Firebase
Manage backend services for mobile and web applications. Create, read, update, and delete documents in Cloud Firestore and Realtime Database. Manage user accounts including creating, updating, deleting, and listing users with authentication support. Send push notifications and data messages to devices, topics, and device groups via Cloud Messaging (FCM). Upload, download, and delete files in Cloud Storage. Read and publish Remote Config templates to change app behavior remotely. Deploy and manage serverless Cloud Functions triggered by database events, authentication events, storage events, and HTTP requests. Stream real-time database changes via Server-Sent Events. Query databases with filters, ordering, and pagination. Perform batch writes and transactions in Firestore. Generate and verify custom tokens and ID tokens for user authentication.
Kubernetes
Manage and orchestrate containerized applications on Kubernetes clusters. Create, update, scale, and delete workloads including Pods, Deployments, StatefulSets, DaemonSets, Jobs, and CronJobs. Configure service discovery and load balancing through Services, Ingress, and Endpoints. Manage configuration and storage with ConfigMaps, Secrets, PersistentVolumes, and StorageClasses. Control access with Namespaces, RBAC roles and bindings, ServiceAccounts, and NetworkPolicies. Administer cluster infrastructure including Nodes, ResourceQuotas, LimitRanges, and PriorityClasses. Autoscale workloads with HorizontalPodAutoscaler and VerticalPodAutoscaler. Define and manage Custom Resource Definitions (CRDs) to extend cluster functionality. Watch resources in real time for create, modify, and delete events. Configure admission webhooks to validate or mutate resources before persistence.
Cloudflare
Manage internet infrastructure including DNS records, domains, and zone settings. Deploy and configure serverless Workers scripts, R2 object storage buckets, and Pages deployments. Configure security rules including WAF, firewall rules, rate limiting, DDoS protection, and IP access controls. Manage SSL/TLS certificates, load balancers, origin pools, and health monitors. Upload and deliver video content via Cloudflare Stream. Access traffic, DNS, and security analytics via GraphQL. Configure Zero Trust Access applications, Gateway policies, and Tunnel connections. Set up alerting and webhook notifications for security events, health checks, certificate status, and usage thresholds. Register and manage domains, account members, roles, and API tokens.
Auth 0
Manage users, roles, permissions, and identity provider connections for authentication and authorization. Create, read, update, and delete users across identity connections. Configure social, enterprise, and passwordless authentication methods. Assign roles and permissions using role-based access control (RBAC). Register and manage applications and API resource servers. Set up multi-factor authentication (MFA) including SMS, email, TOTP, and WebAuthn. Create organizations for multi-tenant B2B scenarios and invite members. Build custom serverless Actions for login, registration, and password change flows. Configure custom domains, email templates, branding, and attack protection. Import and export users in bulk. Retrieve authentication logs and audit events. Manage client grants and log streams for event delivery.
Okta
Manage identity and access management for organizations. Create, update, deactivate, and search users. Manage groups and group memberships. Assign users and groups to applications. Configure multi-factor authentication enrollment and verification. Create and manage OAuth 2.0 authorization servers, scopes, claims, and access policies. Set sign-on, password, and MFA enrollment policies. Query system logs for auditing and troubleshooting. Manage user sessions, devices, and inline hooks for customizing authentication flows. Supports webhooks for user authentication, lifecycle, group, application, policy, and security events.
Supabase
Manage PostgreSQL databases, authenticate users, store files, and run edge functions on Supabase. Perform CRUD operations on database tables via auto-generated REST and GraphQL APIs with row-level security. Create and manage user accounts with password, magic link, OTP, social login, and SSO authentication. Upload, download, list, and delete files organized in storage buckets. Deploy and invoke server-side TypeScript edge functions. Listen to realtime database changes, broadcast messages, and track user presence. Configure database webhooks for INSERT, UPDATE, and DELETE events. Programmatically manage Supabase organizations and projects, including creating/deleting projects, managing API keys, configuring auth settings, custom domains, network restrictions, and Edge Function secrets.
Vercel
Manage web application deployments, projects, and infrastructure on Vercel's cloud platform. Create and configure projects with build settings, framework presets, and Git repository connections. Deploy applications programmatically, promote deployments to production, and manage rolling releases. Register, transfer, and configure domains with DNS records and SSL certificates. Create and manage environment variables scoped to production, preview, or development environments. Manage team members, roles, and access groups for fine-grained RBAC. Configure Edge Config stores for ultra-low-latency key-value data at the edge. Set up log drains to forward logs to external services. Register deployment checks for custom validation before promotion. Create deploy hooks to trigger builds from external systems. Upload and manage files with Vercel Blob storage. Configure Web Application Firewall rules, rate limiting, and IP blocking. Schedule cron jobs and retrieve billing and usage information. Receive webhooks for deployment lifecycle, domain changes, project events, rolling releases, and marketplace billing activity.
