Showing 7 open source projects for "encryption"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • 1
    Sliver

    Sliver

    Adversary Emulation Framework

    Sliver is an open source cross-platform adversary emulation/red team framework, it can be used by organizations of all sizes to perform security testing. Sliver's implants support C2 over Mutual TLS (mTLS), WireGuard, HTTP(S), and DNS and are dynamically compiled with per-binary asymmetric encryption keys. The server and client support MacOS, Windows, and Linux. Implants are supported on MacOS, Windows, and Linux (and possibly every Golang compiler target but we've not tested them all).
    Downloads: 49 This Week
    Last Update:
    See Project
  • 2
    S5CMD

    S5CMD

    Parallel S3 and local filesystem execution tool

    ...There are already other utilities to work with S3 and similar object storage services, thus it is natural to wonder what s5cmd has to offer that others don't. s5cmd supports wide range of object management tasks both for cloud storage services and local filesystems. List buckets and objects. Upload, download or delete objects. Move, copy or rename objects. Set Server Side Encryption using AWS Key Management Service (KMS). Set Access Control List (ACL) for objects/files on the upload, copy, move. Print object contents to stdout. Select JSON records from objects using SQL expressions. Create or remove buckets. Summarize objects sizes, grouping by storage class. Wildcard support for all operations.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    sessions

    sessions

    Package gorilla/sessions provides cookie and filesystem sessions

    ...Flash messages: session values that last until read. A convenient way to switch session persistency (aka "remember me") and set other attributes. Mechanism to rotate authentication and encryption keys. Multiple sessions per request, even using different backends. Interfaces and infrastructure for custom session backends: sessions from different stores can be retrieved and batch-saved using a common API. First we initialize a session store calling NewCookieStore() and passing a secret key used to authenticate the session.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Fabio

    Fabio

    Consul Load-Balancing made simple

    Fabio is an HTTP and TCP reverse proxy that configures itself with data from Consul. Traditional load balancers and reverse proxies need to be configured with a config file. The configuration contains the hostnames and paths the proxy is forwarding to upstream services. This process can be automated with tools like consul-template that generate config files and trigger a reload. Fabio works differently since it updates its routing table directly from the data stored in Consul as soon as...
    Downloads: 3 This Week
    Last Update:
    See Project
  • Cloud-based help desk software with ServoDesk Icon
    Cloud-based help desk software with ServoDesk

    Full access to Enterprise features. No credit card required.

    What if You Could Automate 90% of Your Repetitive Tasks in Under 30 Days? At ServoDesk, we help businesses like yours automate operations with AI, allowing you to cut service times in half and increase productivity by 25% - without hiring more staff.
    Try ServoDesk for free
  • 5
    jwt-go

    jwt-go

    Go of JSON Web Tokens

    ...The last part is the signature, encoded the same way. The first part is called the header. It contains the necessary information for verifying the last part, the signature. For example, which encryption method was used for signing and what key was used.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Emitter

    Emitter

    High performance, distributed, low latency publish-subscribe platform

    ...Uses standard MQTT protocol, binary messages and supports message filtering. Designed to ensure reliable, speed-of-light message delivery and high throughput. Supports TLS encryption, binary messages, expirable channel keys and permissions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Trojan-Go

    Trojan-Go

    A Trojan proxy written in Go

    In the early days, the firewall only intercepted and reviewed outbound traffic, that is,Passive detection. Shadowsoks' encryption protocol design makes the transmitted data package itself have almost no characteristics, and it looks similar to a completely random bitflow, which can indeed effectively bypass GFW in the early days. Contrary to Shadowsoks, Trojan does not use self-defined encryption protocols to hide itself. On the contrary, the clearly characterized TLS protocol (TLS/SSL) is used to make the flow look the same as the normal HTTPS website. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next