With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Cloud tools for web scraping and data extraction
Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.
Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
The aim of this project is to create a set of basic java tools for
developers who need Certificate Authority (CA) root
certificates and user certificates signed by the CA.
The goal of Operation Project X is to crack the 2048-bit RSA private encryption key Microsoft uses to sign Xbox media, by using distributed computing. This key could be used by Xbox owners to run homebrew code on their machines.
Simple Encoder/Decoder, written in the .net framework.
It is basicly an encryption program which supports serveral encryption methods.
It can encode or decode texts in the forms of files or just plain text written directly in the program.
Martus Solutions provides seamless budgeting, reporting, and forecasting tools that integrate with accounting systems for real-time financial insights
Martus' collaborative and easy-to-use budgeting and reporting platform will save you hundreds of hours each year. It's designed to make the entire budgeting process easier and create unlimited financial transparency.
RSA Public Key Crypotgraphy for Web Browsers.
Use JavaScript to RSA-encrypt data that can only be decrypted on the server, and not by prying eyes.
The poor man's SSL...
Stream Shield is a program to encrypt and anonymize your connection to the internet by connecting to remote proxies, using Blowfish/Rijndael Algorithms and removing many personally identifiable headers such as referer, user-agent and more.
For companies looking to automate their consolidation and financial statement function
The software is cloud based and automates complexities around consolidating and reporting for groups with multiple year ends, currencies and ERP systems with a slice and dice approach to reporting. While retaining the structure, control and validation needed in a financial reporting tool, we’ve managed to keep things flexible.
Java class file encryption. Class Encrypt is a program that can encrypt a developer's class files and package them into an executable jar file for deployment. The program uses modules for implementing different encryptions.
Overcoat encrypts your projects exe file before distribution (for shareware authors for example), that limits the use of an exe file, and forces the user to purchase/registar after a certain developer defined period
ObscureEncrypt is a high level security encrypter. It encrypts at three levels, 448 bit Blowfish encryption, Obscurity, high level encryption. Making it almost impossible to decrypt
A tool to hide BitTorrent metainfo (.torrent files) into and restore
the same back from images (and other types of files) using
steganographical methods, providing friendly GUI for the process.
ECTP - Encrypted Compressed Transfer Protocol
This protocol is similar to HTTP but with commands and features like FTP. The main features are security and compression abilities and the consequent use of one perisistant connection.
A gpg crypto module for apache. This is an add-on module for the popular apache webserver to provide gpg functionality to web pages via an xmlrpc interface.
Infranet is a system that attempts to circumvent web censorship by allowing clients to surreptitiously request sensitive content via cooperating Web servers distributed across the global Internet.
The NEO Project uses the NEO-c (Network Exchange Operation for Charity) platform to participate in various computing challenges and projects, and donates any winnings to the charities specified by its users.
CryptoPy is a pure python implmentation of cryptographic algorithms and applications. The algorithms are developed for readability more than speed. The collection now includes IEEE 802.11i specific algorithms that generated the test vectors for 802.11i.