With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Cloud tools for web scraping and data extraction
Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.
Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
A robust and reliable user management sub-system is critical to an enterprise application system. Esecurity is a web services-based user management component that provides services for user authentication, access control, user profile management etc.
Provides efficient, effective implementations of 32- and 64-bit hash functions based on Rabin fingerprints / irreducible polynomials, in Java. Also provides integration with java.security.MessageDigest API.
Execution monitor for Java Applications.<br/>
BERSERK implements the Intercepting Filter design pattern. <br/>
Allows composing and runtime editing of execution flow and intercept services with access control, logging or any user-defined filters.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
J2MESafe is an end-user Java application that stores sensitive information like passwords on mobile phones with strong encryption. Requires Java Micro Edition (J2ME) with MIDP-1.0, which is available on most current mobile phones.
A full-featured, Java-based back-office suite specifically designed for use in global financial institutions to facilitate straight-through-processing and other much-needed operational efficiencies. Built using best-of-breed, open-source technologies.
This library extends SUN's JavaMail API by an PGPMime framework. It acts as a middleware layer between a cryptography provider like GnuPG or Cryptix OpenPGP Provider and JavaMail.
A distributed Java implementation of the VISA 3-D Secure(tm) Merchant Server Plug-in (MPI) that allows e-commerce web site to perform payment authentication operations for Internet purchases.
Yet another alarms program with features as file modification alarm (maybe useful for security auditories), alarms file saving possibility and of course time and date alarms. This time written in java.
Password generator. The user can choice the characters, write the results in text file, make pronunceable passwords, choice the number of digits and codes. Visual version made in Java and non-visual version in C. Great performance.
Java class file encryption. Class Encrypt is a program that can encrypt a developer's class files and package them into an executable jar file for deployment. The program uses modules for implementing different encryptions.
JVerify is a Java app that enables you to monitor for changes in any file on your Unix system, most notably executable binaries, thus alerting you to a possibly backdoored binary. It runs on any platform that supports JSDK 1.4.x and has a MySQL database
The Secure Remote Log Monitor (SRLM) project provides client and server
utilities that collect application or system log files from multiple systems over an untrusted network onto a central server for analysis and action.
Manage sources of video (i.e., from a security camera), recording clips where motion has been detected, and allowing those clips to be replayed.
Variable lead-in/out time, motion detection, logging.
A similar to Tripwire, file system integrity checking tool but develop in java and cross platform.
This tools checking and source control using check sum algorithm like MD5, SHA and CRC.
A Java library for validation of credit cards. Implements the Luhn Algorithm to ensure the card number is well formed, checks card type prefix's and length. The rules are stored in a text file allowing new cards to be added without changing the source