Twilio
Send and receive SMS, MMS, WhatsApp, and RCS messages. Make, receive, and monitor phone calls with programmable call control. Verify user identities via OTP, TOTP, and silent network authentication. Look up phone number intelligence including carrier, line type, caller name, and SIM swap detection. Manage multi-channel conversations across chat, SMS, and WhatsApp. Search for and purchase phone numbers, configure voice and messaging endpoints, schedule messages for future delivery, record calls, and stream platform events to external destinations.
Datadog
Monitor infrastructure, applications, and services across cloud environments. Submit and query metrics, create and manage monitors and alerts, build dashboards, search and analyze logs, manage incidents, track SLOs, run synthetic tests, and configure integrations with cloud providers. Create on-call schedules, automate workflows, manage users and roles, handle security monitoring and detection rules, submit DORA metrics, and retrieve usage and cost data. Supports outbound webhooks for alert notifications.
1 Password
Manage passwords, secrets, and sensitive credentials stored in encrypted vaults. Retrieve secrets using reference URIs, create/read/update/delete vault items including API keys, passwords, SSH keys, and file attachments. Generate passwords with configurable recipes. Share items securely with expiration and recipient controls. Manage vaults, users, and groups with permissions. Monitor account activity through audit events, item usage events, and sign-in attempt events for SIEM integration.
Abstract
Validate, enrich, and look up data through a suite of utility APIs. Validate email addresses for deliverability, format, and risk (disposable, spam trap, role-based detection). Validate and identify phone numbers with carrier, line type, and location details. Geolocate IP addresses and detect VPNs, proxies, and TOR usage. Enrich company data from domains or emails. Retrieve live and historical currency exchange rates and perform conversions. Look up public holidays by country and date. Get current time and convert between timezones. Scrape web page content from URLs. Capture website screenshots. Compress and optimize images. Generate user avatars. Validate VAT numbers and retrieve VAT rates. Validate IBAN bank account numbers.
Abuseipdb
Check IP address reputation and abuse confidence scores. Report malicious IP addresses with categorized abuse types. Retrieve detailed abuse reports for IPs and subnets. Download blacklists of known malicious IPs for firewall import. Bulk-report abusive IPs via CSV upload. Clear your own submitted reports for an IP address.
Anonyflow
Anonymize and deanonymize sensitive data (PII) using encryption-based protection. Encrypt specific fields in data objects via single-value or batch anonymization endpoints. Decrypt previously protected data back to its original form. Share encrypted data securely with colleagues or third parties. Handle personal data deletion requests for "Right to be Forgotten" compliance. Redact PII from PDF documents using AI-powered detection. Supports GDPR, CCPA, and HIPAA compliance workflows.
Bigdatacloud
Look up geographic location and metadata for IP addresses (IPv4/IPv6), including country, city, coordinates, timezone, ISP, and ASN details. Assess IP address security risks by detecting VPNs, proxies, Tor exit nodes, hosting networks, and other hazards. Reverse geocode latitude/longitude coordinates into structured locality data such as country, region, city, and postcode. Validate and format international phone numbers, detecting line types like mobile, fixed-line, VoIP, and toll-free. Verify email addresses for format compliance and deliverability, identifying disposable or fake addresses. Retrieve detailed network infrastructure metadata including BGP prefixes, peering relationships, and Autonomous System information. Detect client device info, roaming status, and bot/proxy indicators without authentication.
Borneo
Discover, classify, and remediate sensitive data across cloud infrastructure, SaaS applications, and APIs. Scan structured and unstructured data sources to identify PII, PFI, PHI, API tokens, keys, and credentials using ML-based classifiers. Configure and schedule surface, audit, and forensic scans with customizable depth and resource selection. Manage data security posture with real-time visibility into data exposure and vulnerabilities. Perform data remediation through masking, encryption, and access changes. Create and manage data breach evaluation records. Generate Data Protection Impact Assessments (DPIAs) and export processing activities for GDPR, CCPA, DPDP, and HIPAA compliance. Export and manage inventory resources with filtering, sorting, and violation metrics. Manage organizational entities including employees, departments, headquarters, domains, and dashboard users. Create and manage legal documents and data recipients. Analyze code pull requests for sensitive data handling and test APIs for oversharing sensitive data.
Bouncer
Verify and validate email addresses for deliverability, toxicity, and domain health. Perform real-time single email verification or batch verify up to 500,000 emails asynchronously. Check if emails are deliverable, undeliverable, risky, or unknown, and detect disposable, role-based, or catch-all addresses. Run toxicity checks to identify breached, spam-trap, or complainer emails on a 1-5 scale. Verify domain MX records and catch-all behavior. Monitor account credit balance for usage tracking.
Codacy
Manage repositories, analyze code quality, and track security vulnerabilities across 49+ programming languages. Retrieve static analysis results including issues, complexity, duplication, and coverage metrics per commit, pull request, or file. Configure analysis tools, code patterns, and coding standards across organizations. Manage quality gates and gate policies to enforce code quality thresholds. Upload and retrieve code coverage data. Search security findings including SAST issues, secrets, dependency vulnerabilities, and IaC scanning results. Create DAST targets, trigger application security scans, and retrieve results. Search SBOM dependencies across repositories. Manage organization members, repository API tokens, and generate reporting exports.
