With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Context for your AI agents
Crawl websites, sync to vector databases, and power RAG applications. Pre-built integrations for LLM pipelines and AI assistants.
Build data pipelines that feed your AI models and agents without managing infrastructure. Crawl any website, transform content, and push directly to your preferred vector store. Use 10,000+ tools for RAG applications, AI assistants, and real-time knowledge bases. Monitor site changes, trigger workflows on new data, and keep your AIs fed with fresh, structured information. Cloud-native, API-first, and free to start until you need to scale.
the PPHPLIB allows users to easy create standard web pages which are using a DB as a backend. In addition the library provides other functionallity, like classes for authentication and authorization, abstraction of DB layers and many more.
snavtclient is free opensource network client program for CCTV security surveillance digital video recorders (DVR) manufactured by the AV TECH Corporation. For more information please see software web site: http://snavtclient.epipe.com/
Perfenc is a encryption program that encrypts/decrypts files or the standard input with a one-time pad.
More information about one-time pads is available at http://en.wikipedia.org/wiki/One-time_pad
AI-based, Comprehensive Service Management for Businesses and IT Providers
Modular solutions for change management, asset management and more
ChangeGear provides IT staff with the functions required to manage everything from ticketing to incident, change and asset management and more. ChangeGear includes a virtual agent, self-service portals and AI-based features to support analyst and end user productivity.
This is is a modular, test driven website that tries to break web clients of all kind. If you are developing applications that interact with websites you might want to throw it at this website first and see if it survives.
Simple tool for file encryption and folder content encryption with AES 256. Files can also be hashed with a SHA1 signature. A command line version is available as well as a GUI version. One other useful feature is to encrypt messages for emails.
usfmapop [ i know it sounds horrible ;-) ] stands for "useful scripts for me and (perhaps) other people". The goal is the publish some scripts i wrote to make my work easier. More informations on the project homepage.
Rise Vision is the #1 digital signage company, offering easy-to-use cloud digital signage software compatible with any player across multiple screens. Forget about static displays. Save time and boost sales with 500+ customizable content templates for your screens. If you ever need help, get free training and exceptionally fast support.
Fdump is a general low-level file/directory manipulation program. Fdump can split, reconstruct, scan, update, encode/decode, extend and compare any kind of file. It dumps files in several formats, while re-encoding from: B2/B16/B32/B64/B85.
TorK is an Anonymity Manager for the KDE Desktop. Browse anonymously on Konqueror/Firefox/Opera. Send anonymous email via the MixMinion network. Use ssh/irc/IM anonymously. Control and monitor your anonymous traffic on the Tor network.
efw-toolbox. Is a collection of applications/scripts and other odds and ends that are useful to have. These are currently not available in the current Endian Firewall Project. This project is intended to work alongside with Endian Firewall project .
a perl script to perform Vigenere (polialphabetic enciphering and deciphering) for teaching classes. Keys are stored in a dedicated file in order to have a one time pad to use for messages exchange.
Amnesia is a design-rich 'host-proof' web application that encrypts and remembers all sorts of personal information from passwords to private notes. Project now hosted at Google Code: https://code.google.com/p/amnesia-app/
This is a simple encryption tool to work with home-grown encryption algorithms.
It can run as either a GUI, a command-line application, or a network proxy.
Kryptographie is a student project to implement historic encryption methods. It has a linux style command line interface. This project will also include the notes for my talk I'll hold on cryptography in school. (in German).
inundator is a tool used to anonymously inundate intrusion detection logs with false positives to obfuscate a real attack, leaving the IDS analyst feeling completely inundated.
phpKeyMgr is a PHP based SSH key managing software.
You can create multiple keys, define servers, and choose valid keys for each servers.
After this you can export the authorized_keys file with ease.
A Javascript implementation of the Blowfish Encryption Algorithm described by Bruce Shneier circa 1993. Blowfish is a keyed, symmetric block cipher common in cipher suites and was placed, by Mr. Shneier, in the public domain.
BBSGen is an improved Blum-Blum-Shub pseudorandom number generator. It consists of a C library (libbbsgen) and command-line tool (bbsgen). BBSGen can be used in applications and command-line as secure, unpredictable and strong PRNG.
FWAuto is a Perl script and should work on any system with Perl installed. Provide the running config of a PIX firewall to fwauto. It will analyze and give you a list of weak rules in your rule base and store the result in multiple output files.
This program aims at providing a java solution to hide secret information(such as secret file) to JPEG images. Hiding algorithm contains Jsteg and F5. The main(probably the toughest) stuff is encoding and decoding JFIF files.
Allows to transparently encrypt repository contents with AES 256. The main advantage is that no additional software needed to be installed in untrusted location. Files are automatically encrypted on the fly when doing git push from trusted location.