Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
The Secure Remote Log Monitor (SRLM) project provides client and server
utilities that collect application or system log files from multiple systems over an untrusted network onto a central server for analysis and action.
Linux Mobile System is a full Linux system within a USB Flash Memory Drive. This system will be able to boot from any i386 based PC, so we can to run a lot of utilities: network diagnostic, disk diagnostic, administration terminal, etcetera.
This library makes SRV records in DNS simple to use; actually, due to the fallback for classical connection mechanisms, it makes building a network connection in general extremely simple.
isectd is a middleware daemon that provides many-to-many client-to-server connectivity. Supports multiplexing requests to multiple server processes over IP networks.
XmlRpcStream is designed for the situation where a persistant
connection between client and server is required. XmlRpcStream
is not complient with the XML RPC spec as it doesn't use HTTP
as the transport protocol.
Scalable Cluster Environment (SCE) is a set of interoperable opensource tools that enable users to build and use Beowulf cluster effectively to solve their problems.
This project is to continue the (long-stalled) development of SNMPY - an
interface between UCD-SNMP and Python. As well as the basic C interface,
there's a variety of higher-level layers on top of the code.
Originally written by Paul Vixie in 1986 and distributed through mod.sources, "display" is a program which will repeatedly execute a command and display the output through curses. The purpose of this project is to maintain and extend display.
Shadow Watcher is a Peer to Peer log sharing tool for the security analyst. Consider it a "community watch" program which allows you to keep your system secure from the threats on the internet and help others do the same.
PyWIRLD started as a remote ppp dialer. It will be able to manage several machines from a single client, monitor and control network interfaces, and have all features availible via dynamically loadable plugins.
A peer-to-peer chat program that uses public key encryption (via Gnu Privacy Guard) to keep your conversations from the eyes of packet sniffers (*Cough* Carnivore *Cough*)
Freenomalism is a free, community based fork of the Enomalism web-based virtual infrastructure/cloud computing platform. The dashboard can help with issues including deployment planning, load balancing, migration, configuration management, and capacity.
Etch is a cross-platform, language- and transport-independent framework for building and consuming network services. With Etch, service development and consumption becomes no more difficult than library development and consumption.
The use of NAT devices all over the Internet has made peer-to-peer exchanges unreliable. The rise of IPv6 should repair this, but it will still not be reliable until all peers have implemented IPv6. Such IPv6 implementation could be arranged on the fly with a tunnel mechanism that does not rely on router co-operation or manual configuration.
This specification details such a method of embedding IPv6 into UDP and IPv4. It employs embedded Router Solicitation to configure the tunnel's...
This is a Firewall and IDS front-end, the main purpose is simplify configuration of Iptables and Fwsnort and Psad management. The Firewall provides an experimental feature to decide in real-time about each outgoing connection.
Hatohol collects monitoring information from running monitoring systems and shows their integrated data on one screen. This feature enables to consolidate monitoring centers and the operators even when monitored devices are being used in different places or with different monitoring software.