With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
A push-button wireless hacking and Man-in-the-Middle attack toolkit
This project is designed to run on Embedded ARM platforms (specifically v6 and RaspberryPi but I'm working on more).
It provides users with automated wireless attack tools that air paired with man-in-the-middle tools to effectively and silently attack wireless clients.
Some of the tools included in the kit are:
Custom regex-based DNS Server
DHCP
Aircrack-ng suite
Browser Exploitation Framework (Preconfigured for metasploit)
Metasploit
Python-based Transparent Injection Proxy
Pushbutton configuration
"Limpet Mine" mode for attacking existing networks
You basically answer three questions in the start script, wait a bit, then log into the BEEF console to start attacking clients
Set of tools and libs for
managing structured data
in a very flexible way:
Imp./Exp. ASCII, XML, SQL,
PS, Tex/LaTex, RTF
GUI: X-Windows, MS-Windows
Interface to C++, DBs, Perl,
PHP, Java, TCP/IP
LISP-like interpreter
written in C++ using C-LIB