With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Outgrown Windows Task Scheduler?
Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.
Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
VPLE (Linux)
Vulnerable Pentesting Lab Environment
VPLE is an Intentionally Vulnerable Linux Virtual Machine. This VM can be used to conduct security training, test security tools, and practice common penetration testing Labs. In VPLE bunch of labs are Available.
NOTE:- "Only run in VMWare Pls Don’t run in VirtualBox"
Will also run on the ProxMox server to understand how to do it pls refer to the doc in the zip named "Cybersecurity Lab Deployment on Proxmox"
The default login...
VPLE (Linux)
Vulnerable Pentesting Lab Environment
VPLE is an Intentionally Vulnerable Linux Virtual Machine. This VM can be used to conduct security training, test security tools, and practice common penetration testing Labs. In VPLE bunch of labs are Available.
NOTE:- "Only run in VMWare Pls Don’t run in VirtualBox"
The default login and password is administrator: password.
List Of All Labs in one VM:-
1. Web-DVWA
2. Mutillidae
3. Webgoat
4. Bwapp
5. Juice-shop
6....
The ODS3 Virtual Machine Challenge are downloadable images that can be run as VMWare or VirtualBox instances. The Idea behind the challenge is to test and exercise web application penetration testing in a controlled environment. These images are great for cyber security students, penetration testers and hobbyist.
Care should be taken if installed on an Internet access host as the application are purposely vulnerable to attack and exploitation.
Pentest Distro - Windows 8 Themed - Hybrid Ubuntu 12.04.4lts / Kali
!!! UPDATED 8/12/2014 !!!
Solak K&D (key and dagger)
Ubuntu 12.04.4 LTS w/ Kali (debian) kernel 3.7
This is a penetration testing distribution that has been heavily themed to look like Windows 8 for obvious penetration testing purposes. It relies heavily on Xfce4.10 and compiz.
For now only available in 32bit (x86)
To install use unetbootin or burn to dvd.
Works with VMWARE
Login: root / toor :: user / resu
Type in terminal:
Please don't install on a...
Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
Encrypt and decrypt text using AES 256 bit encryption
AESTextCrypt is an easy-to-use open source tool for text encryption and decryption. Primarily intended for use with email, use it wherever you need to protect text from prying eyes. The encrypted text can be copy/pasted into any text-handling application (e.g. email) instead of plain text. Convenience buttons are provided for clipboard operations.
AESTextCrypt uses AES-256 bit encryption which is the strongest available encryption scheme. It also employs bcrypt, which implements...
Etherwall is a free and open source network security tool that prevents Man in The Middle (MITM) through ARP Spoofing/Poisoning attacks. It Also prevent it from various attacks such as Sniffing, Hijacking, Netcut, DHCP Spoofing, DNS Spoofing, WEB Spoofing, and others.
Note: For personal computer use only (client security)
if you like this program, please give us your vote at http://sourceforge.net/projects/etherwall/reviews/
This program checks the namespace of the password input ([a-z][A-Z][0-9][`-/]) and then determine the total number of passwords that an attacker might go through to brute-force the password.
This is currently and ALPHA program, and as such everything that you "get" out of it should be examined closely.
Jacknsee is an educational network security tool. Its purpose is to teach students in computer science how basic hijacking techniques are used to corrupt a network. Two scenarios have been implemented: Man in the Middle and Denial of Service.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
This program can encrypt / decrypt strings with the Caesar's Cipher.
It also can try to crack an encrypted string with brute force.
(C) Daniel Steinhauer <pik-9@users.sourceforge.net>
Secwatch is an intrusion detection system using log analysis to detect service scan and other brute-force attempts on a server or other computer using system logs and will create temporary firewall rules to block offending IPs