With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Context for your AI agents
Crawl websites, sync to vector databases, and power RAG applications. Pre-built integrations for LLM pipelines and AI assistants.
Build data pipelines that feed your AI models and agents without managing infrastructure. Crawl any website, transform content, and push directly to your preferred vector store. Use 10,000+ tools for RAG applications, AI assistants, and real-time knowledge bases. Monitor site changes, trigger workflows on new data, and keep your AIs fed with fresh, structured information. Cloud-native, API-first, and free to start until you need to scale.
This project's single goal is to maintain a patch that allows chrooting of users in OpenSSH.
This patch will cause sshd to chroot when it encounters the magic token '/./' in a users home directory. The directory portion before the token is the direc
This java graphical tool compares 2 binary files, lists their differences and can generate an executable patch file. This gui patch can be applied on a file to be updated and can be canceled.
Patch to Linux kernel, which makes the virtual memory system use working set page replacement algorithm. It will also allow restriction of how much RAM a process can use and also a guarantee of a minumum of RAM that will never get swapped out.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
This program will allow users to avoid redownloading whole
binary files. Instead if they already have an older file,
they can just download a patch, created with BinaryPatch and use
it, with the old file, to create a new file.
The project discusses an architecture, prototype implementation and test tools for wireless scheduling using currently available hardware (e.g. 802.11 WLAN). It is based on a patch/new scheduler for the Linux 2.4.X kernels and extensions for the tc tools.
An extension of the current diff & patch programs to support the analysis of differences between binary files. Will include module support to specially handle user-defined types using user-created modules
This project is to develop a real time scheduler. We currently have a scheduler patch for the linux kernel that separates the ready real time tasks into MAX_PRI lists. This allows very fast insertion and basically flat dispatch times for real time tasks.
ConfigFS is a linux kernel patch that tries to make more information available about drivers and the devices that they manage. In a second step it should also be used to allow the configuration of drivers.
This is an add on for the Linux Kernel Patch named Medusa DS9 developed by Marek Zelem, Milan Pikula, and Martin Ockajak. This program will activate and deactivate medusa protections securely. Medusa is at http://medusa.fornax.sk/
The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off online and you can hide
Utility that creates/applies an archive or standalone patch (differences between two folders) with graphical interface or using command-line. Patches are intended to reduce bandwidth cost. PatchManager uses existing diff/patch utilities.
Air Raid Siren is multi-platform software designed to keep users safe on wireless networks when they log onto the Internet. This easy to use software protects against common attacks, like man-in-the-middle and packet sniffing.
Unsploitable is an emergency patcher, providing critical security patches and updates for commonly exploited vulnerabilities in common operating systems, services, and applications.
Unsploitable specifically targets exploits provided by penetration testing frameworks such as Metasploit.
Unsploitable is tool for the Metasploit Framework. Unsploitable should work with any MSF product (including: OpenSource, Express, or Pro).
...I invite you to take it apart, break it, add to it, and anything else you might dream up.
As you may have noticed, this is not the best, or most professional code out there. Feel more than free to email me, send in a patch, or fork it and show me how it's done. I'll just be glad to learn more, and get more features into Cash.