With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Nagios plugin running Bastille Unix in assessment mode, comparing consequtive runs line by line. Lower scores are critical, other changes generate warnings. An option is available to publish the report. Get Bastille Unix from http://www.bastille-unix.org
ShowSSL is a tool for to test the strength of SSL servers by analyzing the ciphers supported. The report generated includes SSL protocol version and cypher supported, if sessionID is used and its timeout value, certificate chain e CA trusted by the serve
...It has a small memory footprint, uses up-to-date cryptographic algorithms, and has features that make sense (like including the MD5 checksum of newly generated databases in the report
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
A framework for information security management. It has the centralized server for managing the IDS sensors, log consolidation and correlation, report generation etc. Also it has customized IDS sensor based on snort.
NiktoRAT parses a plaintext Nikto report and outputs a series of navigable web pages for each finding with vulnerability information, HTTP request and response headers, and HTML dumps of the vulnerability URLs.
Ida, is a Apache log security analyzer written in PHP. It will scan Apache logs and report about security incidents like SQL injections, XSS attacks, path traveling and so on.
IDSRG stands for "Intrusion Detection System Report Generator". It generates graphic reports from a snort database of alerts. The main goal of the project is to provide instant reports of your ids events. It has 7 predefined reports and the plans are t
Foresight is a security architecture designed to detect, alert, respond, and report on events happening throughout the enterprise. The interface aggregates and correlates security information (like a SIM or SEM) from multiple devices within the network.
Security Advisor is a program designed to analyze and report security issues beyond application vulnerabilities. The program will analyze system and network configurations to recommend ways for improving security.
DominoDig is a perl program designed to help facilitate auditing Lotus Domino web servers. Produces an HTML report that provides a list of all the unique .nsf databases it was able to access, as well as IP addresses and email addresses.
Knowngoods Report Generator is a set of shell scripts and a Makefile which generate plain text reports about modified files on your system. It does this by the use of checksum reference files which can be found at http://www.knowngoods.org/download.html f
The purpose of SNX is to have a modular series of components that report back to a central repository and 'AI' for pattern recognition and anomoly detection. This is to help with IDS systems, and to move to the next generation of security.
This very simple perl script parses you iptables log files and produces a report in text format with a summary based on the prefix of the log ( --log-prefix option of iptables ).
Prefix description is allowed.