Control D
Manage DNS filtering profiles, custom rules, and traffic redirection. Create and configure profiles with filters (ads, trackers, adult content, etc.), block or redirect 400+ specific services, and define custom domain-level rules including blocking, allowing, spoofing, and proxying. Manage devices/endpoints and assign profiles with scheduled swapping. Control IP-based access authorization, configure analytics logging, browse proxy locations for traffic redirection, and manage organizations and sub-organizations. Retrieve account, billing, and subscription information.
Conveyor
Manage security reviews and automate responses to security questionnaires and RFPs. Upload and organize Trust Center documents (e.g., SOC 2 reports), manage customer access authorizations, and approve or deny access requests. Ask AI-powered security questions and receive answers from your knowledge library. Submit questionnaires for automated AI answering. Retrieve analytics on Trust Center connections, interactions, and knowledge base questions. Create and manage folders, documents, and access groups within the Trust Center portal. Listen for webhook events when users request Trust Center access.
Digicert
Order, issue, renew, reissue, and revoke TLS/SSL certificates, code signing certificates, document signing certificates, and client certificates. Manage domains and perform domain control validation (DCV) using email, DNS CNAME, DNS TXT, or HTTP methods. Manage organizations and submit them for OV, EV, and code signing validation. Automate certificate enrollment and installation across devices using agent-based or agentless automation. Discover internal and public-facing certificates across your network. Manage private CA hierarchies and issue X.509 certificates via private PKI. Sign code and software artifacts securely through Software Trust Manager. Provision IoT devices, manage device groups, enroll device certificates, and handle firmware updates. Generate custom reports on certificate orders, domains, and organizations using GraphQL. Receive webhook notifications for certificate issuance, revocation, order rejection, and domain/organization validation events and expiry warnings.
Dnsfilter
Manage DNS-layer security, content filtering, and threat protection across organizations. Create and configure filtering policies with domain allow/block lists, content categories, and application-level controls. Manage networks (sites), IP addresses, subnets, and roaming client agents on endpoint devices. Organize users into collections with priority-based policy assignment. Look up domain categorizations and submit recategorization requests. Access DNS traffic analytics including total requests, threats, top domains, category breakdowns, and raw query logs. Customize block pages displayed to end users. Manage MAC address associations, scheduled policies for time-based filtering, and billing/invoices. Supports multi-tenant MSP hierarchies for managing multiple customer organizations from a single console.
Dock Labs Truvera
Create, issue, manage, and verify tamper-proof Verifiable Credentials built on W3C standards and blockchain. Manage Decentralized Identifiers (DIDs), create and enforce credential schemas, design certificate templates, and set up revocation registries. Verify credentials and presentations, create proof requests for wallet-based verification (including zero-knowledge proofs), and anchor credential hashes on the blockchain for timestamped proof of issuance. Send encrypted messages between DIDs, manage sub-accounts for enterprise data segregation, and receive webhook events for credential, DID, registry, schema, and proof lifecycle changes.
Whoisfreaks
Look up live and historical WHOIS data for domains, IPs, and ASNs. Perform DNS lookups across record types (A, AAAA, MX, NS, CNAME, TXT, etc.) and reverse DNS searches. Discover subdomains, check domain availability, and find registered domains by keyword. Retrieve SSL certificate details, IP geolocation data, and security threat intelligence (VPN, proxy, Tor, bot detection). Search domains by owner name, email, or company via reverse WHOIS. Monitor domain WHOIS changes and track brand-related domain registrations including typo-squatting detection. Access newly registered and expiring domain data feeds. Supports bulk lookups for domains, DNS, and IPs.
Doppler
Manage secrets and environment variables across projects, environments, and configurations. Store, retrieve, update, and delete secrets with support for version history, rollback, and secret references. Organize secrets into projects with environment-specific configs (development, staging, production). Issue and revoke dynamic secret leases for short-lived credentials. Configure automatic secret syncing to third-party services like AWS, GCP, and Vercel. Share secrets securely via expiring links. Manage workplace users, groups, service accounts, and role-based access controls. Set up webhooks to trigger actions when secrets change. Restrict config access via trusted IP whitelisting. Create change request workflows requiring approval before secret modifications. View activity and audit logs for compliance tracking.
Duo Security
Manage multi-factor authentication, users, devices, and access security. Create, read, update, and delete users, groups, phones, hardware tokens, and administrators. Perform two-factor authentication via Duo Push, phone call, SMS, hardware tokens, and WebAuthn/FIDO2. Manage Duo-protected applications and configure access policies by user group or application. Retrieve authentication logs, administrator action logs, and telephony logs. Read and update account settings, trigger directory syncs, and manage trusted endpoints. Supports MSP partner account management for creating and managing child Duo accounts.