With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure
Native application identity and user-based security for your Azure cloud
Gain integrated visibility across all traffic in a single pass. Deploy Palo Alto Networks VM-Series to determine application identity and content while automating security policy updates via rich APIs.
Common role (ComoRo) lets you manage all roles for your applications in a centralized way, being the natural extension to single-sign-on (sso).
Comoro recommends the use of a SSO system, like CAS.
A configurable system for synchronising multiple passwords of different types. Password quality can be imposed by using histories, cracklib based tests, and forcing certain passwords to be distinct. CGI and PAM modules exist for tight integration.
A simple demonstrative command line tool which can do both file encryption and decryption . It is based on OpenSSL and can support AES / DES / 3DES / BLOWFISH / RC4 cipher algorithms with ECB / CBC / CFB / OFB chaining modes (ECB only for RC4).
Only for windows XP
OpenFirewall is based on two lines of defence first WIPFW ( Kernel-mode driver ) and second tdifw ( application-mode TDI-driver ) . Is a Windows firewall easy to use like the commercial products
SpamCheetah is an OpenBSD greylisting based spam filter. It is a liveCD that can run on any machine and it does not modify your hard disk or anything else. It is a network level spam filter and you have to run a separate mail server with it.
Cross Site Scripting Anonymous Browser (XAB) leverages web sites and client browsers to build a network of drones. It is not to replace the current anonymous browsing applications, but provides an alternative that does not require willing participants.
PHP security system that protect your web applications adding on your source ONLY ONE LINE OF CODE! Administrators can manage policies, authentication and authorisation for as many users and groups, all through a single and intuitive Ajax based interface
This project aims to provide an open source Matlab-based development framework to conduct side-channel attacks. Part of this framework are Matlab classes, functions, scripts, and demos.
BookMage is a server side login mechanism to protect against phishing attacks which uses a login bookmark and an interactive custom image. The (PHP and javascript) code is short and simple is and can be easily integrated into any website.
A PHP based auto Local Exploit trigger. It detects kernel version ,gcc and auto pwn it for specific vulnerabilities. A standard proof of concept.This PHP based script, when allows to upload on vulnerable server .
Proxymizer is an anonymizer (a proxy server connecting to other proxy servers), allowing simultaneous use of several public proxy servers, one per single request. Highly extensible and configurable.
TclTrf is an extension library to the script language tcl, as created by John Ousterhout. It extends the language at the C-and Tcl-with ``transformer''-commands to encode and compress data.
Based on the stacked channels of the tcl core (ability inter
description: is a text encrypting with a basic algorithm based on reversing the text. devcpp compiles perfectly. and is created in C. (graphical mode).
Identityflow provides a framework for building protocol flows that perform distributed Identity operations. Examples of Identity Operations are Single Sign-On (SSO) and Attribute queries.
jKeePass ist ein Passwort Verwaltung Tool. Mit einigen iTAN bzw TAN features. jKeePass ist NICHT Binär kompatibel zu KeePass und speichert ein eigenes Format. Es hat einige Features daraus übernommen und ist ein Komplet neu in Java geschriebenes Tool.
This Java utility removes the Javascript parts from a PDF document. It is based on the iText library. It is useful to avoid injection/phishing attacks.