With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Qryptix consists of a PAM object and utilities for session- and key-management for encrypted home directories using the International Kernel (CryptoAPI) patches for Linux. It simplifies login/logout, mounting/unmounting, and key generation and changing.
AUTHd: Admission control daemon is a system aiming to provide authentication and authorisation services to other services. Uses the keynote trust management system. It is accessible via IPC, network (OpenSSL support) and kernel-space.
USRBAC is a kernel patch and userspace daemon that allows role based access control to be mitegated in userspace. The goal is to allow a secure way to impliment RBAC compliant security systems using a daemon in userspace
Crawl websites, sync to vector databases, and power RAG applications. Pre-built integrations for LLM pipelines and AI assistants.
Build data pipelines that feed your AI models and agents without managing infrastructure. Crawl any website, transform content, and push directly to your preferred vector store. Use 10,000+ tools for RAG applications, AI assistants, and real-time knowledge bases. Monitor site changes, trigger workflows on new data, and keep your AIs fed with fresh, structured information. Cloud-native, API-first, and free to start until you need to scale.
Psniff is a packet sniffer and spoofer based on the PF_PACKET protocol family provided in kernel >=2.0 . Some of the protocols initially supported are IPV4,IPV6,TCP,UCP,BGP,ICMP,RIP, NTP.
A "Theoretically Secure Operating System", focused on information protection, that is provably secure provided that a specific part of the kernel would be free of bugs.
In particular, bugs in application can't be exploited to attack the system.
Status Module is a daemon which forwards vital system information (memory usage, active processes, etc.) into the kernel logs by using a kernel module. This is very useful for logging or security purposes.
Fwpass is a daemon that executes commands in response to specific sequence of incoming IP packets. It does not use TCP/IP sockets but relies on ULOG functionality of Netfilter (Linux kernel built in firewall).
To develop an auditing package that is compliant with the U.S. Governments C2 standards for security and, if possible, provides a mechanism for allowing the information collected to be admissible as evidence in a court of law.
IPKungFu is an iptables-based Linux firewall. The primary design goals are security, ease of use, and performance, in that order. It takes advantage of advanced features of iptables, tcpwrappers, and the Linux kernel.
KISS is a kernel-side host-oriented security tool, which may bring you file integrity checking, file and process hiding and actions handling on special internal events (using a tiny scripting language).
A linux kernel module and supporting user space environment which allow interception and modifying system calls that match user defined criteria. Think of it as strace on steroids.
stands for Active Integrity Software, provide quick alert of elf file modifications.
Based on Gnu/Linux OS, with a daemon to analyse datas give by the kernel module, written in C.
The Firewall Configurator for Webmin is a Webmin module written in Perl/CGI. It helps to build rules for common proxy server Squid and common paketfilter Iptables ( linux kernel 2.4.x ).
ProSum is a terminal based program that protects your files, sys_call_table and IDT like tripwire way (All in user space, without kernel modules) In addition, database with files etc. could be encrypted with Blowfish algorythm and more.
The Entropy Gathering Daemon is a portable perl script which provides a source of randomness on systems that lack an in-kernel /dev/random. GnuPG, OpenSSH, and the OpenSSL toolkit can use EGD to seed their random number generators.
RSA-IP is a Linux kernel net _protocol_ which encrypts IPv[4;6] using RSA public/private key.Think of it as a kernel level implementation of ssl. RSA needs prime number so we release a prime searcher.
The Linux Transparent Encryption project aims for integrating transparent read/write access to encrypted data into the linux
kernel. This enables any application to use encrypted data
without modifying the application itself.
LinuxBSM-2 introduces auditing features in Linux kernel to achieve better security and keep an eye on system activities.
Any kernel-derived data can be audited.