With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Crowdtesting That Delivers | Testeum
Unfixed bugs delaying your launch? Test with real users globally – check it out for free, results in days.
Testeum connects your software, app, or website to a worldwide network of testers, delivering detailed feedback in under 48 hours. Ensure functionality and refine UX on real devices, all at a fraction of traditional costs. Trusted by startups and enterprises alike, our platform streamlines quality assurance with actionable insights. Click to perfect your product now.
Military Survelliance open source GPS with Filters(like night vision,Sharpening location,Contrast) with optimal route finding algorithm embedded in the application developed in java.
Real-Time Proactive Secret Sharing Library for RTAI is an implementation of the Shamir's secret sharing scheme and Herzberg's proactive secret sharing algorithm. The library uses a port of GNU GMP in order to make multiple precision arithmetic operatio
MacMakk is a tournament management program for go, the asian boardgame. It uses a new ranking algorithm, called McMakko. It is intended to be portable, with Linux and Windows being the main targets.
The implementations of finding the k shortest paths (KSP) algorithm. A C/C++ library including some classical graph relative algorithm implementations.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
In imitative learning, an agent will attempt to match what is observed to their memory. By visualizing the incorrectly matches "scenes", this project will allow algorithm developers to gain a better understanding of what causes their algorithms to fail.
Garbage collection for C++. Small portable library that can even be multithreaded (with some restrictions). It uses the mark & sweep algorithm. No dependencies. Provides garbage-collected array class; provides wrapper class for external classes.
project is based on another open source product. extending original functionality of detecting harvester attacks, we focus on categorizing email contents by using an bayesian algorithm. this is improved by visualisation and analytics concerning keywords.
This project provides a JAVA library and a graphical user interface which implement the "FastICA" algorithm based on the paper "Fast and Robust Fixed-Point Algorithms for Independent Component Analysis (ICA)" by Aapo Hyvärinen.
Secure remote access solution to your private network, in the cloud or on-prem.
Deliver secure remote access with OpenVPN.
OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
Magic Cube Cryptography is a new algorithm of cryptography and at future a program of data security in linux. The ideia is to create a safe and fast cryptography algorithm in C and x86-assembly.
This project aims to provide developers a convenient library about graph theory algorithm and some basic data structures. It will be developed in Java via Eclipse IDE, supporting both win32 and linux systems, and published as jar files.
This distribution contains a novel fast CRC generation algorithm developed by Intel. This algorithm runs at under 3 cycles per byte (vs. 7) and thus triples the performance of existing CRC implementations. Slicing-by-8 uses an 8KB cache footprint.
Flash/PHP adaptation of the XTEA encryption algorithm. Allows encryption/decryption of sensitive data using 128-bit key. May be used for network data (HTTP) or offline for implementations like secure CD-ROM projects.
RC4.NET is a library that adds support for encrypting/decrypting using the symmetric RC4 algorithm in the .NET environment. The library is written in C# language, and performs equally well on both the Microsoft CLR and Mono platform.
PseudoKu is a SuDoKu puzzle game and is intended to allow the user create their own puzzle from scratch, generate new puzzles depending on skill level, and save to and load from files. The game solves puzzles using Donald Knuth's Dancing Links Algorithm.
Secure Addressbook is based on the JavaScript implementation of Wheeler & Needham's Block TEA (Tiny Encryption Algorithm) by Chris Veness. It allows maintaining secure records even the on shared hosting server, as data en/decrypted at browser only.
The OSCAR Backup System is a PERL powered graphical frontend for rsync over ssh backups in the Windows environment. The Rsync algorithm and SSH tunnel encryption makes this archival tool extremely secure and efficient.
MultiBoost is a C++ implementation of the multi-class AdaBoost algorithm. AdaBoost is a powerful meta-learning algorithm commonly used in machine learning. The code is well documented and easy to extend, especially for adding new weak learners.
whbEncrypter is a very simple variable encryption program to encrypt and decrypt a file based on a passkey provided based on the user. It uses a simple encryption algorithm that I wrote for a school project. The passkey can also be the contents of a file.
PasswordChain is a secure Web-based password database designed to securely encrypt and store passwords. Data is encrypted using the Blowfish algorithm and stored in a MySQL database.
This is a collection of vb class modules written in native Visual Basic. They provide the following functionality: Processing of very large integer numbers, hashing algorithms, prime number handling and an implementation of the RSA algorithm.