With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Regular Expression, Arbitrary Protocol, Opensource Filtering Firewall (Reapoff) is a regular expression enabled TCP/IP plug proxy.
The proxy operates on data using a pair of simple rule based configuration files defining the testing and actions on th
dkbf is a distributed, keyboard, brute-force program for Linux clusters that attacks Windows NT Lanman and NT hashes using the Message Passing Interface (MPI).
Blaster Scan is a TCP port scanner. It can extract users exploiting vrfy or expn, check anonymous access on FTP, check brute force on FTP and POP3, extract daemons\' versions, and scan for CGI bugs. It also has a SYN port scan, the ability to ping hosts t
BFBTester is great for doing quick, proactive, security checks of binary programs. BFBTester will perform checks of single and multiple argument command line overflows and environment variable overflows. Versions 2.0-BETA and higher can also watch for tem
hping2 is an interactive packet costructor and responses analyzer that uses the same CLI of the ping program (but with a lot of extensions). It can be used to performs a lot of tasks, like testing of firewall rules, (spoofed) port scanning, et cetera.
Cross-platform distributed password cracking tool, used to carry out brute-force attacks on common encryption protocols. Client/server based with administrative web interface.
Open source Penetration Testing Suite for IT professionals and penetration testers. SecTest automates the boring repetitive procedures of penetration testing.
Defensive Tools For The Blind (DTFTB) is a collection of Windows and Linux tools that automate: post exploitation, backdoor, and rouge access discovery, for defenders.
DTFTB allows a system defender to quickly and precisely locate common backdoor tendencies and system misconfigurations used by an attacker to maintain access.
Additionally DTFTB provide automated access-denial tools, that prohibit the introduction of new backdoors to a system.
DTFTB is primarily geared towards CTF or...