With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
P.A.T.H is a collection of tools for inspecting and hijacking network connections written in Perl.
By now it includes a packetgenerator, a rst deamon, a sniffer, an ICMP redirection tool, an ARP redirection tool, an IDS testing tool and an automatic hij
External library for the Apache project Axis implementing UsernameToken spec from the working draft Web Services Security Username Token Profile ver1.1(Sunday, 26 Janurary 2003)
A C++/Qt program for use in encrypting and decrypting simple substitution cyphers. These cyphers are often found in newspapers and various puzzle books.
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
Wanesa: Web Analizer for Non Expert System Administrators aims to be a replacement for the excellent web-scanner Nikto. It supports most of Nikto\'s match file format but also adds parallel hosts scanning to improve performance and increase network load
KAVClient is a C language interface to Kaspersky Antivirus Daemon (KAVDaemon), a part of Kaspersky Antivirus for Linux, a popular anti-virus software from Kaspersky Lab (www.kaspersky.com).
Cryptomak contains cipher and tools for encryption utility written in php such as substitution, vigenere, affine, transposition and index of coincidence. It is powered by Phrame platform which implements MVC design and Smarty template engine.
The development of a biometric system and applications e.g. Access Control based on the system to recognize and verify people. The primary goal is face recognition, but other human attributes might get used too in the future.
This program demonstrates a weakness in the authentication process of 802.1X EAP-MD5 in Wi-Fi networks that allows an attacker to gain login information by a dictionary attack. A Wi-Fi compliant card (802.11a,b,g) that supports monitor-mode is required.
Generic clustering/load-balancing platform (over a LAN or internet) using java based P2P Aorta workers that execute java "tasklets". Various tasklets can be implemented to solve fractals, process images, render webpages, crack RSA "brute force".
Bouncer en localhost o lan, que permite capturar el trafico hacia un determinado canal de irc, cifrandolo con Rijndael, Serpent o Twofish. Y mostrando una salida por el canal en base64. Ideal para paranoicos.
ReHash is an easy-to-use console-based hash calculation tool written in C++. It supports many algorithms and output formats and it can be fully configured using some of the many command-line arguments which can be passed to the tool.
<b>IVJ MUD (Masive Multiplayer Text Game) is a SSL-based soft:<br>-Client (GUI)<br>-Server (GUI)<br>-Applet (GUI)<br>-Protocol (SSL-based, use of localization files that store strings to reduce trafic and allow for instant i18n.<br>
LOOKING FOR HELP!</b
The SWAP (Secure Wireless Access Point) project is intended for use in embedded appliances. These appliances will operate in the role of a WEP (wireless encryption protocol) and IPSEC enabled wireless access point, IPSEC VPN gateway, and firewall.
Secure Distributed Objects provides a mechanism for using socket-based SSL communications in the MacOS X Distributed Objects system, by providing a NSPort subclass - SecureSocketPort - and other utilities.
Status Module is a daemon which forwards vital system information (memory usage, active processes, etc.) into the kernel logs by using a kernel module. This is very useful for logging or security purposes.
Este software provee mecanismos de seguridad a sistemas Linux. Entre ellos podemos citar ACL, control centralizado de seguridad, ocultación de procesos, módulos, etc...
Podemos usar programas externo como antivirus muy facilmente.
The purpose of on-line is to maintain servers 24/7 connected to the net. It will monitor your network connection and make sure its on-line (if not, it will bring it back). It is capable of syncing your IP (e.g: noip, dns2go). It has a notification system.
QuIDScor is a daemon software integrating Intrusion Detection Systems (IDS) and vulnerability assesment and management platforms.
Today QuIDScor correlates and verifies Snort alerts against QualysGuard vulnerability assessment data.
mod_stego is a module for the popular Apache Web Server. It steganograph a file or a message inside the html pages. If you want the message, you should use a a de-steganography software to take it out.
zssh (Zmodem SSH) is a program for interactively transferring
files to/from a remote machine while using the secure shell (ssh).
It is intended to be a convenient alternative to scp, avoiding
the need to re-authenticate each time a file is transferred.