With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Context for your AI agents
Crawl websites, sync to vector databases, and power RAG applications. Pre-built integrations for LLM pipelines and AI assistants.
Build data pipelines that feed your AI models and agents without managing infrastructure. Crawl any website, transform content, and push directly to your preferred vector store. Use 10,000+ tools for RAG applications, AI assistants, and real-time knowledge bases. Monitor site changes, trigger workflows on new data, and keep your AIs fed with fresh, structured information. Cloud-native, API-first, and free to start until you need to scale.
Real-Time Proactive Secret Sharing Library for RTAI is an implementation of the Shamir's secret sharing scheme and Herzberg's proactive secret sharing algorithm. The library uses a port of GNU GMP in order to make multiple precision arithmetic operatio
deface-no-tnx is an anti-defacement system that monitors your Web files and notifies you about unallowed changes. It also replaces the defaced page with a standard "error" page,so that no offensive/joking content can be frauodolently added to your site
brutesshd is an application written in c/php in order to prevent bruteforce attacks through ssh. Brutesshd uses iptables/pfctl tools to block this type of attacks
It's a modern take on desktop management that can be scaled as per organizational needs.
Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
Network Threat Simulation Tool (NTST) will be able to effectively simulate any network security threat including worms, Trojans, spywares, & exploits. It will help in testing the effectiveness of network security devices like IDS/IPS/Firewall.
Polydish is a polymorphic Internet server capable of accepting pluggable protocols (written in Python or Ruby), and can thereby serve any type of content imaginable. The backend code is a fast, secure, C-based server, employing thread pools and OpenSSL.
sudosh is a sudo shell, filter and can be used as a login shell. Sudosh records all keystrokes and output and can play back the session as just like a VCR.
Iron Bars Shell is a restricted Unix shell. The user can not step out of, nor access files outside the home directory. It is written in C for Linux. No libraries used. It is small, fast, secure. Two ascii configuration files for more control.
Create and convert pipeline at scale through industry leading SMS campaigns, automation, and conversation management.
TextUs is the leading text messaging service provider for businesses that want to engage in real-time conversations with customers, leads, employees and candidates. Text messaging is one of the most engaging ways to communicate with customers, candidates, employees and leads. 1:1, two-way messaging encourages response and engagement. Text messages help teams get 10x the response rate over phone and email. Business text messaging has become a more viable form of communication than traditional mediums. The TextUs user experience is intentionally designed to resemble the familiar SMS inbox, allowing users to easily manage contacts, conversations, and campaigns. Work right from your desktop with the TextUs web app or use the Chrome extension alongside your ATS or CRM. Leverage the mobile app for on-the-go sending and responding.
ext2hide allows users and administrators to utilize the reserved space of the ext2/3 superblocks to store hidden data on their filesystems, rendering it inaccessible to any normal viewing, yet still residing in permanent storage on disk.
Tomahawk is a command line utility that supports high speeds bidirectional replay (300-750 Mbps) of saved tcpdump(8) files. Tomahawk is great for testing the throughput and blocking capabilities of network-based intrusion prevention
systems (NIPS).
fswatch is a small, simple utility that detects changes in a filesystem. it watches for a file system integrity. it checks inode, links, uid, gid, mode, size, flags, ctime, checksum (SHA1).
TuxGuardian is an application-based firewall with a graphical interface. It's main task is to control and forbid transmission & reception of data by unauthorized applications; it can be thought as the Linux equivalent to apps such as ZoneAlarm and Kerio
This program allows you to use SSH, TELNET, VNC, FTP and any other Internet application from behind HTTP(HTTPS) and SOCKS(4/5) proxy servers. This "proxifier" provides proxy server support to any app.
dkfd is a DomainKeys filter daemon using libdomainkeys library. targeted usage is SMTP proxy of Postfix MTA. Currently developing under Linux/FreeBSD, and Solaris.
wIDSard is an host based Intrusion Detection System.
It intercepts syscalls made by the process to monitor at user level
by the ptrace mechanism. It can detect not only single system calls, but even
sequences, ripetition, negation ecc.
Bisker is a simple cgi scanner written in C language for GNU/linux platforms. It's an useful tool to find critical or dangerous cgis/folders/files on local and remote machines (also through proxy).
aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump, aireplay, aircrack, airdecap, and some tools to handle capture files (merge, convert, etc.).
Paranoid Android is a security enhancer for Mac OS X. Whenever an application asks the operating system to open a URI, Paranoid Android steps in and asks the user for confirmation before it can be opened.
SecureRSS - Secure RSS-Syndication for Mobile Devices. Non-repudiability of RSS-Newsfeed channels/items on the assumption of a resource-constraint client using w3c-ietf xml signatures. (proof-of-concept)
OpenInfreno is an opensource root wars toolkit & engine designed to score attackers accessing a network of victims. This project consists of a score server and several tools, as well as documentation and implementation information.