With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
Try free now
The #1 Embedded Analytics Solution for SaaS Teams.
Qrvey saves engineering teams time and money with a turnkey multi-tenant solution connecting your data warehouse to your SaaS application.
Qrvey’s comprehensive embedded analytics software enables you to design more customizable analytics experiences for your end users.
This software is a set of tools that hides C source code in txt files. Also the software is able to restore the txt files to C source code again. This work is based on the tool c2txt2c by Leevi Martilla. Csteg needs a book file in txt format to hide C so
Deobscufates .NET assemblies, primarily by rearranging IL code (basic block reordering) and removing junk.
Designed to be modular, it is built from reusable pieces.
The ELF-Encrypter program suite is a collection of programs to encrypt your ELF binaries using various algorithms. GnuPG is required in order to use some encryption techniques.
The suite also contains programs to inject code into ELF binaries.
Polydish is a polymorphic Internet server capable of accepting pluggable protocols (written in Python or Ruby), and can thereby serve any type of content imaginable. The backend code is a fast, secure, C-based server, employing thread pools and OpenSSL.
216,000+ customers in over 135 countries grow their businesses with HubSpot
Think CRM software is just about contact management? Think again. HubSpot CRM has free tools for everyone on your team, and it’s 100% free. Here’s how our free CRM solution makes your job easier.
Dark/sk sources are kernel patchset projects created by predatorfreak (Brett G.), focused on maintaining stablity and scalabliy. Everything that goes into these patchsets is selected based on these goals.
Gate Guardian is a library of C/C++ functions that can be used to avoid common security problems when a process forks or is forked from a parent process, or runs / is run by an external program. The code is meant to be portable across many UNIX variants.
siggen is a cool email signature generator for encrypted ansi c (confused), brainf*ck, ... signatures. Use it in combination with vi(m), emacs, mutt, pine, or what ever. (tested on Solaris, Linux and Windoze). Optimized only for geeks :-)
A user-space solution for configurably disabling the ability of a process to access the internet. It is especially useful for foiling code that is suspected of containing spyware.
Trusted by nearly 20,000 customers worldwide, and all major cloud providers.
OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
The goal of Operation Project X is to crack the 2048-bit RSA private encryption key Microsoft uses to sign Xbox media, by using distributed computing. This key could be used by Xbox owners to run homebrew code on their machines.
The sandbox system call API is a simple yet powerful mechanism for
confining untrusted code. It is similar to chroot() and BSD jails, but has
much greater flexibility and expressive power. The code is mostly complete
but not yet fully functional.
Protowatch is a userspace extension to Linux\'s 2.4 iptables firewalling code. Userspace will dynamically start a server to accept the packet, and log whatever the client sends. Useful for discovering what protocols are in use.
Libike is a cross-platform C library for managing IKE negotiations.The library implements RFC-standard ISAKMP/IKE exchanges and utilizes callbacks to delegate tasks of the packet transmission and security policies management to the external code.
bcrypt is a lightweight blowfish file encryption utility which aims for cross-platform portability of not only the actual code, but the encrypted files as well. In addition to providing 448-bit encryption, bcrypt overwrites input files with random garbage
ISO 17799 - Code of practice for information security management. Creation of methodology and documentation for audit adapted to ISO. One is made up of an introduction on general aspects of the security of the information.
....
====>Due to the age of the code, the cryptography should not be used in any new products.<====
This repository may be deleted on or after June 30, 2020.
CDSA is a security middleware specification and reference implementation that is open source, cross-platform, interoperable, extensible, and freely exportable
Makes it easier to build a Linux system where the whole hard drive is encrypted (except for the MBR), and where the system must be booted from a USB memory stick which holds slightly customized boot code and the passphrase-protected keys.