With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
Cryptar is a cryptographic network backup program that is able to be very efficient with network resources by using an algorithm derived from the rsync algorithm. It uses SHA-1 hashes to verify (sign) its data and AES to encrypt it.
CryptoTW provides a win32 DLL that acts as an interface between the GPG.EXE from gnupg.org and a win32 program. Programming automated systems against the GPG.EXE is challenging. By solving the problem once, as a DLL, many developers can benefit.
p12_import is an utility created to import pkcs#12 file into a pkcs#11 device. It could be used in place of Netscape/Mozilla, if there are troubles using the crypto device with other pkcs11 compliant application.
Total Network Visibility for Network Engineers and IT Managers
Network monitoring and troubleshooting is hard. TotalView makes it easy.
This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
J2MESafe is an end-user Java application that stores sensitive information like passwords on mobile phones with strong encryption. Requires Java Micro Edition (J2ME) with MIDP-1.0, which is available on most current mobile phones.
This project provides an interface to Sun's JCE (Java Cryptographic Extensions) as a JSP taglib. It brings strong encryption algorithms such as AES and Blowfish to your JSP applications. It uses the bouncycastle.org cleanroom JCE 1.2.1 implementation as
Simple XOR Encryption is written in c++ and can encrypt files using insecure XOR encryption.
Could be used to form framework for implementing XOR encryption in other programs, such as encrypting save game files in games, etc.
Tested on Windows + Linux.
Never miss a sale. Square payment processing serves customers better with tools and integrations that make work more efficient.
Accept payments at your counter or on the go. It’s easy to get started. Try the Square POS app on your phone or pick from a range of hardworking hardware.
UnderMP3Cover is a mp3 steganography tool. It will allow you to write and read hidden messages within mp3 files without creating any audible differences to the mp3. The messages could be a text file, jpg or any other file depending on the mp3's size.
Ultramagnetic is a concurrent fork of GAIM that provides strong end-to-end encryption using libgcrypt and anonymous routing using the Six/Four protocol.
Haskell User-Submitted Libraries includes anything we can get our hands on and clean up for general use, as well as new libraries that would be useful to the general Haskell community. Submit your libs, or join the project to create needed libs!
The Leeter is an easy-to-use and convinient program to easily write hardly understandable text. While this is mainly not the intention of normal chatters it may be a nice joke to try out on friends. Provides 5 different options to scramble up your text.