With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
NetworkTools has 2 components: A protocol analyzer which plays a TCP client or server or pipeline, which sits between a client and server and shows how they communicate. A port scanner can scan a range of IP addresses and ports. See screenshots.
Java Based Cryptographic P2P Messaging Client, is based on a client-server architecture. The Client is made in SWING. The server is text based. Server keeps tabs on presense and the users public keys. Presentation: http://varun.accosted.net/talks.php
Portknocker is an easy to use, platform independant port knocking client. Our aim is support one easy to use client interface that support most popular portknocking server implementations.
DNScat is a "swiss-army knife" tool to tunnel traffic through DNS servers. It is a small, yet powerfull tool, similar to netcat. In conjunction with PPP server, it allows to build a VPN using DNS packets. DNScat is a useful tool for penetration testing.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
The J-WASTE project aims at the implementation of a platform independent client/server Java implementation of the WASTE protocol. This project started as a mandatory project course in networking at the Luleĺ University of Technology in Sweden.
CarrierPigeon enables intelligent, transparent and secure usage of data sources across networked sites. The underlying, distributed Java-framework is built on the concept of proxy drivers to provide a real VPN experience.
SACRED (Securely Available Credentials) is an IETF framework and protocol for credential portability to allow secure, authenticated access to security credentials. This project provides SACRED client and server implementations.
PfPro is a "fat" client for managing configurations for PF-based firewalls. It is a graphical client-side application for managing multiple firewall configurations.
JWall is not just a java gui for iptables. JWall is a multi firewall management client. A secure rulebase can be built with graphical objects. Rulesets can be pushed to remote firewalls (via ssh). The remote firewall just needs to be Linux with sshd
SocketSwitchboard is a virtual proxy, router, or VPN. It uses an XML configuration to map incoming traffic on one or more ports to designated hosts and ports on the LAN or on the Internet. It supports complex boolean access restrictions and SSL.
JSecureTunneling is a Java SSH client that is entirely oriented in the management of SSH tunnels, offering the ability to establish secure and permanent tunnels to a remote SSH server, transparently just like a simple network connection.
Sniffer Server - decodes TCP streams and captures packets in general
The captured content may be saved to files or sent to a client over TCP/IP connection (self-defined protocol)
VPNmonitor is a Java tool for network administrators to monitor VPN and SSL connections. The graphical representation makes it easy to visualize messages between computer nodes. Users can also read messages not of the above types in plain text.
A Java-based client-server architecture for processing network intrusion detection data. The server receives XML alerts from Snort sensors buffers them for review by clients. The console provides a real-time view of IDS activity.
<b>IVJ MUD (Masive Multiplayer Text Game) is a SSL-based soft:<br>-Client (GUI)<br>-Server (GUI)<br>-Applet (GUI)<br>-Protocol (SSL-based, use of localization files that store strings to reduce trafic and allow for instant i18n.<br>
LOOKING FOR HELP!</b
jRevProxy is a lightweight reverse proxy server fully written in Java. jRevProxy accepts HTTP and HTTPS requests and translates these into new requests based on a set of rules. HTTPS with client side authentication (X509 certificates) is supported.
The Secure Remote Log Monitor (SRLM) project provides client and server
utilities that collect application or system log files from multiple systems over an untrusted network onto a central server for analysis and action.