With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
Ariesbot, is an ircbot, which will be able of doing basic bot functions such as op/deop/kick/ban/moderate. Plus being able to Wu-Ftpd scans, cgi/php scans port scans, subnet scans and scan for vuln version of apache to nosejob.c.
ISO 17799 - Code of practice for information security management. Creation of methodology and documentation for audit adapted to ISO. One is made up of an introduction on general aspects of the security of the information.
Simple Firewall is a easy tool for administration users and access control.
This tool is made for Linux.
Using iptables for packet filtering
Write in perl
Save rules with xml.
That can be run in bash shell and web via webmin.
This version of firewa
The IP Personality project is a patch to the Linux kernels that adds netfilter features: it enables the emulation of other OSes at the network level, thus fooling remote OS detection tools such as nmap that rely on network fingerprinting.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Freemail enables secure, anonymous, two-party communication over
Freenet. The use of flexible channel initiation protocols and secure message transport allows allows cultivation of anonymous identities with reliable reputations.
libnwrap - a library of network function wrappers that provides a simple and clear yet powerfull enough API for UNIX network programming. It targets ease of use, protocol independence, reentrancy, thread-safety, as well as built-in cryptograpy
CuteFTP Password Recovery (cutepr) is a small utility that recovers passwords stored in CuteFTP's database, sm.dat. Sometimes users store the passwords, and then forget them. This utility searches through the database and displays all the site informati
chruid is a small but flexible replacement for a chroot + su kombo. i wrote it because i was in the need to chroot processes and having them run under a non-privileged uid/gid without having to install su (which would include pam, nss, ... overhead on som
Geheimnis is no longer maintained (use of kpgp is now recommended). Geheimnis was an application for UNIX/KDE that "wraped" around encryption programs and their irksome command-line interface, making it easier for users to use these programs.
Track all IP/TCP, IP/UDP, NetBeui, IPX/SPX connections and ARP/RARP traffic. Optionally save connections in MySQL database. Implement http server so you can view connections with web browser or GTK client. Can send fake ARP reply and kill TCP connection
Pace-ICMP is a utility that can allow X amount of ICMP (ping, etc) packets travel to the host, once X is exceeded, all ICMP traffic is blocked. This allows ping and traceroute functionality, while still protecting you against ICMP attacks.
The Entropy Gathering Daemon is a portable perl script which provides a source of randomness on systems that lack an in-kernel /dev/random. GnuPG, OpenSSH, and the OpenSSL toolkit can use EGD to seed their random number generators.
Next generation reverse proxy : provides authentication and authorization services for all incoming HTTP traffic, in addition to offering transparent web SSO to protected applications.
This is a simple program to encode normal, ASCII text in to its ASCII value and then convert that number to roman numerals. Ideal for quick notes to friends that you don't want others to easily read. Unlike encryption though, I just described the algo
The secsuite Security Suite is, as it is called, a security suite. At the moment, only a portscanner with a graphical GUI is implemented. Screenshots of it are not yet avaiable.
This program allow you to extract files from network traffic under HTTP and FTP protocols. It should permit you to see, for instance, using an antivirus on the files, if a machine of your network have downloaded a virus.