No hidden charges. No surprise bills. Cancel anytime.
Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
Start Free
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
creates an extra socket for syslog (e.g. in a chroot jail)
Developed for systems that have an older version of syslogd which does not support multiple sockets (e.g. via the '-a' flag). Performs extensive message validation according to RFC 3164
Apache security module. Makes Apache configurable to work as diffrent user, group and diffrent chroot() environment for each VirtualServer and for ~user request. Designed mostly for ISP to make Apache secure.
chroot_safe, a tool to chroot any application in a sane manner without requring binaries,
shared libraries etc within the chroot or any support from the application. Works with any
dynamically linked application.
Eselstall Secure Environment to Launch Software you don't Trust At aLL:
Combined chroot/setuid tool to easily launch background processes (servers) in a confined environment. Eliminates the need for su in the changeroot directory.
Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
The sandbox system call API is a simple yet powerful mechanism for
confining untrusted code. It is similar to chroot() and BSD jails, but has
much greater flexibility and expressive power. The code is mostly complete
but not yet fully functional.
chruid is a small but flexible replacement for a chroot + su kombo. i wrote it because i was in the need to chroot processes and having them run under a non-privileged uid/gid without having to install su (which would include pam, nss, ... overhead on som
This project's single goal is to maintain a patch that allows chrooting of users in OpenSSH.
This patch will cause sshd to chroot when it encounters the magic token '/./' in a users home directory. The directory portion before the token is the direc