With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
This is an implementation of a simple diameter client. It is meant as an example client for embedded devices, too small to use the opendiameter server.
Rise Vision is the #1 digital signage company, offering easy-to-use cloud digital signage software compatible with any player across multiple screens. Forget about static displays. Save time and boost sales with 500+ customizable content templates for your screens. If you ever need help, get free training and exceptionally fast support.
Citadel PRNG is a cryptographically secure pseudo random number generator (PRNG) based on the Fortuna PRNG by Schneier and Ferguson. The first implementation will be on FreeBSD.
Martus Solutions provides seamless budgeting, reporting, and forecasting tools that integrate with accounting systems for real-time financial insights
Martus' collaborative and easy-to-use budgeting and reporting platform will save you hundreds of hours each year. It's designed to make the entire budgeting process easier and create unlimited financial transparency.
PULSE provides the basis for, and a working example of, a modular,
dynamic and user-centric security environment for Linux. The Linux Security Modules interface provides mandatory enforcement of security policy, as specified by user-space components.
Smack is the the Simplified Mandatory Access Control Kernel.
Smack is a kernel based implementation of mandatory access
control that includes simplicity in its primary design goals.
A Simple Middlebox Configuration Protocol (RFC 4540) implementation for Linux.
SIMCO is a signaling protocol that can be used by applications (such as SIP B2BUAs) to dynamically control firewalls and Network Address Translators (NATs).
A dynamically loadable binary object for the linux security framework PAM.
Bluepam is an extension for the common pam modules, give the user the ability for authenticaten via a bluetooth compatible devices (e.g. cell phones).
ZID Windows Firewall is an opensource project started by usec.at with the goal to create a firewall that is as well useable by the average user as well as being extensible and technically powerful.
Wargame Hackademic est un ensemble de composants à ajouter sur un liveCD linux, devenant un wargame; à partir d'un compte classique, vous devez, par divers objectifs et techniques d'exploitation, trouver les failles du cd pour accéder au mode 'su'
Portable, optimised implementation of Bruce Schneier's 64-bit symmetric block cipher, Blowfish. Includes support for ECB, CBC, CFB, OFB and CTR block cipher modes, weak key detection and parallelisation using OpenMP.
Tool for controlling the M-Systems mDrive 500(formerly DiskOnKey) secure USB storage chip, as used in the Kingston DataTraveller Elite, Intuix S500 and similar devices.
Usb-Defensor is a cross-platform USB-Disk encrypt solution. It can be used to encrypt the whole USB-Disk. There is no different between common USB-Disk and encrypted(Usb-Defensor) USB-Disk in opterating.
Huskarl is an alternative authentication and key exchange schema for Bluetooth devices.Huskarl produces secure shared link keys between two devices using public key cryptography.
NetBox is a software programmed in C for testing vulnerabilities in the network. Using this software you can attack your network using a combination of differents known attacks (ARP or DNS Spoofing, MITM, ...) and detect bugs of security.
The program uses a number of processes to brute-force crack MD5 hashes.
MD5 brute-force cracking involves hashing all possible strings and each
time compare the obtained hash to the one we are trying to crack