With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Deliver trusted data with dbt
dbt Labs empowers data teams to build reliable, governed data pipelines—accelerating analytics and AI initiatives with speed and confidence.
Data teams use dbt to codify business logic and make it accessible to the entire organization—for use in reporting, ML modeling, and operational workflows.
Project moved to Github: https://github.com/WixEdit/WixEdit
WixEdit is an editor for XML sourcecode of the Windows Installer XML (WiX) toolset. WixEdit lets you create MSI and MSM setup packages with the WiX Toolset. It provides a visual representation of the dialogs and an easy way to edit the WiX source files. (Project moved to Github: https://github.com/WixEdit/WixEdit)
A full featured hooking library for Windows 2000 and later. Supports 32- and 64-Bit processors, hooking through different terminal sessions and system services, injection of NET-Code and has a very fast IPC. A pure NET-Wrapper is also included.
Add auto update ability to an exsiting software. Just use serveral lines of code, your software will has the live update function. And you can view the clients update status, create update package on the server side through a GUI program. Support C#/VC/V
AI-Powered Security and IT Operations Without Compromise.
Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can: