With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
Advanced Onion Router is a portable client for the OR network and is intended to be an improved alternative for Tor+Vidalia+Privoxy bundle for Windows users. Some of the improvements include UNICODE paths, support for HTTP and HTTPS proxy protocols on the same Socks4/Socks5 port with HTTP header filtering that generates fake identity-dependent headers every time the identity is changed (proxy chains are also supported), support for NTLM proxies, a User Interface that makes Tor's options and...
Quantum Leaps (QPC) DPP example with LWIP on STM3220G eval board
This is a port of the Dining Philosopher Problem (DPP) using the Quantum Leaps (http://state-machine.com) hierarchical state machine framework with the Light Weight IP (LwIP) network stack (http://savannah.nongnu.org/projects/lwip) and an ethernet driver implemented on the STM3220G-eval board (http://www.st.com/internet/evalboard/product/250374.jsp) running on stm32f207 Arm Cortex M3 uProcessor.
The project is eclipse based and uses Code Sourcery cross compiler. See...
Software repository of the hack://src project. Includes security related software for crypto, vulnerability/patch notification & management, and ultra low level system access for stealth forensics & intrusion detection or malware removal.
Cnc's IP Data Volume Report:
Logs IP to IP contact, number of packets, bytes, time of contact, Ethernet too!
View via local web interface.
Very simple for those who want to view who your computer is contacting the most!
Total Network Visibility for Network Engineers and IT Managers
Network monitoring and troubleshooting is hard. TotalView makes it easy.
This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
This SF project provides all the necessary source code to create and update a non-representative democracy, i.e. an isocracy.
This is the software part of the melting-vote project.
Wireless DCC, Digital Command Control for model railroad over 802.15.4 the network nodes being the handhelds and the DCC decoders themself. Backward compatibility with DCC will be kept but new users wont need command stations and boosters.
Strength in numbers. Existing products we're involved in include port to Linux of Tony Forbes' MFAC for brute-force factorization of MM61 for relatively small factors, and further development and improvement of Tim Charron's ECMnet distributed computing f
The Felix can propagate accross a network without the knowledge of the users and randomly run a program, which can be incorparated. It's ideal for keeping programs running that advanced users would remove and can even optionally play Bach's famous two
Referral Factory is the #1 referral software used by SMEs and Marketers.
Referral Factory offers over 1000 pre-built referral program templates you can use as your own, or you can build your own referral program from scratch. You get unlimited referral campaigns on all plans, and brilliant support from their team of referral marketing experts.
The Hackers Lab is aimed to provide hackers, system audits, system and server and network administrators with applications to secure their own servers.