With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Gemini 3 and 200+ AI Models on One Platform
Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
Microlog is a small, yet powerful logging library for mobile devices based on the Log4j API. Supports Java ME (J2ME) and Android. Logs to device, to PC or to servers online. Used in all phases from development on emulator/device to outdoor field-testing.
Laika analyzes and reports on the interoperability capabilities of EHR systems. This includes the testing for certification of EHR software products and networks.
A opensource program to collect statistics and accounting information from MQ and store it into a database, which will be displayed to the end user in a visually attractive to manner to better analyze the performance of their environment.
A simple to set up web scraper written in Java. It uses modified regEx to quickly write complex patterns to parse data out of a website. It contains a GUI tool for testing your configuration scripts and is fully automated through the command line
Corazones Web Toolbox es una compilación de herramientas para realizar auditorías de seguridad informática. Entre sus herramientas incluye: | MAC spoofing | Admin panel Finder | Port scanner | MD5 multi search | Metasploit web launcher | etc...
A log player for "The Fourth Coming" ("T4C", http://www.the4thcoming.com).
Given a log-file, this tool will replay a T4C game you've played before.
It will have built-in functionnalities like : merging log files
together, searching and cleaning
a java based monitoring tool,logs all the user actions and errors with runtime data, displays execution performance and executed method lines. It doesnt modifiy class source files and no need for coding, just put it in your class path and see the mir
My work as a system administrator and developer includes debugging software. I scan and filter logfiles many times a day. This tool can help you to color and filter your logfiles. So you can concentrate on the interesting things to do!
The pycurry project is targeted for handling concurrency issues within the Python programming language. It also contains a (almost) fully functional 'Design by Contract' implementation.
Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
This authentication plug-in enables LDAP single sign-on's from web portal SSL forms and uses a modified standalone version of the core LDAP Authentication Plug-in. Currently supports MS-ADLS (AD), and OpenLDAP (RFC2307 compliant) Server back ends.
This project aims to create a set of simple OO Perl adapters to various version control, build control, testing and software distribution tools. These adapters are used to create a fully automated and compliant software configuration management system.
eXplode is a storage system checker. It contains a generic model checker for real code instead of abstract models. Using this model checker, eXplode can systematically check a storage system against many possible crashes to find crash-recovery errors.
ScaleUp is a monitoring tool, which produces report based on configured text files and keywords (such as exceptions).
It is very useful to monitor log in production and testing environments.
A very simple to use java firewall testing tool. Ever wanted to verify that a TCP or UDP network path is actually open? This tool has both server and client modes so you can test network paths between any two computers that have the Jave JRE installed.
Pinger is a simple monitoring service that performs basic testing of servers and websites, alerts you when there are problems and provides a web interface to statistical data.
Shadowtail is a Java/Spring framework for gathering numerical data (statistics) about a Java application. It is particularly useful as a source of data to feed Orca, the free tool for plotting textual data onto a directory on a Web server.
The Java Email Server (JES) plug-in is an embedded instance launcher of JES (email server) under Eclipse; it's intended to help developers viewing the layout of mails sent by their application to the clients (subscription mails, etc...) in local.
A Perl script that interfaces with the Devantech USB to I2C interface adapter. This script allows a user to read and write as a master to the i2c bus as well as set or get the value of the io pins.
LabMinder is an encapsulation of the VMware Lab Manager SOAP API within Ant tasks. The intended usage of this project is to enable Lab Manager automation through Ant scripts.
This is a small script for changing large numbers of filenames at once. Change any part of the filename or extension. Rename the files or copy them to the new name and retain the original. There's a switch for testing the results before committing.
Device Debugger is a Communication Terminal designed to communicate with electronic devices to support the process of development, testing, and reverse-engineering of embedded designs.
SetIP is a batch script utility for Windows 2000+ to change and set your IP. Simply rename your primary interface to "LAN" and type in: setip 192.168.1.42 255.255.255.0 192.168.1.1. Useful for demos and testing machines.
Inguma is a free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembl