No hidden charges. No surprise bills. Cancel anytime.
Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
Start Free
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
INTIX-JSIGNER is a java web application for signing documents (XML and/or PDF) of unattended way and in the server side. It has as main modules the following: Authentication, XML and PDF Signing and Keys and Certificates Management.
Imagine being able to send an encrypted message as a single file to someone working on any Operating System, without them having to install any software to decrypt it. Just send them an Inkjar. Or you can store your own passwords on a usb key anywhere.
The Moonbounce API is a set of high level objects that encapsulate pieces of the Bouncycastle lightweight crypto API. Moonbounce significantly simplifies RSA key generation, signing, encryption/decryption and verification of both byte arrays and files.
Private-key, symmetrical (same password to encrypt and decode) file encryption with 8-bit to 2147483647-bit (2^3 to 2^31) encryption using my own algorithm and my own extension of MD5 (http://blog.robtoth.net/2009/06/tencryption-computer-programming.html
Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.
Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
Compute shared RSA keys for two parties using Gilboa's protocol. Other protocols may be added. Contains JAVA source for Benaloh, Naccache-Stern and Goldwasser-Michali crypto-algorithms. Oblivious transfers and BiPrimaliy tests also implemented.
Tristero is a framework for creating distributed peer-to-peer file sharing applications. It uses standard technologies for each component, reducing the work of implementing a particular network architecture to the novel aspects of that system and eliminat
USSI is the Universal SAFE Signing Interface. USSI provides web services for the application of SAFE digital signatures for PDF, text, xml, etc. Please see http://www.safe-biopharma.org for more information on SAFE.
Odyssi PKI aims to be a complete PKI suite written in Java, and designed from the ground up with security in mind. When completed, it will be fully standards compliant with PKIX, XKMS, OCSP, and other PKI standards.
Securing mails without involving user. Secures them as often as possible if it is possible. Shows security-state and process of mails and mail-partners.
An electronic votingsystem – Verifiable E-Voting (VEV) – with underlying protocol to help secure the election process from malicious practices at the same time as allowing voters and candidates to verify the correctness of their votes.
CivilAction lets you create a Choose Your Own Adventure type story that can be played on Java enabled cell phone. A desktop application lets you write story files. People run the story on their phone. Make a 'Tresure hunt' or 'Amaze Race' type game.
aamFetch is a utility for fetching your anonymous esub nym messages from the alt.anonymous.messages newsgroup (or other newsgroups). It allows multiple encrypt-subjects to scan, multiple "destination files" to save messages to and random chaff downloads.
Java Crypt Framework (JCryptFX) is a java-based education project for de-/encrypting streams. It has a implementation of DES and TripleDES in it but the framework user can write own cryptography algorithms and stream types for it - includes a console app
SwiftCrack is a wireless LAN (WLAN) tool which recovers encryption keys. SwiftCrack operates by proactively monitoring transmissions, injecting traffic with known key streams, computing the encryption key when enough packets have been gathered.
PRE4J (Partial RDF Encryption API for Jena) is a lightweight API for encrypting selected RDF graph elements. PRE4J provides cryptographic extensions to the Jena Semantic Web Framework.
Cryptographically secure your files with asymmetric and symmetric keys, as well as password based encryptions and file/text checksums. Use upto 6 different keys to encrypt/decrypt and get checksums using MD2, MD5, SHA1, CRC32, etc..
Quickly encrypt and decrypt your files with Petri. View encrypted text and image files containing your passwords or other sensitive information. Petri is written in Java and therefore runs on any operating system supporting the Java Runtime Environment.