With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Gemini 3 and 200+ AI Models on One Platform
Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
Brute Force Grid is a Process sharing framework on Peer to Peer overlay network. To demonstrate the application we have used the brute force attack to the hashes by hashing algorithms. License : GNU General Public License version 3 (GPLv3)
Laika analyzes and reports on the interoperability capabilities of EHR systems. This includes the testing for certification of EHR software products and networks.
If you use tripwire, you have to review and accept changes on a daily basis. Logging into multiple servers to accept the changes is troublesome. Enter CentralWire: a web-based centralized console to review and accept changes detected by tripwire.
Common role (ComoRo) lets you manage all roles for your applications in a centralized way, being the natural extension to single-sign-on (sso).
Comoro recommends the use of a SSO system, like CAS.
Computer Security Model Implementations for Computer Science Graduate Students and Researchers. Implementations include the Take-Grant Protection System and a Self-Organized Critical (SOC) Lattice Model for malware behavior.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
This is a simple WEP, WPA key and password generator that allows you to select the level of complexity. Since it is written in java, it will run on any system with a JRE installed.
jKeePass ist ein Passwort Verwaltung Tool. Mit einigen iTAN bzw TAN features. jKeePass ist NICHT Binär kompatibel zu KeePass und speichert ein eigenes Format. Es hat einige Features daraus übernommen und ist ein Komplet neu in Java geschriebenes Tool.
This Java utility removes the Javascript parts from a PDF document. It is based on the iText library. It is useful to avoid injection/phishing attacks.
A smart card-based public key cryptography system based on elliptic curves, using AES for session key generation and SHA for hashing. This project will include the smart card software, terminal software, and a public key server.
Suite of tools and APIs to manage centralized logs: collectors to get remote logs, tools to navigate through stored logs, tools for datamining over stored logs.
sanesigner is a high level digital signature api component. it support generating and verifying digital signatures as well as encryption and decryption using public keys, and lots of other features in between.
The principal target of Segovia is to generate reports for a set of Security Testing tools. This reports show the different found vulnerabilities in a graphical way. Also they explain the most common reasons and the solution of these vulnerabilities.
The Benchmark Editor enhances and simplifies the creation and editing of benchmark documents written in standard languages such as XCCDF and OVAL. NOT CURRENTLY MAINTAINED: please see the Recommendation Tracker for a similar, actively maintained tool
Security is a subject of major concern in mobile agents. This project provides a security framework that allows the protection of mobile agents from third parties. A self-protected approach, where the agents themselves manage the process, is used.
Identityflow provides a framework for building protocol flows that perform distributed Identity operations. Examples of Identity Operations are Single Sign-On (SSO) and Attribute queries.
NetSlaughter is a GUI for Nmap, Netcat, dsniff and tcpdump.
Runs on Linux and is coded in Java.
In next revisions I wanna make it multiplatform, to run it under Linux and Windows
JMS Assurance Integration Kit (JAIK) is a collection of Java APIs that allows Java developers to transparently incorporate assurance into JMS messages while wrapping JMS connectivity.