cisco Wireless Controller(s). It tracks the status of controllers, access points, clients etc. The collected data is stored into a database and can be viewed by a web frontend.