With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
Try free now
Bright Data - All in One Platform for Proxies and Web Scraping
Say goodbye to blocks, restrictions, and CAPTCHAs
Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
This project implements IPSec as NDIS Intermediate filter driver in Windows 2000. This IPSec driver appears as Virtual NIC to protocol drivers like TCP/IP driver. The network applications need not be aware of the existance of this IPSec driver
Shoki is a free, open source network intrusion detection system. The fundamental design goals are simplicity and modularity, and the focus is on traffic analysis rather than content inspection.
Kerberos Poppassd is a password changing daemon based upon poppassd version 1.8 by Pawel Krawczyk. The daemon works exactly like the original poppassd. The only difference being that this poppassd changes a users Kerberos 5 password.
WorkBright streamlines form collection to get your new team members on the job in a quick, compliant, and 100% remote process.
WorkBright is a cloud-based new hire onboarding solution that provides assistance for the processing and induction of new employees before their first day on the job. Simple and easy-to-use, this paperless digital onboarding platform enables new employees to upload photos of relevant documents, fill out their W4s, capture signatures electronically, and complete all paperwork from their tablets, laptops, or smartphones. With WorkBright, organizations can seamlessly eliminate manual data entry, streamline the form correction workflow efficiently, deliver automated reminders, and more.
The ktell utility is a user level daemon that monitors expiration time of Kerberos ticket granting tickets. It will send a warning to the user's least idle tty when a certain time is reached before the ticket will expire.
The checking interval and time
Encrypt-roller is a encryption/decryption package. The goal of the project is to incorporate multiple encryption schemes and mechanisms to provide security and validity for files being stored or transferred.
The modWASTE project is used by WASTE developers to experiment with modifications that may be added to the main WASTE source tree. These modifications are experiments for WASTE 2. modWASTE may eventually contain features not avalible in WASTE.
Passes, while seemingly just another password generator, is actually the first 100% pure Cocoa open-source password generator (that I know of, at least). Passes strives to be the most flexible solution for generating passwords out there.
KrakenD is a stateless, distributed, high-performance API Gateway that helps you effortlessly adopt microservices
KrakenD is a high-performance API Gateway optimized for resource efficiency, capable of managing 70,000 requests per second on a single instance. The stateless architecture allows for straightforward, linear scalability, eliminating the need for complex coordination or database maintenance.
The John Darm project aims at developping a software that can tests a brute force attack on weak UNIX passwords. It s a multi-client application that dispatches the calculations between the different clients.
xhelix: python C extension implementing Helix encryption and authentication.
Based on the article named "Helix: Fast Encryption and Authentication" by Niels Ferguson and Bruce Schneier, published in the Nov 2003 issue of Dr Dobbs Journal.
Bouncer en localhost o lan, que permite capturar el trafico hacia un determinado canal de irc, cifrandolo con Rijndael, Serpent o Twofish. Y mostrando una salida por el canal en base64. Ideal para paranoicos.
trafanal monitors your complete network offering realtime statistics who sends/recvs how much packets/bytes from whom
its a really good placed on a router, showing you who takes which bandwidth, and who made how much traffic
Bait and Switch combines IDS tech (Snort primarily) and Honeypots into a new, more valuable, reactive system. After receiving an alert, B&S protects your server by silently redirecting hostile traffic to a honeypot while leaving other traffic alone.
ExamLog is a Log analyzer, developed for syslog messages. It works on a Unix/Linux console, searching for user defined patterns. ExamLog, can divide and clasify syslog messages, and send them to a remote/local postgresql DataBase.
Gobbler: A tool to audit DHCP networks
Includes DHCP rogue server detection, DHCP DoS, distributed spoofed port scanner using DHCP to obtain many source IP addresses, mulitple arp scans, filtered port detection, spoofed OS detection (nmap + port 0)
A modular, flexible and extensible Identity and Access Management system for integrated login, access and profile management across disparate security domains. Supports Apache, PAM, Webcrossing, XMLRPC and SOAP from C, Perl, and Java with more to come.
The suid-ed wrapper which executes CGI scripts with owner rights.
It also cleans environment variables, modifies resources limits and drops Linux capabilities.
The goal of Operation Project X is to crack the 2048-bit RSA private encryption key Microsoft uses to sign Xbox media, by using distributed computing. This key could be used by Xbox owners to run homebrew code on their machines.
Sniffdet is an Open Source implementation of a set of tests for remote sniffers detection on TCP/IP network environments. It's composed of a flexible library (libsniffdet) and an application to run the tests.
QT based Linux web security tool that it is designed to test targets for weak passwords using crack, leech and URL testing functions. Plugins allow potentially any protocol (eg http, ftp) or server to be attacked, while remaining anonymous using proxys.