With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
If you are forgetful and want to store all of your personal data securely on your PC without internet connection then SafePassDB is definitely for you!
SafePassDB is a free multi-platform software application written in Java programming language that will enable you to protect all of your personal data with one "Master Password" using AES (Advanced Encryption Standard).
SafePassDB is light weight and super easy to use!
Current version of the software uses 128 bit AES (Advanced...
Client exploit for openssl heartbleed bug written in Java
...JavaHeartBleed <host> <port>
Example,
java -cp "." JavaHeartBleed localhost 443.
You are free to distribute and modify the program as per your requirement. For queries/feedback, feel free to drop an e-mail to: saurabhsule82@yahoo.co.in.
A simple example of polyalphabetic cipher in Java.
...This is a Java program to implement polyalphabetic cipher.
[How the cipher encodes?]
Input Data: helloaf
Key: love
l - 12th letter in Alphabet
o - 15th letter in Alphabet
v - 22nd letter in Alphabet
e - 5th letter in Alphabet
Now:
h(l) e(o) l(v) l(e) o(l) a(o) f(v)
Further:
h(+12) e(+15) l(+22) l(+5) o(+12) a(+15) f(+22)
where +(number) meaning shifting the character forward by the respective number of places.
So the result comes out to be:
tthqapb
and the data is encrypted.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
JPAM is a Java PAM bridge. PAM, or Pluggable Authentication Modules, is a standard security architecture used Unix, Linux and Mac OS X systems.
JPAM permists the use of PAM authentication services to Java applications running on those platforms.
Extendable and flexible e-Discovery tool designed to identify information on a file system, databases and within files (such as Zip, Jar, Outlook Personal Folders, Open Document and Office Open XML).
eMayor provides process and applications that enable the cheap, secure and sustainable realization of standard e-government services, everything from processing a change of personal information to issuing certificates or licenses.
iBox is a powerful information management tools for Android, which gives you a safe and secure way to store all of your critical information. It could be credit card numbers, accounts, passwords, marketing plans, product ideas, minutes and much more.
RivuES is an open source enterprise search server based on the Lucene And Solr,
Like Solr, RivuES support XML/HTTP and JSON APIs, hit highlighting, faceted search,
caching, replication. It runs in a Java servlet container such as Tomcat,In addition,
RivuES provide a visual management and control web UI, most of the functions of Solr
can be managed through WEB UI, Data source supported including MS office,XML,TXT,Html,
database of Mysql and Access.(In our comercial version,40+ file...
raw2vmdk is an OS independent Java utility that allows you to mount raw disk images, like images created by "dd", using VMware, VirtualBox or any other virtualization platform supporting the VMDK disk format.
yaSSL, or yet another SSL, is an embedded ssl library for programmers building security functionality into their applications and devices. yaSSL is highly portable, and runs on standard as well as embedded platforms(QNX, ThreadX, VxWorks, Tron)
yaSSL is still available but no longer being developed. Current development on the same project continues under wolfSSL. Visit yaSSL Home above for the latest stable release.
Q Disassembler is a flexible disassembly engine that aims to provide precise information about machine instructions while maintaining OS-independence and performance.
Inserendo una password abbastanza lunga risulta praticamente impossibile riuscire a indovinarla. Creando password non pronunciabili e quindi completamente random, ci si mette al sicuro attacchi di tipo dizionario.
E' una versione per Java Mobile.J2me
A very powerful and secure encryption supporting multilevel algorithm hierarchy encryption(bit level),supports infinite length keys and equation creation utility(secondary key) for the utmost security.Support for multiple algorithms.All OS support(ja
Maymuncuk, ensures to save your passwords.It contains four different functions to save your different type passwords.They're Membership,E-Mail,FTP and other types. Maymuncuk, has multiuser support.
MicroSafe is a J2ME 1.0 application to store and access notes in a hierarchical data structure (outline) on mobile devices (CLDC - Connected Limited Device Configuration). Notes can be encrypted to store data like PINs, passwords, etc. securely.
Securing mails without involving user. Secures them as often as possible if it is possible. Shows security-state and process of mails and mail-partners.
An electronic votingsystem – Verifiable E-Voting (VEV) – with underlying protocol to help secure the election process from malicious practices at the same time as allowing voters and candidates to verify the correctness of their votes.
Uberviewer is a java/swt log processor for Uberlogger (a kernel-based observatory). It allows real-time analysis of a remote OS, including process and I/O monitoring.
This tool is intended to be helpful for security researchers and malware analysts.