With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Say goodbye to broken revenue funnels and poor customer experiences
Connect and coordinate your data, signals, tools, and people at every step of the customer journey.
LeanData is a Demand Management solution that supports all go-to-market strategies such as account-based sales development, geo-based territories, and more. LeanData features a visual, intuitive workflow native to Salesforce that enables users to view their entire lead flow in one interface. LeanData allows users to access the drag-and-drop feature to route their leads. LeanData also features an algorithms match that uses multiple fields in Salesforce.
Crypt encryption and decryption is based on ASCII Table Shift.
Crypt is the developed based on the ASCII Table shift and it can customized based on the user requirements, right from the shifting order and the level of encryption or decryption. It can be integrated to any of the programminglanguage with the custom build of the source code. It can secure from text file to binary code.
ISC lets you encrypt & decrypt text and files of any type up to 4GB
ISAAC is a cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It was developed by Bob Jenkins from 1993-1996 and placed in the Public Domain. ISAAC is fast - especially when optimised - and portable to most architectures in nearly all programming and scripting languages.
After more than 20 years of existence ISAAC has not been broken, and the little program you have here allows you to use it to encrypt and decrypt text of arbitrary length, files of any...
A formally verified implementation of cryptographic algorithms using the SPARK programminglanguage. For the complete library proofs of the absence of run-time errors are available. Some of its subprograms include proofs of partial correctness.
ShredBitz is a free and simple file shredder tool that can wipe selected files from any hard disk drive. ShredBitz is written in the java programminglanguage and uses a custom written algorithm for shredding.
ShredBitz is a very powerful tool.
All-in-one security tool helps you prevent ransomware and breaches.
SIEM + Detection and Response for IT Teams
Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.
Erinaceus is an esoteric two dimensional programminglanguage which uses bitmaps as sourcecode. It is turing complete and able to modify itself. It has been created with the goal to create a language that can be hidden in pictures easily.