With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Build Securely on Azure with Proven Frameworks
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
The utility can encrypt/decrypt file/folder structure using key. The folder/files, when encrypted are stored in corresponding structure as is but with the extention ".encrypted" & when you decrypt it, entire structure can be restored back as it was.
Safe all your passwords and encrypt them with a single password? Yawn. Synchronize your encrypted entries between different machines? Without compromising your security? Here comes SyncYourSecrets
An encryption/decryption engine which can encrypt any file(text, pdf , doc, rtf , gpg , mp3 , mp4 etc..) or any data on your PC such that only you with the valid password can decrypt it.Also it will compress the file while encrypting it.
No-Nonsense Code-to-Cloud Security for Devs | Aikido
Connect your GitHub, GitLab, Bitbucket, or Azure DevOps account to start scanning your repos for free.
Aikido provides a unified security platform for developers, combining 12 powerful scans like SAST, DAST, and CSPM. AI-driven AutoFix and AutoTriage streamline vulnerability management, while runtime protection blocks attacks.
Damn Safe is a basic password manager that uses Java's advanced object serialization to encrypt the password database. This program is under the GPL v2 license.
Cryptomni is a program which can encrypt and decrypt files using the one-time pad cipher. If a key is truly random, kept secret, and never reused, this encryption algorithm can be proven to be unbreakable.
PipeX project's goal is to provide developers with set of flexible stream pipes which can combine in different order to achieve desirable output (i.e. compress/uncompress, encrypt/decrypt and etc.) on fly.
MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
Private-key, symmetrical (same password to encrypt and decode) file encryption with 8-bit to 2147483647-bit (2^3 to 2^31) encryption using my own algorithm and my own extension of MD5 (http://blog.robtoth.net/2009/06/tencryption-computer-programming.html
SecureIM is an instant message client who uses digital certificates and PKI.The client application connects to a WildfireSIM server.SIM do a digital signature for login to the server using a user certificate.Also uses PKI to encrypt and decrypt messages
aamFetch is a utility for fetching your anonymous esub nym messages from the alt.anonymous.messages newsgroup (or other newsgroups). It allows multiple encrypt-subjects to scan, multiple "destination files" to save messages to and random chaff downloads.
Cryptographically secure your files with asymmetric and symmetric keys, as well as password based encryptions and file/text checksums. Use upto 6 different keys to encrypt/decrypt and get checksums using MD2, MD5, SHA1, CRC32, etc..
Quickly encrypt and decrypt your files with Petri. View encrypted text and image files containing your passwords or other sensitive information. Petri is written in Java and therefore runs on any operating system supporting the Java Runtime Environment.
SecretBox is an open-source, high-safety password manager for Windows/Linux/J2ME devices. You can build the passwords list conveniently in PC side, encrypt it by a master password, and upload to your mobile phone.
This proyect is an implementation of OpenPGP (RFC2440) written entirely in Java. It let's you sign, encrypt, decrypt messages and files, using public key cryptography.
A plattform independent encryption-tool with a simple user interface (swing/java). It uses 'Password Based Encryption' (PBE) to encrypt and/or decrpyt files on the filesystem. Encryted files will also be compressed using the zip-format.
A Java program to encrypt files and make them relatively safe for transfers across networks. Currently just in commandline form, but an application is in the works.
A Secure Diary Program written in Java and using the bouncycastle JCE Cryptograpic library. It uses a combination of BlowFish and TripleDES (XORed) to encrypt Diary entries.
Password Keeper:
Password Keeper will be a program that lets you put all of your passwords in one file and encrypt it easily instead of using a flat file.
Java class file encryption. Class Encrypt is a program that can encrypt a developer's class files and package them into an executable jar file for deployment. The program uses modules for implementing different encryptions.
Secrets is a complete, standalone, personal encryption solution that works much like PGP (Pretty Good Privacy). With Secrets you can encrypt information before emailing it to a friend or coworker, or before storing it on a removable disk. Secrets is buil
Meergoose is a multi-use social suite of applications that allows users to setup a portal on their personal computing platform that encrypts and stores files locally and synchronizes encrypted files with a secure cloud.
MeerCrypt is a component of Meergoose and is opensource. The vision is simple: Encrypt Locally. Share Remotely. YOU remain in control of your security, your keys, your data.
The iText based PDF sCramblEr allows you to encrypt a PDF using one or more public certificates of the addressees (one or more .cer files). For each .cer file, you can enforce specific PDF permissions: (dis)allow printing, (dis)allow modification,...