With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Context for your AI agents
Crawl websites, sync to vector databases, and power RAG applications. Pre-built integrations for LLM pipelines and AI assistants.
Build data pipelines that feed your AI models and agents without managing infrastructure. Crawl any website, transform content, and push directly to your preferred vector store. Use 10,000+ tools for RAG applications, AI assistants, and real-time knowledge bases. Monitor site changes, trigger workflows on new data, and keep your AIs fed with fresh, structured information. Cloud-native, API-first, and free to start until you need to scale.
Development area for GNU/Linux 2.6.x for the KS8695 ARM SoC. Covers kernel patches, drivers for serial, Ethernet, PCI, GPIO, watchdog subsystems, and drivers for optional PCI based devices such as USB, WiFi, WiMAX, IPSec, SSL, and RSA devices.
Foresight is a security architecture designed to detect, alert, respond, and report on events happening throughout the enterprise. The interface aggregates and correlates security information (like a SIM or SEM) from multiple devices within the network.
SharedSecret is a program used to negotiate a shared secret (password) by two hosts in secure way over the Internet. The software is written in C, based on client/server architecture with initial intention to run on POSIX-Compliant Operating Systems.
Telescan is a full featured, multithreaded war dialer written in C for Linux. It can log its activity and carrier information to a database, in which detailed reports can be run regarding activity.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
SMSec is a free , open source, GPLed implementation of two-factor authentication via SMS (Short Message Service). It uses SMSD to "talk" to GSM modems, provides a flexible XMLRPC web-service for web-developers integrate SMSec into their web-apps.
The Nemesis Project is designed to be a command line based, portable human
IP stack for UNIX-like and Windows systems. The suite is broken down by
protocol, and should allow for useful scripting of injected packets from
simple shell scripts.
An original bruteforce-based encryption/decryption system. BBE was originally conceived to chat with encrypted text on IRC. mIRC and X-Chat support BBE via script addon. BBE can also encrypt MIME encoded files. Blowfish encryption is currently supported.
UnityCA is a Certificate Authority "front end" based on the Community-Oriented CA (COCA) model, which was primarily developed for non-profit "free CAs." Organizational and end-user interfaces provide trusted web management of the installed CA (eg ElyCA).
C++ libraries for creation of CGI applications. Functions include stream operators for the creation of HTML formatting, forms, etc. URL decoding and element retrieval, MySQL access, and encryption.
LULA stands for Lightweight User-Level ACL. A new way to manage SQUID ACLs, based on a MySQL embed and a Helper, targeting Enterprise Environments
LuLa is the translation to portuguese of the word Squid. Also, LuLa is the name of brazilian president..
Automated Security Tools (autosec) aims to provide
automatic tools which network administrators may use
to help check and test the security of their network.
Kerberos Poppassd is a password changing daemon based upon poppassd version 1.8 by Pawel Krawczyk. The daemon works exactly like the original poppassd. The only difference being that this poppassd changes a users Kerberos 5 password.
The subject of this project is development of the Intrusion Detection System (IDS) with Artificial Neural Network (ANN). This model will allow the implementation of a system capable to analyze and to identify possible intrusions, based on the method of an
ThreatMan is an IDMEF compliant threat manager application which makes use of a multi-tier architecture.
It aims in event and vulnerability correlation from alerts sent by IDSs, firewalls and other IDMEF compliant applications.
sntm is a Qt based GUI snort monitor. Currently, it is capable of monitoring
multiple snort sensors in a centralized monitor screen. Each snort sensor
creates a SSL encrypted communication thread to connect to the moniter server.