Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
Try Auth0 for Free
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Accord Odette is a Java framework for developing your own Odette OFTP2 client/server, respecting your needs of integration and functionalities. It comes with base client and server classes for TCP/IP and to bridge connections through X.25 and ISDN.
The continuation (aka fork) of the 0.5 Freenet opennet network. FCON allows anonymous, distributed, encrypted messaging and file transfers. This project aims to improve the overall usability and security of the Freenet 0.5 network.
ShredBitz is a free and simple file shredder tool that can wipe selected files from any hard disk drive. ShredBitz is written in the java programming language and uses a custom written algorithm for shredding.
ShredBitz is a very powerful tool.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
XML carver which can carve damaged or non-standard XML out of any file. It rebuilds the XML tree, along with giving the offsets for all the carved XML data. This tool was developed for the DFRWS 2010 Forensics Challenge.
This program aims at providing a java solution to hide secret information(such as secret file) to JPEG images. Hiding algorithm contains Jsteg and F5. The main(probably the toughest) stuff is encoding and decoding JFIF files.
Software solution for creation and verification of digitral signatures. Can replace tokens and smart cards with mobile phones. Components included are client and server. Can creates, verifiy and store content and signatures. Offers secure sharing.
A very simple file encryption tool. Release 1 is a text editor that saves encrypted files. Release 1.1 will include the ability to convert any file, even binary, to a GEF (Gulosh Encrypted File). Release 2.0 brings the strong encryption into play.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
SeCURePass password manager. A flexible, secure password manager for use in many situations, applicable for storing personal information. Integration with Firefox is available via an included extension.
This project contain chat server and chat client/admin that works on Windows/Unix.. This is a Free software. Developed by Osama Mohammad Oransa, 2009,contain 3 parts : Chat Server ,Admin and Chat Clients, Based on Java RMI, will support XMPP soon.
Java based webapp that utilizes TCP Wrappers to grant an IP access to a ssh server. Brute force attacks can be avoided while still allowing password based ssh access from multiple, changing IP values.
Backup P2P is a peer to peer application doing automated and secured backups inside a community (Jabber, XMPP). Each user shares some available space on his disk with others, to be able in return to remotely backup some of his own data.
Laika analyzes and reports on the interoperability capabilities of EHR systems. This includes the testing for certification of EHR software products and networks.
jKeePass ist ein Passwort Verwaltung Tool. Mit einigen iTAN bzw TAN features. jKeePass ist NICHT Binär kompatibel zu KeePass und speichert ein eigenes Format. Es hat einige Features daraus übernommen und ist ein Komplet neu in Java geschriebenes Tool.
Java based Portable hashing application capable of multiple individual file signatures or proprietary group signatures (1 signature for a folder and all its contents). GUI and command line in the same executable. -sha1 -sha256 -sha51 -md5 -crc32
This is a Hash Calculating tool that calculates MD2,MD5,SHA-1,SHA-256,SHA-384,SHA-512 hash of text or a file. This has GUI developed in java swings.All it needs is sun jre installed.
A Java Hijacking tool for web application session security assessment. A simple Java Fuzzer that can mainly be used for numeric session hijacking and parameter enumeration. Demonstration video is also available.
JChecksum allows you to obtain the hash of a given file using a simple GUI. Hash algorithms supported include MD2, MD5, SHA-1, SHA-256, SHA-384, and SHA-512.
Hiitch is a secure and advanced desktop social networking platform. It allows you to build a focused and private network of communities for your family, friends, company and etc. It gives you total control and freedom for your social networking needs.