With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
A tight python crypto module implementing only the latest and greatest: Rijndael (AES) symmetric cipher in 128, 192 and 256 bits supporting password encryption, SHA 256 and several CSPRNG schemes in pure python.
a *simple* libpcap program that dumps network packets in a variety of formats. If you are a programmer, this is a good starting point for you to build your own programs.
[NOTE: In the CVS repository there is a version with *alot* of features added]
This is a project that simulates the German Military Enigma machine during WWII.. It is a project for beginers to learn to program and to meet people. If anyone is interested in helping, please email me @ dustin@rockhill.org
Inventors: Validate Your Idea, Protect It and Gain Market Advantages
SenseIP is ideal for individual inventors, startups, and businesses
senseIP is an AI innovation platform for inventors, automating any aspect of IP from the moment you have an idea. You can have it researched for uniqueness and protected; quickly and effortlessly, without expensive attorneys. Built for business success while securing your competitive edge.
The paarpd provides ARP services for "Classical IP and ARP over ATM" networks (RFC1577, RFC2225) according to an administratively defined policy to provide a more secure and reliable service while still being RFC compliant.
checkps is a program to detect rootkits by detecting falsified output and
similar anolomies. The ps check should work on anything with /proc, the
(currently incomplete) netstat check is more linux specific
BFBTester is great for doing quick, proactive, security checks of binary programs. BFBTester will perform checks of single and multiple argument command line overflows and environment variable overflows. Versions 2.0-BETA and higher can also watch for tem
Moses is a remote administration tool for the Win32 platform. No client is needed. The server connects to an IRC server, in which commands are given via private messages. There is basic password authentication, but it needs to be worked on. Download t
Say goodbye to broken revenue funnels and poor customer experiences
Connect and coordinate your data, signals, tools, and people at every step of the customer journey.
LeanData is a Demand Management solution that supports all go-to-market strategies such as account-based sales development, geo-based territories, and more. LeanData features a visual, intuitive workflow native to Salesforce that enables users to view their entire lead flow in one interface. LeanData allows users to access the drag-and-drop feature to route their leads. LeanData also features an algorithms match that uses multiple fields in Salesforce.
The purpose of this project is to develop and maintain a Virtual Reality network interface to provide for network management and security for heterogenous networks of all types.
This interface will allow you to monitor and actively scan your network.
An API and test suite, or possibly an application unto itself, to manage keys and allow mail user agents (such as pine or mutt) to use encryption and authentication systems (such as S/MIME) via the services of external encryption suites (such as OpenSSL)
sectar: a program that creates encrypted tape archives(tar files), using the AES algorithm Rijndael. Encryption exported under exemption TSU 740.13.
Was star, now sectar.
This is a small, simpleIdentd server for windows platforms. It runs on win 95,98,2000 and NT without changes.
The current relese is geared for Novell networks in that it expects the novell client to be available and will return the user context when aske
Immune Security Architecture For your Enterprise --
Host-Based Intrusion detection for UNIX based systems, at the process level.
Detect changes in the normal behavior of processes, advanced features to detect Buffer Overflows.
VoiceGuard is a Win32 application that listens to what a speakers speaks into his/her mic and decides whether he/she is an authorised user or not. The system must have a sound card installed.
iSSL is a minimalistic cryptographical API that uses the ciphers RSA and AES to establish SSL-alike, secure encrypted
communications between two peers communicating through a network socket, including session key generation and public key exchange.
Dave's Naughty Stuff Blocker. This is an opensource solution to allow administrators to filter and redirect selected "inappropriate" sites based on a list of specific sites and/or strings.
This is an add on for the Linux Kernel Patch named Medusa DS9 developed by Marek Zelem, Milan Pikula, and Martin Ockajak. This program will activate and deactivate medusa protections securely. Medusa is at http://medusa.fornax.sk/
kkp is a security tool based on a vulnerability in handling of the NetBIOS protocol by the Microsoft Windows 9x platform. It is meant to be the most reliable and efficient tool for this use. It has been tested on POSIX, and might work under Win32.
Linids is a modular, highly configurable, network IDS.
Almost stateful and soon to be able to connect to a management server (different agents).
Linids is rulebased (passive filters) and has active filters (portscan detection etc).
SMSID provides a Linux PAM that allows the use of a GSM cellular phone with SMS capabilities as a hardware token in a strong authentication system.
In addition to the Linux PAM module, an extensible SMS server is included. This server is written in Java