With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Automated Security Tools (autosec) aims to provide
automatic tools which network administrators may use
to help check and test the security of their network.
A network analyzer designed be an Acceptable Use Policy Infraction Detector (AUPID). It allows Administrators to monitor a user's activies over the network. Supported by www.degreeme.com.
QuIDScor is a daemon software integrating Intrusion Detection Systems (IDS) and vulnerability assesment and management platforms.
Today QuIDScor correlates and verifies Snort alerts against QualysGuard vulnerability assessment data.
tcpamp is a simple GUI for tcpdump and tcpreplay written in Qt/C++. Features: save tcpdump expression in XML format, intuitive dump expression maker, friendly replay interface, multi-platform (Qt based).
Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.
Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
Gherkin is a web-enabled, multi-threaded, centralized security scan manager incorporating Nessus vulnerability scanning, dns and nmblookup host resolving, and nmap fingerprinting and scanning.
SIPES (Security Incident Pollicy Enforcement System) aims to provide an automated e-mail,XML and PKI based system for automated security policy enforcement based on statefull risk assesment and open exchange formats.
Tattoo will provide a set of command-line scripts for analyzing raw tcpdump files or ASCII hexadecimal representations of network traffic to identify format, function, and communication model.
Visual IP is a network protocol
analyzer that works in any operating system with a java VM. At the
moment it only allows you to examine data from the disk, and created
by tcpdump. You can interactively browse the capture data, viewing
summary and det
startx is the project name for an interface build in php which takes the output of some products like MRTG or awstats or ACID... and put them together in the same Web interface.
The purpose of SNX is to have a modular series of components that report back to a central repository and 'AI' for pattern recognition and anomoly detection. This is to help with IDS systems, and to move to the next generation of security.
SnortCon is a web-based utility that provides a real-time high-level overview of the threats that a network is currently facing. SnortCon is written in PHP and requires that Snort is logging to a MySQL database.
ACID is a PHP-based analysis engine to search and process a database of
security incidents generated by security-related software such as IDSes
and firewalls (e.g. Snort, ipchains).
Pace-IDS is an Intrusion Detection system designed to replace Tripwire, in that it is faster, and more effective of detecting trojan activity, and is easier to configure. All you have to do usually is simply change one variable to your email address.
SnortKonsole is a Java-Frontend for the Open Source Network Intrusion Detection System Snort. It supports all configuration-aspects of Snort. The configuration distribution and activating of sensors is done via scp/ssh.
A number of tools to enhance management/coding of NFR (http://www.nfr.net) IDA, and various other admin tools that can be used for both NFR and hand coding other appliance scripts.
Trace2ip is to hold one trace of all connections IP, memory the information into the file. The file to have like unique key ip_source and like associate data header IP. Alternative Key:Audit, Trace, Monitor, Dump, IP.
Remote Web Logger is a remote web transaction logging daemon. It operates by passive monitoring of web server traffic to translate web session data to transaction log entries that are written to standard log services such as syslog.
Nubric (Near-real-time user behaviour and resource interaction control) is a framework for security and authentication-related modules written in Java. Its origin focus lies on network monitoring, dynamic, transparent firewalling and traffic control.
Open source Penetration Testing Suite for IT professionals and penetration testers. SecTest automates the boring repetitive procedures of penetration testing.
This project started because I wanted to learn how to use the libpcap library with Objective C. Would like to include something like this: http://drdobbs.com/showArticle.jhtml?articleID=199102239&queryText=networking+computers