With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
Try free now
Red Hat Enterprise Linux on Microsoft Azure
Deploy Red Hat Enterprise Linux on Microsoft Azure for a secure, reliable, and scalable cloud environment, fully integrated with Microsoft services.
Red Hat Enterprise Linux (RHEL) on Microsoft Azure provides a secure, reliable, and flexible foundation for your cloud infrastructure. Red Hat Enterprise Linux on Microsoft Azure is ideal for enterprises seeking to enhance their cloud environment with seamless integration, consistent performance, and comprehensive support.
Python-3-API to GTK. Simplicity first - just suited for UI-building of apps, in no way for widget-building. Currently 1500 lines for 15 widgets, 130 methods. View all files for some documentation and tests (METHOD-GUIDE.html gives hints for compilati
Anomaly Wiki is a file-based content management system (CMS) written in Php. The main goals are fast browsing, easy customization and few requirements (no database or other dependencies). All you need is a web server running PHP 4.3.0 or later.
bytelocator is a small C command-line utility that allows you to search for hex byte patterns within any binary file. Its provides information on the byte location within a binary file based on the hex byte pattern you provided.
Bright Data - All in One Platform for Proxies and Web Scraping
Say goodbye to blocks, restrictions, and CAPTCHAs
Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
A pure python module which implements the DES and Triple-DES encryption algorithms. Triple DES is either DES-EDE3 with a 24 byte key, or DES-EDE2 with a 16 byte key.
A proof-of-concept application of the Statistical Protocol IDentification (SPID) algorithm. SPID can detect the application layer protocol (layer 7) by analysing flow (packet sizes etc.) and payload statistics (byte values etc.) from pcap files.
File Format:
[header 1 to 5 bytes]
byte 1- 4 bits: package count; 4 bits first package type
Package type:
1- Inserted dynamically, no pointers
2- Inserted with a pointer that needs to be adjusted
3- Insert with a specific offset
[data]
"FPTH" (ASC
Cross platform gtk+ GBA ROM hacking utility that searches for the byte FF in the chosen ROM file. If you want the tool to start searching from a specific offset, type the offset in the "offset" box, and the tool will begin it's search from there.
216,000+ customers in over 135 countries grow their businesses with HubSpot
HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
Enable Java programs to detect MIME types based on file extensions, magic data and content sniffing. Supports detection from java.io.File, java.io.InputStream, java.net.URL and byte arrays. See the project website www.eoss.org.nz/mime-util for detail
Command-line tool to check ADFs (Amiga Disk Files) for errors and viruses.
A binary is included for Windows users; Linux users are advised to compile the application themselves.
Might also compile under plain DOS; but BE WARNED! When you scan files already renamed by the TOSEC standard, consider that file names may become insanely long in no time.
--UPDATE OCTOBER 2014--
This project is currently suspended! I can't currently find the time to fix/update anything with this program...
This is soft-terminal emulator library. Applications could use that API to work with any full-duplex byte stream as with video terminal having specific display and keyboard. Supported terminals VT220, VT100, VT52.
Visualize the byte code of Java in an eclipse view. You can see the byte code of your java sources in a structured way or can open an existing class file. All references are resolved, every byte is described.
Randomized packet generation for source mac, source ip spoofing. Any byte in a packet can be spoofed one by one packet generation. And provide a DDoS testing framework.
JAC (Java Asn1 Compiler) is a tool for you if you want to (1)parse your asn1 file (2)create .java classes and (3)encode/decode instances of your classes. Just forget all asn1 byte streams, and take the advantage of OOP! BER, CER and DER are all supported
ng-upnp2mrtg queries UPnP capable routers and retrieves the traffic byte counters and the uptime information. The output can be used by the popular Multi Router Traffic Grapher (mrtg). Simple adaptation to other UPnP capable routers.
With GLCD Tools you can convert windows bitmap files (bmp) to a byte array suitable for graphic LCD displays. Additionally you can create fontsets out of your system fonts for the displays. It outputs C Code which you can use in your µC project.
Command line tool to convert BMP images to binary bitmaps and c header files with 8bit page layout instead of line layout (one byte is 8-bit vertical line). Can be used to present data for graphical LCD images in micro controller programming (eg AVR).
SJEA version 1.0 - Simple Java Encryption Algorithm. SJEA is a simple command-line binary encryption algorithm (symmetric block cipher) written in JAVA. It uses a password and a byte-vector array to scramble the input file.
JFileReader allows users to view the contents of any file in a bytewise manner using a simple GUI interface. Functions include byte view changes to different primitive datatypes, endianess changes, and file content exports to new files.
FileButcher is a file splitter written in Java with a simple user interface that allows splitting by bytes, pieces, or the "Hack" function, which splits at a specific byte or percent.
The Cryptographic Implementations Analysis Toolkit (CIAT) is compendium of command line and graphical tools whose aim is to help in the detection and analysis of encrypted byte sequences within files (executable and non-executable).
Compares 2 binary files for minor differences/copy errors
FCB compares two files byte-by-byte. Files may be regular files or any kind of devices, pipes, etc. and one can be stdin. You can specify an offset if one file has a header.
Usage: fcb <File1> <File2> [-h0,1] [-p0,1] [-v0,1,2,3] [-b0,1] [-q0,1]...