With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
Pytrap is a another Tripwire crap based on pyinotify. So it is event driven and there is no need for scanning every n seconds about changes. A lot of work is to do - but the heading is clear.
This is the worlds first and probably only FLOSS project aimed to create a lowbudget, based on availble technology, cruise missile. No this is not a Joke, its for real. Why? Since no one has tried to do this before and certainly not under the GPL.
NetSV is part of the management/supervision plane and its role is to assist the network administrator when performing an IPv6 network renumbering by supervising the procedure and making diagnostics on the monitore hosts.
dbt Labs empowers data teams to build reliable, governed data pipelines—accelerating analytics and AI initiatives with speed and confidence.
Data teams use dbt to codify business logic and make it accessible to the entire organization—for use in reporting, ML modeling, and operational workflows.
This utility binds IP addresses of your local network according to MAC adresses stored in MySQL database. It can help to avoid IP spoofing, and increase network control.
The Free Digital Money project aims to promote ideas and stimulate further innovation in the field of digital money. It provides a e-money implementation that can be used by anyone to try out ideas, build sample applications, or for further development.
Packet generator for security research (currently RADIUS protocol). Create either large highly variable test runs or short programs demonstrating a characteristic sequence of packets.
Secure and customizable compute service that lets you create and run virtual machines.
Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
PacketFlow is a command line utility that processes an XML configuration to generate a set of firewall rules. It is intended to be installed and run directly on the firewall itself. PacketFlow was designed to deal with complex configurations.
OpenSessame is a personnel entry control and time tracking management system. Platform independent, multi-node, client-server system, written in Python, with wxPython/wxWidgets client, a web management gui and PostgreSQL database backend.
GuerillaTactics is an effort to bring "Computer Education Through Security Analysis". We aim to create a security education "lab kit" including management software and a curriculum framework.
Polydish is a polymorphic Internet server capable of accepting pluggable protocols (written in Python or Ruby), and can thereby serve any type of content imaginable. The backend code is a fast, secure, C-based server, employing thread pools and OpenSSL.
deface-no-tnx is an anti-defacement system that monitors your Web files and notifies you about unallowed changes. It also replaces the defaced page with a standard "error" page,so that no offensive/joking content can be frauodolently added to your site
RADAR is a pluggable network monitoring platform that allows for reporting and searching at the application layer. Out of the box, RADAR lets you capture SMTP, AIM, YahooIM and YMail traffic. Find out more at: http://www.optaros.com/solutions_radar.html
CryptoHawk can calculate hashes (md2,md4,md5,sha-1,sha-256 and hmac). It can also perform cryptanalysis like frequency analysis for substutition cipher and exhaustive key search for rotation cipher, as well as searching internet databases for md5 hashes.
Libdejector is a database tool which defeats SQL injection attacks by performing context-free validation of queries. While written in C, SWIG wrappers exist for Python and other languages will be following soon.
Automatically verifies md5 and sha1 checksums using either a user entered sum or by searching in a file that can be held locally or remotely via ftp or http.
A python binding for the iptables tools.
The binding allows direction manipulation of the iptables through an object oriented and transaction based manner.
The binding removes the need to call iptable on the command line in python applications.
antiparser is an API/framework for generating random, malformed data for use in fuzzing and fault injection of network protocols and file formats. antiparser is written in Python and can be imported by scripts that implement additional fuzzing logic.