With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
Barada (Barada Aint Respecting Any Deceptive Adversaries) is a PAM module designed to provide two-factor authentication support. There is companion software called Gort which runs on Android devices, essentially turning your phone into a SecureID token.
The PAM module is available in the repositories for Debian based distributions.
Gort, the Android client, is available from the android market (https://play.google.com/store/apps/details?id=net.sf.crypt.gort)
Hippikon is a powerful authorization API that was developed for enterprise software applications and is now provided free under the GNU LGPL. Hippikon may be integrated in any java application or framework to provide complex security models with ease.
capturing packet and detecting intruders with their signature
Introduction:
This project has been developed to detecting intruder activity in your network according to the existing signature of intrusion attacks,Anomalous behaviour etc...
Scope:
Government authorities has lot of information about defence,revenue,income tax and many informations.
Intrusion Detection System will certainly minimize the unauthorized access and take immediate response to stop such illegal works.
MNCs manages their whole information system using application...
Ideal for lending professionals who are looking for a feature rich loan management system
Bryt Software is ideal for lending professionals who are looking for a feature rich loan management system that is intuitive and easy to use. We are 100% cloud-based, software as a service. We believe in providing our customers with fair and honest pricing. Our monthly fees are based on your number of users and we have a minimal implementation charge.
TRMSim-WSN (Trust and Reputation Models Simulator for Wireless Sensor Networks) is a Java-based simulator aimed to test Trust and Reputation models for WSNs. It provides several Trust and Reputation models and new ones can be easily added.
TCP/IP connectivity warpped in an API extended to provide the following major features: SSL Encryption, ZLIB compression, packet oriented mode rather stream oriented mode. Asynchrounous.
One liner to declare server or connect to server.
Spring Security (Acegi Security System for Spring) Samples used in the Book "Spring Security - Das Acegi Security System professionell einsetzen" from Mike Wiesner, entwickler.press
The Realeyes IDS captures and analyzes full sessions. The graphical user interface will display both halves of captured sessions to determine what occurred. The GUI also provides management of application users, sensors, and the database.
Award-Winning Medical Office Software Designed for Your Specialty
Succeed and scale your practice with cloud-based, data-backed, AI-powered healthcare software.
RXNT is an ambulatory healthcare technology pioneer that empowers medical practices and healthcare organizations to succeed and scale through innovative, data-backed, AI-powered software.
Software to balance a chemical equation (redox too)
Balacing a chemical equation using the Laplace's rule to solve a system of linear equations or using the brute-force method.
Khembalancer 2.5.5 received the "100% Free" award and that means Khembalancer does not contain any viruses, spyware, trojans and backdoors.
For more information see: http://www.softpedia.com/progClean/Khembalancer-Clean-207422.html
This is a JavaScript library which gives the ability to use cryptographic functionality abstracted of available technologies on the browser side. It executes a cryptographic function with the fastest technology including Java, JavaScript and Flash.
OpenSignX is a document and form signing Java applet for PKI X.509 certificates. It is based on www.openOCES.org and provides generation XAdES enveloping signature of one or multiple documents supporting PKCS#11 Java keystores.
CesTa (Code Enhancing Security Transformation and Analysis) is a tool for enhancing security by program transformations. Focused on Smart Cards (Java Card in particular), powered by Ant, ANTLR and StringTemplates.
Password strength testing Java API utilizes Java platform independence and threading mechanisms. Provides a way to conduct custom brute force and dictionary stregth tests.
Using encryption to secure your code or text. Click File->Run to run your code using Ruby, see the pop up for output. Never save your text or code to disk unencrypted. Don't forget your password. Encryption is error-persistent.
The PKI Framework (PKIF) is a cross-platform library for performing PKIX-compliant certificate processing. It includes support for SCVP, OCSP, CMS and Timestamps. It uses Windows CAPI, NSS or Crypto++ for cryptographic services and hardware support.
An acronym for cRoss-plAtform accesS control for Enterprise Applications. Rasea aims to become a reference in access control as a service based on the RBAC model.
A library help for signing data with PKCS11 token (certificates with SHA1withRSA Sign Algorithm) and create CMS packages.
It uses Bouncy Castle Crypto API and SUNPKCS11.
Also it verify the signed data and verify signing certificate's OCSP control.
Commons-SSH is a thin bridge between different Java SSH implementations libraries. It doesn't contain any crypto-related code and created to be used by projects who doesn't want to care about export control regulations (let client to decide)
Identity and service provisioning software component allows service developers to automate the creation, modification and deletion of users' identity and service subscription information on multiple disparate identity stores.
GenoGUARD is a DNA sequence screening software that implements the best match method recommended by the federal government to detect the presence of biosecurity threats in synthetic DNA orders.
VSL is free image steganography and steganalysis software in form of graphical block diagramming tool. It allows complex using, testing and adjusting different steganographic techniques and provides simple GUI along with modular, plug-in architecture