With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Cloud tools for web scraping and data extraction
Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.
Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
Strong cypher with unique recursive alghorythm of bitwise gamma with good avalanche and diffusion. Recurse allow explore quality and parameters at short sequences of data and keys and extrapolate it on very long data and keys.
Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place.
For healthcare Providers and Facilities
Incredable streamlines and simplifies the complex process of medical credentialing for hospitals and medical facilities, helping you save valuable time, reduce costs, and minimize risks. With Incredable, you can effortlessly manage all your healthcare providers and their credentials within a single, unified platform. Our state-of-the-art technology ensures top-notch data security, giving you peace of mind.
Cryptography Workshop is a small yet powerful tool for cryptography and cryptanalysis. It's focused more on classic cryptography. It is currently in alpha and under development.
This project is a C++ library which allows incorporating DKIM into an existing MTA or other application. It provides full support for signing, verifying, and SSP. It is compliant with RFC 4871.
Backup P2P is a peer to peer application doing automated and secured backups inside a community (Jabber, XMPP). Each user shares some available space on his disk with others, to be able in return to remotely backup some of his own data.
This is the extended euclidean algorithm implemented in haskell.
It will put every single step of the algorithm in a file and show the actual result and everything in between.
This program can encrypt / decrypt strings with the Caesar's Cipher.
It also can try to crack an encrypted string with brute force.
(C) Daniel Steinhauer <pik-9@users.sourceforge.net>
SLEncrypt is a python module for encryption with 11 ciphers at the moment, including ADFGVX, Autokey, Caesar/ROT13, Vigenere, XOR and a lot more. It contains functions allowing you to easily encrypt/decrypt files. The code is about 95% PEP 8 compilant.
Advanced Perl script for DES password cracking. Might be handy for password QA. Brut-force, load Unix passwd/shadow, multi hash crack, input/output file, save/resume cracking state.
It load the current public-timestamp-block from publictimestamp.org and store it in a file to use it e.g. as a signature in an e-mail software.
The project is inactive and not under development anymore.
Sharemind is a secure multiparty computation system that allows you to process data without seeing it.
IMPORTANT: The version available on this page is a seriously outdated version that is kept available as an educational tool. More recent versions with more features and better quality are available from http://sharemind.cyber.ee/.
This project aims to provide an opensource Matlab-based development framework to conduct side-channel attacks. Part of this framework are Matlab classes, functions, scripts, and demos.
Crypto is a simple, easy to use Windows application for encrypting text files using RSA encryption. Crypto has an elegant user interface and a powerful encryption backend.
A smart card-based public key cryptography system based on elliptic curves, using AES for session key generation and SHA for hashing. This project will include the smart card software, terminal software, and a public key server.
Hide your data from any scans for fingerprints at forensic analysis. Fragger is an concept to fragment files into many small files by scrambling the content of the source file.
sanesigner is a high level digital signature api component. it support generating and verifying digital signatures as well as encryption and decryption using public keys, and lots of other features in between.
Identityflow provides a framework for building protocol flows that perform distributed Identity operations. Examples of Identity Operations are Single Sign-On (SSO) and Attribute queries.
Lite Security Module: a daemon to handle PKCS11 Secure Boxes
Lite Security Module: a daemon to handle Secure Boxes (files containing cryptographic keys, X509 certificates and data objects), accessible through a PKCS#11 library, supporting non-certified (lite) Software or Hardware Security Modules (www.clizio.com)
Security for usb flash drives. Uses basic encryption to make sure your data is safe, on all platforms. This application is written in C++, GUI is still to be considered. PRE-ALPHA STAGE, DO NOT USE ON IMPORTANT DATA!