With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Deliver secure remote access with OpenVPN.
Trusted by nearly 20,000 customers worldwide, and all major cloud providers.
OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
Tool for encrypting files using blowfish, aes, des or cast5,
File hashing with md5, sha and ripemd160,
compresssion with gzip, and a nice userinterface.
Created using C++ with Qt framework, depends on QCA third-part Qt Library and OpenSSL.
This is mainly just an interface tweak. Added function of mac address changer.
If you have problems getting the mac changer to work, try using a mac address that starts with something other than "00" in the first octet.
If you are intersted in learning about network security please check out my Juniper Networks training course at: http://academy.gns3.com/courses/juniper-jncia-intro-to-junos
Simple tool for file encryption and folder content encryption with AES 256. Files can also be hashed with a SHA1 signature. A command line version is available as well as a GUI version. One other useful feature is to encrypt messages for emails.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Derived from TrueCrypt 6.3 release, I added some command line options to "TrueCrypt Format.exe" to allow TrueCrypt volumes to be created without using the graphical userinterface
This is a simple encryption tool to work with home-grown encryption algorithms.
It can run as either a GUI, a command-line application, or a network proxy.
Kryptographie is a student project to implement historic encryption methods. It has a linux style command line interface. This project will also include the notes for my talk I'll hold on cryptography in school. (in German).
A pure python module which implements the DES and Triple-DES encryption algorithms. Triple DES is either DES-EDE3 with a 24 byte key, or DES-EDE2 with a 16 byte key.
DCrypt is an encryption and decryption tool that combines in a smart way multiple algorithms. The combination of multiple strong algorithms makes it much more difficult for hackers to get the plain content of the encrypted file without the password.
No-Nonsense Code-to-Cloud Security for Devs | Aikido
Connect your GitHub, GitLab, Bitbucket, or Azure DevOps account to start scanning your repos for free.
Aikido provides a unified security platform for developers, combining 12 powerful scans like SAST, DAST, and CSPM. AI-driven AutoFix and AutoTriage streamline vulnerability management, while runtime protection blocks attacks.
Mailcrypt is an Emacs Lisp package which provides a simple interface to public key cryptography with PGP [and now GnuPG!].
Mailcrypt makes strong cryptography a fully integrated part of your
normal mail and news handling environment
Kojoney is an easy of use, secure, robust and powerfull Honeypot for the SSH Service written in Python. With the kojoney daemon are distributeds other tools such as kip2country (IP to Country) and kojreport, a tool to generate reports from the log fi
This is the extended euclidean algorithm implemented in haskell.
It will put every single step of the algorithm in a file and show the actual result and everything in between.
SMADRET Means Always Do Really Encrypt Talk (or Find A Better Acronym). It is a SOCKS 4-proxy that listens on localhost and acts as a middleman between your chat client and the outside world, intercepting messages and performing PGP-encryption using GnuP
Crypto is a simple, easy to use Windows application for encrypting text files using RSA encryption. Crypto has an elegant userinterface and a powerful encryption backend.
The aim of this small program is to parse your address book (Evolution address book or VCard file for the moment) and check if some of your contacts have uploaded a PGP public key on a key server.
Originally made to crack /etc/passwd files from *nix utilizing the GPU. Uses GLSL and OpenGL. Acts as a parallel to John the Ripper, but for the GPU. Supports both ATI and nVidia, anywhere OpenGL can run.
A GUI (Graphic UserInterface) for the OpenSSL encrypting/decrypting mode.
It allows to protect your files without use the console.
GOpenSSL is written with the Mono C# language and the graphic uses the Mono GTK libs.
Python wrapper around a small subset of the OpenSSL library. Includes: X509 Certificates, SSL Context objects, SSL Connection objects using Python sockets as transport layer. The Connection object wraps all the socket methods and can therefore be use
Retyping Dante is a media art-piece on cultural products produced through, and social developments surrounding web 2.0. The project consist of software which enables you to securely join the devoted community committed to retyping 'La Divina Commedia'.
Shasummer is a SHA hashsum utility in Java. It can calculate SHA1, SHA256 and SHA512 hashes of a file or of a directory (and its subdirectories) and verify the hashes later. Shasummer has a graphical and a command-line interface.
VDE2 OpenMoko Tunnel is a Python/GTK visual interface created for OpenMoko Freerunner. It is intended to build virtual ethernet tunnels to remote VDE switches.
This program is released under the GPL v2 as part of the Virtualsquare project.