Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.
Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
Sign Up Free
Gemini 3 and 200+ AI Models on One Platform
Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
adlc (amp-off debian livecd) is a security-oriented debian livecd. It contains tools and frameworks to perform security audits. for login try: root/toor and have a look at adlc.sourceforge.net. It's like a README ...
Derived from TrueCrypt 6.3 release, I added some command line options to "TrueCrypt Format.exe" to allow TrueCrypt volumes to be created without using the graphical user interface
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
GoodME is a minimalist operating system for LCD toys based upon the Chipcon 8051 radios, such as the IM ME toy from Girltech. It can be used either as a basis for further development, or as a platform for simple games and radio experiments.
DNSSEC Zone Key Tool is a toolkit written in C for DNSSEC zone and key management.
It supports automatic zone resigning and KSK- and ZSK rollover according to RFC4641 and RFC5011.
AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
This WebOS application generates RFC 2289 standard compliant one-time passwords. It supports the MD4 and MD5 message-digest algorithms as well as the SHA-1 hash algorithm and can be used with challenge-response OTP systems such as OPIE and S/KEY.
SOLEid is a multi-purpose file protector that helps users to easily protect their files with different protection measures. The ones that are included till date are: password protection, hardware id lock, username and process protection.
Software solution for creation and verification of digitral signatures. Can replace tokens and smart cards with mobile phones. Components included are client and server. Can creates, verifiy and store content and signatures. Offers secure sharing.
DWIP is short for Disk Wiping and Imaging Tool. This tool is being built for Mississippi State Universities National Forensics Training Center for use on a live cd to give out to it's students.
SeCURePass password manager. A flexible, secure password manager for use in many situations, applicable for storing personal information. Integration with Firefox is available via an included extension.
Inserendo una password abbastanza lunga risulta praticamente impossibile riuscire a indovinarla. Creando password non pronunciabili e quindi completamente random, ci si mette al sicuro attacchi di tipo dizionario.
E' una versione per Java Mobile.J2me
mac-robber is a digital forensics and incident response tool that can be used with The Sleuth Kit to create a timeline of file activity for mounted file systems.
The goal of the project is to create an example of Java ME based application for SMS message encryption. This aplication is only of academic interest and is not suitable for real safe SMS encryption.
Set of perl scripts to analyse and check expiration of user certificates in Microsoft Windows Certification Authority. Output is in HTML with list of expiration state of latest user certificates. Expirated are marked. List can be sent by e-mail.
An undetectable Remote Administration Tool -OR- trojan, an all new approach. Easily usable, Client just requires any Web Browser to control remote machine via WebPage. Fooling firewalls/ids/ips security solutions, as it operates like any web-site.