With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
VSL is free image steganography and steganalysis software in form of graphical block diagramming tool. It allows complex using, testing and adjusting different steganographic techniques and provides simple GUI along with modular, plug-in architecture
This project provides a java implementation of the Captcha project ( see http://www.captcha.net ). A CAPTCHA is a program that can generate and grade tests that: -Most humans can pass. -Current computer programs can't pass.
Fight skyrocketing paid media costs by turning your customers into a primary vehicle for acquisition, awareness, and activation with Extole.
The platform's advanced capabilities ensure companies get the most out of their referral programs. Leverage custom events, profiles, and attributes to enable dynamic, audience-specific referral experiences. Use first-party data to tailor customer segment messaging, rewards, and engagement strategies. Use our flexible APIs to build management capabilities and consumer experiences–headlessly or hybrid. We have all the tools you need to build scalable, secure, and high-performing referral programs.
The Open Protocol for Access Control Identification and Ticketing with privacY, is a standard suite of Key Establishment and Authentication protocols based on ECC and AES, for optimized contactless transactions and simple PKI based Key management.
The project Jaulp is jet another utility library project written in Java. It contains utility classes for Date ,Calendar, Collections, Resources, Files, IO for Random data, and many more. This is the last version for this project.
A simple access control app that intends to replace declarative jaas security in web.xml for web applications deployed on Jboss app server and TOMCAT container. Also include an extension for PHP applications.
DAT Freight and Analytics operates DAT One truckload freight marketplace
DAT Freight & Analytics operates DAT One, North America’s largest truckload freight marketplace; DAT iQ, the industry’s leading freight data analytics service; and Trucker Tools, the leader in load visibility. Shippers, transportation brokers, carriers, news organizations, and industry analysts rely on DAT for market trends and data insights, informed by nearly 700,000 daily load posts and a database exceeding $1 trillion in freight market transactions. Founded in 1978, DAT is a business unit of Roper Technologies (Nasdaq: ROP), a constituent of the Nasdaq 100, S&P 500, and Fortune 1000. Headquartered in Beaverton, Ore., DAT continues to set the standard for innovation in the trucking and logistics industry.
Simple UI to test the effectiveness of a heuristic algorithm against the brute force method for path finding among an arbitrary number of arbitrarily placed points on a grid. This is an educational project, don't expect new and better methods.
raw2vmdk is an OS independent Java utility that allows you to mount raw disk images, like images created by "dd", using VMware, VirtualBox or any other virtualization platform supporting the VMDK disk format.
ShredBitz is a free and simple file shredder tool that can wipe selected files from any hard disk drive. ShredBitz is written in the java programming language and uses a custom written algorithm for shredding.
ShredBitz is a very powerful tool.
Kotak is just another cracking tool which is based on Java. It is used to crack various types of hash functions with various types of attacks. It's developed to be as simple as possible, so that anyone can use this tool easily.
This simple Java applet will use a few URL obfuscation methods to mask a URL. This isn't meant to be anything earth shattering, but maybe useful. It does more than basic URL encoding (although it does that). Also contains a library to do it all.
A very simple file encryption tool. Release 1 is a text editor that saves encrypted files. Release 1.1 will include the ability to convert any file, even binary, to a GEF (Gulosh Encrypted File). Release 2.0 brings the strong encryption into play.
URL Signer is a simple utility that uses signs a URL which can then be transmitted in plaintext and validated by the recipient. See project documentation for a detailed description.
This tool encrypts text using polyalphabetic codetables, like the encryption systems in the middle ages. It can be used for simple text encryption with a small password or as a One-Time-Pad with a random codetable for 100% secure text encryption.
A Java Hijacking tool for web application session security assessment. A simple Java Fuzzer that can mainly be used for numeric session hijacking and parameter enumeration. Demonstration video is also available.
JChecksum allows you to obtain the hash of a given file using a simple GUI. Hash algorithms supported include MD2, MD5, SHA-1, SHA-256, SHA-384, and SHA-512.
This is a simple password manager for java enabled mobile phones. It is supposed to work with all MIDP1 compatible devices. It has been around for a long time and no comatibility problems have been reported in the last few years. FreeSafe uses a TwoFish
This is a simple app, created around an original sudoku solver based only on heuristics, not brute force. It's coded in Java/SWT(GUI toolkit). It's an example of MVC and of Visitor, Observer, Strategy, Abstract Factory, Singleton Design Patterns.
An easy-to-use generator for large numbers of passwords.
Originally for my school's IT Department, I have now released the source code under the GNU GPL. It supports the random generation of huge numbers of passwords that can be determined in a variety of ways.