With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
foosh is a Unix shell replacement for security conscious admins. Advanced keystroke logging, restrict commands to approved list with MD5 checksums, restrict interactive ssh logins, and lots more. If you need restricted access you need foosh!
The subject of this project is development of the Intrusion Detection System (IDS) with Artificial Neural Network (ANN). This model will allow the implementation of a system capable to analyze and to identify possible intrusions, based on the method of an
Encrypt-roller is a encryption/decryption package. The goal of the project is to incorporate multiple encryption schemes and mechanisms to provide security and validity for files being stored or transferred.
Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place.
For healthcare Providers and Facilities
Incredable streamlines and simplifies the complex process of medical credentialing for hospitals and medical facilities, helping you save valuable time, reduce costs, and minimize risks. With Incredable, you can effortlessly manage all your healthcare providers and their credentials within a single, unified platform. Our state-of-the-art technology ensures top-notch data security, giving you peace of mind.
Eselstall Secure Environment to Launch Software you don't Trust At aLL:
Combined chroot/setuid tool to easily launch background processes (servers) in a confined environment. Eliminates the need for su in the changeroot directory.
CPU is meant to be a swiss army knife for administrators who are currently using or wanting to use an LDAP backend for user authentication. This project allows for easy user administration of LDAP users and allows for user and group mods, deletes and add
Passes, while seemingly just another password generator, is actually the first 100% pure Cocoa open-source password generator (that I know of, at least). Passes strives to be the most flexible solution for generating passwords out there.
The modWASTE project is used by WASTE developers to experiment with modifications that may be added to the main WASTE source tree. These modifications are experiments for WASTE 2. modWASTE may eventually contain features not avalible in WASTE.
ThreatMan is an IDMEF compliant threat manager application which makes use of a multi-tier architecture.
It aims in event and vulnerability correlation from alerts sent by IDSs, firewalls and other IDMEF compliant applications.
Cloud data warehouse to power your data-driven innovation
BigQuery is a serverless and cost-effective enterprise data warehouse that works across clouds and scales with your data.
BigQuery Studio provides a single, unified interface for all data practitioners of various coding skills to simplify analytics workflows from data ingestion and preparation to data exploration and visualization to ML model creation and use. It also allows you to use simple SQL to access Vertex AI foundational models directly inside BigQuery for text processing tasks, such as sentiment analysis, entity extraction, and many more without having to deal with specialized models.
A "Theoretically Secure Operating System", focused on information protection, that is provably secure provided that a specific part of the kernel would be free of bugs.
In particular, bugs in application can't be exploited to attack the system.
The John Darm project aims at developping a software that can tests a brute force attack on weak UNIX passwords. It s a multi-client application that dispatches the calculations between the different clients.
A ultrafast lightweight (no GUI) encryption/decryption software using the CryptoAPI on Windows platform, to secure just about anything - regular files and directories, consoles, communication resources(COM ports), Disk devices, pipes and sockets anythin
xhelix: python C extension implementing Helix encryption and authentication.
Based on the article named "Helix: Fast Encryption and Authentication" by Niels Ferguson and Bruce Schneier, published in the Nov 2003 issue of Dr Dobbs Journal.
Extendable game server for a Linux Deathmatch. Basically, a Linux Deathmatch is a realtime hacking competition where several teams share a network and try to set up services, for which they get scores, and hack the other players.
This is a client/server project. Server part is store information about logins in SQL database. Client part it\'s NSS-module for glibc. Client integrates into any program, which use standard getpw.../getgr...
LavaRnd is a random number generator that converts a digitized chaotic source (such as a lens capped web camera) into cryptographically strong random numbers. LavaRnd comes with both an APIs (currently C and Perl) as well as a number of demos.
OceanStore is an architecture for a global-scale file system which uses erasure coding, cryptography, and Byzantine agreement to provide available, highly durable storage in a peer-to-peer environment.
sud is a daemon to execute interactive and non-interactive processes with special (and customizable) privileges in a nosuid environment
It is based on a client/server model and on the ability to pass file descriptors between processes.
sntm is a Qt based GUI snort monitor. Currently, it is capable of monitoring
multiple snort sensors in a centralized monitor screen. Each snort sensor
creates a SSL encrypted communication thread to connect to the moniter server.
AmritaVPN (amvpn) is an easy-to-use virtual private networking tool
that allows two private IP networks to be seamlessly connected
together through a public network such as the Internet. Uses SSL for strong encryption and authentication.
KAVClient is a C language interface to Kaspersky Antivirus Daemon (KAVDaemon), a part of Kaspersky Antivirus for Linux, a popular anti-virus software from Kaspersky Lab (www.kaspersky.com).