With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
The complete IT asset and license management platform
Gain full visibility and control over your IT assets, licenses, usage and spend in one place with Setyl.
The platform seamlessly integrates with 100+ IT systems, including MDM, RMM, IDP, SSO, HR, finance, helpdesk tools, and more.
The tool is useful when you want to encrypt and decrypt texts with password. Encrypted text can be posted online, and can only be decrypted back when correct password is entered.
iTelliHashCSV is a cryptographic “one-way” hashing application designed to securely protect sensitive or private information from disclosure. Proper use of this program allows organizations, businesses, and individuals (i.e., the data owners) to share complete/intact datasets containing sensitive data with others without actually disclosing the sensitive or private information. Additionally, if such datasets are subsequently modified or enhanced through value-added services or products...
ParaCrypt is software for encrypting and decrypting data with one-time-pads. For convenience the one-time-encryption-pads are created using pre-shared unencrypted files as sources of entropy.
[[We are in the progress of moving to github]]
Metalinks is a project to facilitate data distribution over mirrors and P2P networks. It does so by defining an XML format and the tools to handle these. The metalink files contain all the information needed to download and verify files.
Top Corporate LMS for Training | Best Learning Management Software
Deliver and Track Online Training and Stay Compliant - with Axis LMS!
Axis LMS enables you to deliver online and virtual learning and training through a scalable, easy-to-use LMS that is designed to enhance your training, automate your workflows, engage your learners and keep you compliant.
Visual Cryptography and Bit-Plane Complexity Segmentation in Python
Hide secret messages in your pictures!
Cyberbit lets you transmit a secret message to an intended person in a new manner.
The secret message is an 1-bit deep black & white image. The message can contain
written text, a drawing, a secret code etc. Using Visual Cryptography the
application splits the secret message into two "shadow images" called <<shares>>.
Any of the two shares will be embedded into a "normal" image file called by tradition
<<vessel>>. You can use a method of hand to...
This is where web developers can get tools that can make their life easier. Web technologies and languages used contain but are not limited to HTML, XHTML, CSS, JavaScript, PHP, and AJAX. All code is extremely slim, fast running, and is W3C compliant.
SLEncrypt is a python module for encryption with 11 ciphers at the moment, including ADFGVX, Autokey, Caesar/ROT13, Vigenere, XOR and a lot more. It contains functions allowing you to easily encrypt/decrypt files. The code is about 95% PEP 8 compilant.
An OLPC project in wxpython, aimed at allowing children to involve their families in certified decision making. All voting is to be based on digital signatures, to get legal binding.
Empower your field service with mobility and reliability
Resco’s mobile solution streamlines your field service operations with offline work, fast data sync, and powerful tools for frontline workers, all natively integrated into Dynamics 365 and Salesforce.
secureDATA is a simple and easy to use encrypted personal information manager. It can store both textual information (passwords, usernames, electronic receipts, etc), and (as of v1.6) files. It uses AES-128 encryption via the Python Cryptography Toolkit.
CryptoHawk can calculate hashes (md2,md4,md5,sha-1,sha-256 and hmac). It can also perform cryptanalysis like frequency analysis for substutition cipher and exhaustive key search for rotation cipher, as well as searching internet databases for md5 hashes.
cryptshell is a shell used for analysable code (eg anything before wwII). It automates letter substitution, transposition, and has modules useful for breaking various weak ciphers (enigma, substitution, vinigre). It has no real practical value.