With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Cloud tools for web scraping and data extraction
Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.
Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
J2DA! is an Game-Java2D Abstraction Layer. With it you will be able to use Java2D, Jogl or LWJGL for your Game without thinking about what exactly you are using.
Xippo is a java tool for XML marshal/unmarshal.
Javacentric: you write your java class without thinking to its XML representation.
Datacentric: interested only in data written inside your java object.
An android strategy-puzzle word game, where user needs to guess a code
...It's a mastermind game, so you think about the probability of occurrence, analysis of previous attempts.
The goal of the game is to keep the player thinking about deCODING the code, analyze and solve it. It sharpens a user/ player's thinking skills.
This project aims at creating rationally thinking agents. The agent gather information through command line or network and stores it in its memory. It uses Stanford's NLP library to understand the language statements.
All-in-one security tool helps you prevent ransomware and breaches.
SIEM + Detection and Response for IT Teams
Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.