With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
Yet another alarms program with features as file modification alarm (maybe useful for security auditories), alarms file saving possibility and of course time and date alarms. This time written in java.
A Java-based client-server architecture for processing network intrusion detection data. The server receives XML alerts from Snort sensors buffers them for review by clients. The console provides a real-time view of IDS activity.
VPNmonitor is a Java tool for network administrators to monitor VPN and SSL connections. The graphical representation makes it easy to visualize messages between computer nodes. Users can also read messages not of the above types in plain text.
OceanStore is an architecture for a global-scale file system which uses erasure coding, cryptography, and Byzantine agreement to provide available, highly durable storage in a peer-to-peer environment.
Total Network Visibility for Network Engineers and IT Managers
Network monitoring and troubleshooting is hard. TotalView makes it easy.
This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
External library for the Apache project Axis implementing UsernameToken spec from the working draft Web Services Security Username Token Profile ver1.1(Sunday, 26 Janurary 2003)
MetaCoretex security scanner is an extreemely modular plugin based security scanner written entirely in JAVA to allow the use of JDBC Type IV drivers when scanning databases. Initially, most plugins will likely be for DBs.
Generic clustering/load-balancing platform (over a LAN or internet) using java based P2P Aorta workers that execute java "tasklets". Various tasklets can be implemented to solve fractals, process images, render webpages, crack RSA "brute force".
<b>IVJ MUD (Masive Multiplayer Text Game) is a SSL-based soft:<br>-Client (GUI)<br>-Server (GUI)<br>-Applet (GUI)<br>-Protocol (SSL-based, use of localization files that store strings to reduce trafic and allow for instant i18n.<br>
LOOKING FOR HELP!</b
Fight skyrocketing paid media costs by turning your customers into a primary vehicle for acquisition, awareness, and activation with Extole.
The platform's advanced capabilities ensure companies get the most out of their referral programs. Leverage custom events, profiles, and attributes to enable dynamic, audience-specific referral experiences. Use first-party data to tailor customer segment messaging, rewards, and engagement strategies. Use our flexible APIs to build management capabilities and consumer experiences–headlessly or hybrid. We have all the tools you need to build scalable, secure, and high-performing referral programs.
A modular, flexible and extensible Identity and Access Management system for integrated login, access and profile management across disparate security domains. Supports Apache, PAM, Webcrossing, XMLRPC and SOAP from C, Perl, and Java with more to come.
Password generator. The user can choice the characters, write the results in text file, make pronunceable passwords, choice the number of digits and codes. Visual version made in Java and non-visual version in C. Great performance.
The MuPPIT is cross-platform, opensource Multi-Purpose Peons Internet Toolkit written in Java and C++, providing a collection of new, useful applications for the average internet user.
A security framework for providing AAA functionality for Avalon based applications.
The pluggable architecture for underlying datastores and Authentication, Authorization and Auditing Managers provides a flexible, extensible framework.
The aim of this project is to create a set of basic java tools for
developers who need Certificate Authority (CA) root
certificates and user certificates signed by the CA.
A web proxy that provides Single Sign-On (SSO) into websites in a manner that protects your passwords and other sensitive information from untrusted network access devices.
Simple Encoder/Decoder, written in the .net framework.
It is basicly an encryption program which supports serveral encryption methods.
It can encode or decode texts in the forms of files or just plain text written directly in the program.
Sanctum allows you to run virtual servers on your computer so you can test the security of software by actually breaking into it. Developers just create a virtual server image and let hackers download it and try their hardest to find exploits.
An alternative Identification system that is a replacement for Microsoft's Passport and the Liberty Alliance. Its a simple architecture that is setup so anyone can run a server and thereby have control over their online identification.
Visual IP is a network protocol
analyzer that works in any operating system with a java VM. At the
moment it only allows you to examine data from the disk, and created
by tcpdump. You can interactively browse the capture data, viewing
summary and det
Java class file encryption. Class Encrypt is a program that can encrypt a developer's class files and package them into an executable jar file for deployment. The program uses modules for implementing different encryptions.