With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
AI-First Supply Chain Management
Supply chain managers, executives, and businesses seeking AI-powered solutions to optimize planning, operations, and decision-making across the supply
Logility is a market-leading provider of AI-first supply chain management solutions engineered to help organizations build sustainable digital supply chains that improve people’s lives and the world we live in. The company’s approach is designed to reimagine supply chain planning by shifting away from traditional “what happened” processes to an AI-driven strategy that combines the power of humans and machines to predict and be ready for what’s coming. Logility’s fully integrated, end-to-end platform helps clients know faster, turn uncertainty into opportunity, and transform the supply chain from a cost center to an engine for growth.
With this system, a person can ask a yes/no-question to group of people while their answer is kept completely anonymous. The project is based on the dining cryptographers protocol.
Mock in the Middle is a JavaProxy designed for testing network applications. It serves as a mock proxy between a client and a server. By recording and replaying network conversations, the client can later be tested without a live server.
With SIP Proxy you will have the opportunity to eavesdrop and manipulate SIP traffic. Furthermore, predefined security test cases can be executed to find weak spots in VoIP devices. Security analysts can add and execute custom test cases.
Privale is a p2p network following the form of onion routing/mixmaster networks. But, it is an anonymous publish and retrieval medium, not a proxy system. Privale attempts to defend against denial of service attacks, Sybil attacks, and traffic analysis
A fast contractual framework based Monitoring agent for Java with extended support for temporal operators and customizable agents for JVMTI, Javassist and Dynamic Proxy APIs.
A Java based HTTP/HTTPS proxy for assessing web application vulnerability. It supports editing/viewing HTTP messages on-the-fly. Other featuers include spiders, client certificate, proxy-chaining, intelligent scanning for XSS and SQL injections etc.
RevolvingProxy is a cross platform HTTP Proxy application that is designed to be installed on a server that has been assigned multiple IP addresses. Each connecting client is assigned a different IP address for security testing or other purposes.
aamFetch is a utility for fetching your anonymous esub nym messages from the alt.anonymous.messages newsgroup (or other newsgroups). It allows multiple encrypt-subjects to scan, multiple "destination files" to save messages to and random chaff downloads.
The Most Powerful Software Platform for EHSQ and ESG Management
Addresses the needs of small businesses and large global organizations with thousands of users in multiple locations.
Choose from a complete set of software solutions across EHSQ that address all aspects of top performing Environmental, Health and Safety, and Quality management programs.
J2EP is a reverse proxy running on a J2EE engine. The proxy is written in java and was originally designed with Tomcat in mind, but any engine should work fine. A set of basic mapping rules are included but they can easily be extended to your own needs.
WebScarab for Eclipse is an extensible framework for analyzing applications that communicate using the HTTP protocol. It includes an HTTP monitor and an HTTP proxy for recording all messages between your machine and remote servers.
Anonycat is web-based software that allows you to surf the web anonymously and bypass overly restrictive corporate firewalls or monitoring/blocking software. It can be used online (http://anonycat.com), or run as a service on your own webserver.
CarrierPigeon enables intelligent, transparent and secure usage of data sources across networked sites. The underlying, distributed Java-framework is built on the concept of proxy drivers to provide a real VPN experience.
GPP is a General Purpose ProxyJava graphical application intended mainly for packet inspection and modification. It's main idea is to be a little user-friendly portable man-in-the-middle tool for security analysis. Later, some protocols should be added
MyProxyGUI is a new Java Applet/Standalone solution to remotely delegate a X.509 Proxy Certificate on a trust MyProxy Server. The Applet integrates with Grid Portal while the Standalone integrates with standard Globus User Interface. It's only needs JRE.
Enables a user to view & alter
all aspects of comunications with a web site via a proxy. Primarily used for security
based penetration testing of web sites, it can also be used for
debugging during development. Seen as part of a hacker toolkit.
SocketSwitchboard is a virtual proxy, router, or VPN. It uses an XML configuration to map incoming traffic on one or more ports to designated hosts and ports on the LAN or on the Internet. It supports complex boolean access restrictions and SSL.
A web proxy that provides Single Sign-On (SSO) into websites in a manner that protects your passwords and other sensitive information from untrusted network access devices.
jRevProxy is a lightweight reverse proxy server fully written in Java. jRevProxy accepts HTTP and HTTPS requests and translates these into new requests based on a set of rules. HTTPS with client side authentication (X509 certificates) is supported.
Freemail enables secure, anonymous, two-party communication over
Freenet. The use of flexible channel initiation protocols and secure message transport allows allows cultivation of anonymous identities with reliable reputations.
Next generation reverse proxy : provides authentication and authorization services for all incoming HTTP traffic, in addition to offering transparent web SSO to protected applications.
Team MONICA's effort:
- general JAVA environment
- general JAVA cryptography environment
- SSH client/server in JAVA
- secure & anonymous communication
The K Network will provide a network infrastructure for encrypted anonymous distibuted communication. Distributed chat will be the first application. Goals are anonymity for both sender and receiver, no central point of failure, and scalability.