With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
Help to convert text into secret codes , so that you can mail,chat and transfer text securely to prevent hacking.
How to use :
Step one - Open Endico 14
Step two - Decide what to do (Text Encode/Text Decode)
Step three - If You Selected Text Encode -> Then Type/Copy/Open .txt file to convert.
Step four - Copy the converted text into clipboard to chat,mail,print process etc.
Step five - If you want to Decode the code the again follow step two.
Step six - ...
Encryption/Decryption tool for words/hash/digits/encoded text
Word Cipher - KRIEG Technologies
Developed by: Northumber, KRIEG Technologies
This application is developed for encode/decode words and translate them into commons encryption languages but also ancient ciphering language.You can encrypt/decrypt words or text or digits into:
----- Text Ciphering -----
Albam Latin (Temurah)
Atbash Latin (Temurah)
Avgad Latin (Temurah)
Caesar Cipher
Flipped Text
----- Text Rotation -----
ROT5 (Digits)
ROT13 (Text)
ROT18 (Text &...
Decrypts and encrypts substitution, transposition and vigenere ciphers
Change log 1.01:
1)Error fixed on clicking solve and arrow buttons in the vigenere decoder
2)Error fixed when number of columns exceeds text length in substiution cipher
3)Can now handle variable block length when changing columns
4)Multiple identicle conversion values onn the frequency analysis page now not allowed
This project is near its final stages but there may still be improvements to be made. If you could write some form of review or send me an email with advice I would...
ActiveLock is an open-source copy protection, software licensing framework for all development enviroments supporting COM+ architecture. Core DLL available in VB2008 and VB6. Samples in C++, C#, Excel/Access VBA and keygens in PHP, ASP.NET available.
Enterprises and companies seeking a solution to manage all their procurement operations and processes
eBuyerAssist by Eyvo is a cloud-based procurement solution designed for businesses of all sizes and industries. Fully modular and scalable, it streamlines the entire procurement lifecycle—from requisition to fulfillment. The platform includes powerful tools for strategic sourcing, supplier management, warehouse operations, and contract oversight. Additional modules cover purchase orders, approval workflows, inventory and asset management, customer orders, budget control, cost accounting, invoice matching, vendor credit checks, and risk analysis. eBuyerAssist centralizes all procurement functions into a single, easy-to-use system—improving visibility, control, and efficiency across your organization. Whether you're aiming to reduce costs, enhance compliance, or align procurement with broader business goals, eBuyerAssist helps you get there faster, smarter, and with measurable results.
Fractal Encryption was once a dream, this is a quest to find the ultimate encryption layers behind the FES Protocol Released in ANTdb 2005.. It in it own base is the module to drive geometric fractal interlaced data.
WPACrackGUI es un entorno gráfico de crackeo de redes WPA con john.
WPACrackGUI es un programa que mediante a la generación asistida de john puede crackear redes WPA sin ningún problema simplemente clickeando unas veces.
SOLEid is a multi-purpose file protector that helps users to easily protect their files with different protection measures. The ones that are included till date are: password protection, hardware id lock, username and process protection.
Inferno is a simple and fast program that can securely delete files using the same methods as the U.S. Department of Defense. Inferno can also securely delete internet and windows history. Also it can even encrypt and decrypt your private files.
Martus Solutions provides seamless budgeting, reporting, and forecasting tools that integrate with accounting systems for real-time financial insights
Martus' collaborative and easy-to-use budgeting and reporting platform will save you hundreds of hours each year. It's designed to make the entire budgeting process easier and create unlimited financial transparency.
BinaryPix is a Tool to create "Binary-Visual" Code out of ASCII-Text Then it places it on a choosen picture. Then you are able to water-mark your pictures with the "binary-hidden" code.
This is a collection of vb class modules written in native VisualBasic. They provide the following functionality: Processing of very large integer numbers, hashing algorithms, prime number handling and an implementation of the RSA algorithm.
Ascii based Encryption/Decrypt Software. Allows you to Encrypt/Decrypt Ascii and Ascii based files. Passwords can be of any length. Simple and easy User Interface. Allows other VB6 developers to encrypt in thier programs. (v2 only)
Lanchat is a Client/Server instant messenger chat service for network/internet use. Builds upon the many features of modern IM environments while implementing some unique ideas. Supports text formatting, blocking/banning, direct connections and much more
SFV.net is a sfv (Simple File Verificator) file creator and validator application. All code written by vb.net and requires .net framework for run or compile
An original bruteforce-based encryption/decryption system. BBE was originally conceived to chat with encrypted text on IRC. mIRC and X-Chat support BBE via script addon. BBE can also encrypt MIME encoded files. Blowfish encryption is currently supported.
CryptoTW provides a win32 DLL that acts as an interface between the GPG.EXE from gnupg.org and a win32 program. Programming automated systems against the GPG.EXE is challenging. By solving the problem once, as a DLL, many developers can benefit.
The Leeter is an easy-to-use and convinient program to easily write hardly understandable text. While this is mainly not the intention of normal chatters it may be a nice joke to try out on friends. Provides 5 different options to scramble up your text.
The FreePKI project aims to create practical, interoperable & free code and services for Certificate and Registration Authorities based on the X.509 standard, including nearly zero-cost ID verification through a PGP-like web of trust scoring system.
The goal of Operation Project X is to crack the 2048-bit RSA private encryption key Microsoft uses to sign Xbox media, by using distributed computing. This key could be used by Xbox owners to run homebrew code on their machines.