With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
Trexo PDF Signer is a professional-grade, open-source application designed for creating legally binding digital signatures on PDF documents. Built with enterprise security standards in mind, it provides seamless integration with hardware security modules (HSM), software certificates, and native platform keystores.
A simple app that enables you to sign the files using ECDSA and SHA512
A simple app that enables you to sign the files and verify their integrity/authenticity using the ECDSA and SHA-512.
I originally developed this app for my university course, but I also decided to post it on GitHub on Sourceforge.
This application is made for educational purposes only. Despite having well-functioning cryptographic features, it may not be reliable.
This application is provided with no warranty or guarantees of any kind. Use it at your own risk!
Made with the help of the...
A minimalistic Youtube Downloader to either download audio or video. You can also download playlists and channels, easily.
Since Youtube changes their cryptography often, if you find a bug, PLEASE REPORT IT.
Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography comes from New Latin steganographia, which combines the Greek words steganós , meaning "covered or concealed", and -graphia meaning "writing".
Total Network Visibility for Network Engineers and IT Managers
Network monitoring and troubleshooting is hard. TotalView makes it easy.
This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
Multicast UDP to HTTP proxy with Interzet CAS Descrambler.
10.10.2019 New epg map file:
http://github.com/ViPetroFF/zcahttpproxy/blob/master/TVGMapNames.ini
EPG resource: http://www.teleguide.info/
To update epg map run: "setupM3U.cmd".
Obsolete support page: http://code.google.com/p/zcahttpproxy/
SilentEye is a cross-platform application design for an easy use of steganography. It provides a pretty nice interface and an easy integration of new steganography algorithm and cryptography process.
Composed of a Java steganographic library and GUI to use steganography. Primarily intended for research communities on security and steganography to implement new dissimulation and steganalysis algorithms. More information at www.hidereveal.org
Full access to Enterprise features. No credit card required.
What if You Could Automate 90% of Your Repetitive Tasks in Under 30 Days? At ServoDesk, we help businesses like yours automate operations with AI, allowing you to cut service times in half and increase productivity by 25% - without hiring more staff.
MD5 hash used to position and color two overlaid Mandelbrot sets.
I'm using an MD5 hash of a username and password field to generate some entropy which is used to generate color pallets and positions / scaling of two Mandelbrot sets. These two images are overlaid to create interesting pictures which represent the entered credentials. I'm interested in all things security, this is mostly just for fun, but could possibly be used to help users identify mistakes in their password entry prior to submission and enforce a tighter failed password lockout policy....
Hide In Picture is a program that allows you to conceal files inside bitmap pictures, using a password. The pictures look like normal images, so people will not suspect there is hidden data in them.
2Pix integrates with Windows to allow you to easily encrypt and hide files in bitmap images, a process called steganography (not to be confused with stenography). Data is stored in the low-order bits of each pixel of an image, so the file is completely hidden from view. Version 1.1 now provides plausible deniability because no unencrypted signature is stored in the image header. It should be impossible to prove an image contains a hidden file (if you use a strong password and only use 1 or 2...
This project has a theory of time that allows a computer program to decrypt information of the past, future, or alternate time-lines using a binary counter. Currently we have developed the binary counter now we are working on a production release.
mp3stegz is an application that apply steganographic (steganography) algorithm in mp3 files. mp3stegz will maintain original mp3 file's size and sound quality. The hidden message is compressed(zlib) and encrypted(Rijndael).
Thumbnail steganography creates a thumbnail from a source image and stores data in it by altering it's color channels. To decipher the data, a new thumbnail is made from the original image and the differences between the pixels are calculated.
Projeto de software parte integrante do trabalho de conclusão de curso de Tetri Mesquita Neto, do curso de Bacharelado em Informática, na Universidade Estadual do Oeste do Paraná - UNIOESTE, campus Cascavel-PR.
This project provides a simple Java-based steganography tool that can hide a message inside a 24-bit colour image so that knowing how it was embedded, or performing statistical analysis, does not make it any easier to find the concealed information.
A Win32 API based graphical desktop sharing system, it support LZMA compress, MD5 password check, 64bits file transfer, 8bits instruction fast protocol and windows's pack intelligence for reduce useless transfer band.
Steganography program. Crypture encrypts (1024 bit key) and stores files in Windows bitmap files. Only 6 KB, with no install required. Fills all bits with noise, to slip by standard steganalysis methods. Data header is encrypted and scattered as well.
BinaryPix is a Tool to create "Binary-Visual" Code out of ASCII-Text Then it places it on a choosen picture. Then you are able to water-mark your pictures with the "binary-hidden" code.
With this software, you can embed the text message into a graphic file.
The result file looks exactly the same with the original. But if you use
this software, you can see the hidden text inside the pciture