Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.
Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
Explore 10,000+ tools
Free and Open Source HR Software
OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.
Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
Run applications fast and securely in a fully managed environment
Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.
Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
The OpenToken project (temporary name) aims at developing an *open* hardware token generating One Time Passwords, as well as identity management solution and authentication software.
We're working on developing a standard encryption API for the Python language,
and building a set of standard cryptography modules. The CVS tree is open
to anyone who needs it for a Python/crypto related package.
An implementation of a system for anonymizing the configuration files for routers.
Currently supports Cisco devices.
A paper describing the method implemented by this code is available.
A firewall knocking mechanism that is loosely based on tumbler (tumbler.sourceforge.net) instead it is written in python. A focus of this implementation will be on multiple client implementations (OSX Widget, XP taskbar, etc.)
Venn isolates and protects work from any personal use on the same computer, whether BYO or company issued.
Venn is a secure workspace for remote work that isolates and protects work from any personal use on the same computer. Work lives in a secure local enclave that is company controlled, where all data is encrypted and access is managed. Within the enclave – visually indicated by the Blue Border around these applications – business activity is walled off from anything that happens on the personal side. As a result, work and personal uses can now safely coexist on the same computer.
Easy Encryptor is a cross-platform encryption program designed to be of high secure standard, and easy to use even for users with no knowledge of cryptography algorithms.
The Fenrir Morph Signature project aims to provide existing signatures standards with a morph capability: "Sign once, distribute many". This capability allows to use the same signature for authenticating modified, but authorized, versions of a document
Speakeazy is a product already based on TrueCrypt 7.0a specifically for USB flash drives. The goal of this opensource project is to enhance the encryption user interface and provide enterprise level tools similar to those of IronKey.
gPassword Manager, a password manager written in GTK. Lets you store all of your passwords in an encrypted file so you only need to remember 1 master password.
Final year project with dissertation. This will host my project for my final year dissertation. All of the features of SF will be used to the best of my ability. The tools provided by SF will assist greatly!
cryptshell is a shell used for analysable code (eg anything before wwII). It automates letter substitution, transposition, and has modules useful for breaking various weak ciphers (enigma, substitution, vinigre). It has no real practical value.
Cross-platform distributed password cracking tool, used to carry out brute-force attacks on common encryption protocols. Client/server based with administrative web interface.
Portable, optimised implementation of Bruce Schneier's 64-bit symmetric block cipher, Blowfish. Includes support for ECB, CBC, CFB, OFB and CTR block cipher modes, weak key detection and parallelisation using OpenMP.
Usb-Defensor is a cross-platform USB-Disk encrypt solution. It can be used to encrypt the whole USB-Disk. There is no different between common USB-Disk and encrypted(Usb-Defensor) USB-Disk in opterating.
Huskarl is an alternative authentication and key exchange schema for Bluetooth devices.Huskarl produces secure shared link keys between two devices using public key cryptography.
The program uses a number of processes to brute-force crack MD5 hashes.
MD5 brute-force cracking involves hashing all possible strings and each
time compare the obtained hash to the one we are trying to crack