With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
Simple multi tool for scouts. It contains:
chat server
chat client
encryption tool
simple www browser
simple www editor
e-mail client (for sending messagess)
mass e-mail sender
Written in VS2008
PQStego is a C implementation of J. Fridrich algorithm for embedding secret messages in JPEG images as described in her paper "Perturbed quantization steganography with wet paper codes "
PAM module that authenticates against a remote IMAP or IMAPS server. Supports multiple servers, SSL, password caching, user blacklists, and many configuration abilities.
For companies looking to automate their consolidation and financial statement function
The software is cloud based and automates complexities around consolidating and reporting for groups with multiple year ends, currencies and ERP systems with a slice and dice approach to reporting. While retaining the structure, control and validation needed in a financial reporting tool, we’ve managed to keep things flexible.
Netstorm is a highly flexible, fast and plattform independent network security and reliability tester which allows you to setup real world low level flood attack scenarios (such as MITM, DoS and DDoS) within a local area network and on the internet.
The main purpose of this project is to develop a Graphic policy definition editor implemented in Java language and based on the XACML standard which manages access control policies
Nessconnect is a GUI, CLI and API client for Nessus and Nessus compatible servers. With an improved user interface, it provides local session management, scan templates, report generation through XSLT, charts and graphs, and vulnerability trending.
Powerfuzzer is a highly automated web fuzzer based on many other OpenSource fuzzers available (incl. cfuzzer, fuzzled, fuzzer.pl, jbrofuzz, webscarab, wapiti, Socket Fuzzer). It can detect XSS, Injections (SQL, LDAP, commands, code, XPATH) and other
Rise Vision is the #1 digital signage company, offering easy-to-use cloud digital signage software compatible with any player across multiple screens. Forget about static displays. Save time and boost sales with 500+ customizable content templates for your screens. If you ever need help, get free training and exceptionally fast support.
VDE2 OpenMoko Tunnel is a Python/GTK visual interface created for OpenMoko Freerunner. It is intended to build virtual ethernet tunnels to remote VDE switches.
This program is released under the GPL v2 as part of the Virtualsquare project.
JSecurity is a powerful and flexible open-sourceJava security framework that cleanly handles authentication, authorization, enterprise session management, and cryptography services.
NARC Network Analysis Reporting Console takes output from security tools like Nessus, and NMap & populates a database via automated scripts for reporting purposes. Version 0.DC14 also includes rudimentary reporting capabilities. New from kaos.theory
FrozenFS aims to be a complete implementation of an immutable file system on unix-like systems. FrozenFS tries to emulate on unix-like platforms the functionality provided by Deep Freeze for the Windows platform.
Inguma is a free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembl
Zivios is a web based control panel which brings together vital opensource technologies needed by medium and large enterprises. Zivios provides identity management,user, group and computer provisioning, as well as remote management of services.
Mod_auth_kerb is a module that provides Kerberos user authentication to the Apache web server. It allows to retrieve the username/password pair, and also supports full Kerberos authentication (also known as Negotiate or SPNEGO based authentication).
A tool to monitor internet hosts` bandwidth usage in a Linux-NAT network. A daemon collects data and clients display them (currently a Java applet with a graph). It automatically detects new hosts and has a nice summary statistic.
By emulating widespread vulnerabilities the honeypot Nepenthes is able to catch and store viruses worms using these vulnerabilities. The api interface to add new vulnerability modules is easy to use, so there is no problem in writing new ones.
As SSLExplorer is now closed source, SSLE-PAM has been ported and integrated to Adito, THE OpenSource fork of SSLExplorer. http://sourceforge.net/projects/adito
The kernel network stack may behave not as expected, especially in the case of receiving packets. With Ianus it is possible to bypass the kernel network stack and to develop your own network stack in user space or other tools.
Store and retrieve passwords Online while keeping it secure. Web based (php+flatfile) for easy retrieval. All passwords stored are encrypted and the master (key) password is never saved. Even the user-id are all encrypted. CHECK PROJECT WEBSITE FOR DEMO!