With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Context for your AI agents
Crawl websites, sync to vector databases, and power RAG applications. Pre-built integrations for LLM pipelines and AI assistants.
Build data pipelines that feed your AI models and agents without managing infrastructure. Crawl any website, transform content, and push directly to your preferred vector store. Use 10,000+ tools for RAG applications, AI assistants, and real-time knowledge bases. Monitor site changes, trigger workflows on new data, and keep your AIs fed with fresh, structured information. Cloud-native, API-first, and free to start until you need to scale.
The SLAN project is a GPL open-source project providing a cross platform Virtual Private Networking (VPN) solution focused on providing secured and accountable links over insecure broadcast media such as 802.11 wireless LANs and public ethernets.
A Java Swing application to 'securely' store passwords using symmetric encryption. A user can set up one or many 'datastores' of password/username combinations and commit them to disk. They are stored on the file system using PBE Blowfish.
A password manager that is able to encript data in various algorithms and store them in file, database, ...
It is written in 100% pure Java using only Java technology.
Web-Check is a tool for comparing two web pages using md5 digests. It can be run from the command line or as a daemon. This project plans to become an opensource version of Tripwire for Apache.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
SnortKonsole is a Java-Frontend for the OpenSource Network Intrusion Detection System Snort. It supports all configuration-aspects of Snort. The configuration distribution and activating of sensors is done via scp/ssh.
The goal of this project is to allow a network security professional to manage multiple Nokia security devices simultaneously. Check Home Page at http://nfm.sourceforge.net for more information and latest news.
This project is a Linux-PAM module designed for mounting a user's encrypted,
home directory using the user's login credentials as the decryption key. The
module also unmounts the user's home directory at logout to re-encrypt the protected data.
This project is intended to provide a means by which one can insert data other than packet data into the snort/ACID IDS system.
We have scrapped the perl version - since some systems don't have perl - or don't have the ram, cpu or diskspace to run the ho
PHP Project to intercept and stop worms from attacking your Apache server. Offending IP addresses are blocked using iptables/ipchains and the administrator/owner of the source of the attack is notified of the time, date and source IP Address.
A client/server application designed to let the user monitor a directory
tree on a remote machine by creating snapshots of current file status in order
to later detect file modification, addition and/or removal.
E-Dot (which means Encryption and Decryption Of Texts) is a very small tool for encrypting textfiles. E-Dot doesn't use Keyfiles: A password is enough. This tool is available for Linux and Windows, too.
Found at www.itadmins.net in the Projects area. The complete Linux Administrators CD. For normal system and network administration, security, forensics tools and utilities.
Pyton GnuPGInterface is meant to be a filehandle-concentrating Python interface to GnuPG, the GNU Privacy Guard. It has an API similar to the Perl module GnuPG::Interface.
Packet2sql will convert any text file/log file which contains ipchains packet logs into a stream of SQL inserts which can be used as the base for a firewall-analyzing database application.
This is an authentication module for Apache that allows you to authenticate HTTP clients using user entries in an ACE/Server. Users must have a SecurID token and you must have an ACE/Server your Apache Web Server can talk to.
Komoku implements an intrusion detection system using embedded system. Unlike other integrity tools, as tripwire, it does not rely on the operating system. The IDS is actually implemented in an INtel EBSA-285 board.