Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.
Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
Sign Up Free
Go From AI Idea to AI App Fast
One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
Java project.
A java application that creates jars with encrypted content inside. With a selfextract and decrypt built in.
GUI aswell as console functionallity.
Options to include a key salt inside of the jar to hinder bruteforce attempts.
an implementation of the attack on the RC4 cipher as described in: "Efficient Reconstruction of RC4 Keys from Internal States" by Eli Biham and Yaniv Carmeli. plus optimizations of the attack
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material. First and foremost for memory dump analysis and forensics usage. Able to identify AES, Serpent, Twofish and RSA keys as of version 0.0.3.
BeeCrypt is an ongoing project to provide a strong and fast cryptography toolkit. Includes entropy sources, random generators, block ciphers, hash functions, message authentication codes, multiprecision integer routines, and public key primitives.
This tool encrypts text using polyalphabetic codetables, like the encryption systems in the middle ages. It can be used for simple text encryption with a small password or as a One-Time-Pad with a random codetable for 100% secure text encryption.
Java based Portable hashing application capable of multiple individual file signatures or proprietary group signatures (1 signature for a folder and all its contents). GUI and command line in the same executable. -sha1 -sha256 -sha51 -md5 -crc32
Security for usb flash drives. Uses basic encryption to make sure your data is safe, on all platforms. This application is written in C++, GUI is still to be considered. PRE-ALPHA STAGE, DO NOT USE ON IMPORTANT DATA!
Migale eraser is a software permitting to erase safely any file or folder from your hard drive so that no recovery will be possible, even when using forensic tools.
KpGen is an modern Password Generator. It has some interesting features, like a random generator based on mouse move with some strong options. It can also work as a hash calculator, calculating hashes of passwords and phrases.
C++ Source Code that grabs the Windows Serial from the registry. Works on Windows XP, Vista and 7 BETA.
IMPORTANT NOTE: This project is for educational purposes only! The author is not liable for the damage this program might cause.
Recolition is a simple file encryption program which uses AES as it's algorithm. It will encrypt exisiting files to the .encrypt file extension and then decrypt them back to thier original state.
Botan is a C++ crypto library Note: all versions of botan served on sf are OBSOLETE AND NOT SUPPORTED IN ANY WAY. Go to http://botan.randombit.net for the latest stable/supported release.
otp.el is a one-time-password implementation in emacs lisp, suitable for generating one time passwords with the MD5 algorithm. It's designed to be plugged in to tramp.
Yet an other password protector. This is pure text terminal based, so all you need is a shell account, with a little file space and gpg. I use putty (ssh client) from my cell phone when I'm not in front of a PC.