With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
An ARP watch daemon for windows (portable to linux but it is already there...) which is able to be run as a service and logs to eventlog so one can collect the logs and react to events.
The High Interaction Honeypot Analysis Toolkit (HIHAT) allows to transform arbitrary PHP applications into a web-based Honeypot. A semi-automatic user interface supports the analysis process, scans for attacks etc.
An nmap output parser for scan data using PERL. Nmap Parser is a PERL module that makes developing security and audit tools using nmap and PERL easier. nmap is one of the best security scanners.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
BASE+ (Basic Analysis and Security Engine) is based on ACID project. This application provides a web front-end to query and analyze the alerts coming from various IDS systems (e.g. Snort).
YASeMI (Yet Another Security Monitoring Interface) consists of a Web interface that can be of aid to SysAdmins and Security Admins, in detecting possible anomaly or intrusion behaviour in their network, based on Netflow data their routers emit.
RADAR is a pluggable network monitoring platform that allows for reporting and searching at the application layer. Out of the box, RADAR lets you capture SMTP, AIM, YahooIM and YMail traffic. Find out more at: http://www.optaros.com/solutions_radar.html
NetworkTools has 2 components: A protocol analyzer which plays a TCP client or server or pipeline, which sits between a client and server and shows how they communicate. A port scanner can scan a range of IP addresses and ports. See screenshots.
DNA is an open, flexible and extensible deep network analyzer software server and software architecture for gathering and analyzing network packets, network sessions and applications protocols, passively off enterprise class networks.
Ethereal Network Traffic Session Reconstruction for Internet Protocols. Management Console to reconstruct emails, web sessions, VOIP sessions, FTP, and all known supported Internet Protocols for Network Forensics. ***UPDATE*** Project release scheduled.
WebScarab for Eclipse is an extensible framework for analyzing applications that communicate using the HTTP protocol. It includes an HTTP monitor and an HTTP proxy for recording all messages between your machine and remote servers.
Ida, is a Apache log security analyzer written in PHP. It will scan Apache logs and report about security incidents like SQL injections, XSS attacks, path traveling and so on.
raddump interprets captured RADIUS packets to print a timestamp, packet length, RADIUS packet type, source and destination hosts and ports, and included attribute names and values for each packet.
netleak is a collection of small perlscripts that detects connectivity between network segments. It is mostly useful to detect "leaks" in large organizations that have private network segments physically separated from the Internet.
Netpoison is a tool, written in perl, which can poison a whole network. It can trick the router into redirecting the traffic to a specific MAC address.
jpcap is a set of Java classes which provide an interface and system for network packet capture. A protocol library and tool for visualizing network traffic is included.
jpcap utilizes libpcap, a widely deployed system library for packet capture.
Access Point Utilites for Unix - it's a set of utilites to configure and monitor Wireless Access Points under Unix using SNMP protocol. Utilites knownly compiles and run under Linux, FreeBSD, NetBSD, OpenBSD, MacOS-X, AIX, QNX.
Network Asset Management Archive: NAMA is a set to tools to track network assets. It uses SNMP to monitor assets added to your network and stores the information in an odbc compliant database. Assets can then be tracked through a PHP frontend.
Enables a user to view & alter
all aspects of comunications with a web site via a proxy. Primarily used for security
based penetration testing of web sites, it can also be used for
debugging during development. Seen as part of a hacker toolkit.
- language perl / library Graph, XML::LibXML
- OS platforms, all platform that support perl and lsof tool
- This software aims to realize an HIDS, based on programs behaviour modelling.
Admin Secure is an add-on script for PHP-Nuke web portal system. This add-on gives you additional protection schemes from common hacking activities. Admin Secure is an alternate protection for your PHP-Nuke based website.