With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Find Hidden Risks in Windows Task Scheduler
Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.
Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
A Java Hijacking tool for web application session security assessment. A simpleJava Fuzzer that can mainly be used for numeric session hijacking and parameter enumeration. Demonstration video is also available.
JChecksum allows you to obtain the hash of a given file using a simple GUI. Hash algorithms supported include MD2, MD5, SHA-1, SHA-256, SHA-384, and SHA-512.
Hiitch is a secure and advanced desktop social networking platform. It allows you to build a focused and private network of communities for your family, friends, company and etc. It gives you total control and freedom for your social networking needs.
Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
The project consist in an open source implementation of the W3C Recommendation of the XML Key Management Specification 2.0 XKMS 2.0. It is compound of a XKMS Server and a Client API to access to the Server via Web Service.
This is a simple password manager for java enabled mobile phones. It is supposed to work with all MIDP1 compatible devices. It has been around for a long time and no comatibility problems have been reported in the last few years. FreeSafe uses a TwoFish
This is a simple app, created around an original sudoku solver based only on heuristics, not brute force. It's coded in Java/SWT(GUI toolkit). It's an example of MVC and of Visitor, Observer, Strategy, Abstract Factory, Singleton Design Patterns.
"HelloWorld goes mobile" is a decentralized social network for mobile phones running under Google Android. It is based on XML and different JAVA encryption technologies. The software-structure is based on the desktop-orientated project "HelloWorld".
An easy-to-use generator for large numbers of passwords.
Originally for my school's IT Department, I have now released the source code under the GNU GPL. It supports the random generation of huge numbers of passwords that can be determined in a variety of ways.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
SJEA version 1.0 - SimpleJava Encryption Algorithm. SJEA is a simple command-line binary encryption algorithm (symmetric block cipher) written in JAVA. It uses a password and a byte-vector array to scramble the input file.
The main purpose of this project is to develop a Graphic policy definition editor implemented in Java language and based on the XACML standard which manages access control policies
Project37 is a model-driven software application that uses an XML schema to generate security services which can be used to alter GUI forms or XML data sets.
Console of administration WEB for clients with installed ClamWin. The objective of this project is to use an opensource software, and generate a comprehensive solution of Antivirus. The antivirus ClamWin was selected. The project is a Web interface for a
Safe all your passwords and encrypt them with a single password? Yawn. Synchronize your encrypted entries between different machines? Without compromising your security? Here comes SyncYourSecrets
obov stands for OATH Based OTP validator. It's a 100% pure Java library that provides simple to use methods to validate (and related utilities) one time passwords generated by OATH compliant devices.
ToolME provides J2ME mobile application developers with a set of API utilities (tools) that aim to solve many of the common problems a J2ME developer will face when developing mobile software.
jCryptPad stores text informationen hierarchical, e.g. passwords, important texts etc. The data is saved in a encrypted xml file. Encryption is done with the AES algorithm. Additionally a password generator and a text encryption editor is also included.
XMLStore is a new project that cares about XML-based Databases Access with users Authentication and Authorization and more such as dead-lock accesses.
It will be soon introduced to other kind of databases such as SQL,...
A simplejava library (1.5.* and higher versions) in order to crypt (or decrypt) a file using a password. The library accepts the following parameters: an input file, the operation to perform, and the user password.
This project provides a simpleJava-based steganography tool that can hide a message inside a 24-bit colour image so that knowing how it was embedded, or performing statistical analysis, does not make it any easier to find the concealed information.
This application is meant for those end users, who wish to quickly learn how to use XACML based systems. It provides the user to create and load XACML policies, and then analyze the XACML response in a separate window.
Watermill is a watermarking and fingerprinting software written in Java. It consists of a generic watermarking library which is used by other libraries to watermark relational databases (Postgresql,MySQL), XML Dbs (Xindice) and Web Services. WARNING:
Sting is a simple, host-based approach to detecting arp cache poisoning based man in the middle attacks (such as made by ettercap) on your LAN. It uses SNMP to periodically query the arp cache of your router and make sure its entry for you is correct.
JSerpent is an easy to use Java implementation of the powerful Serpent cryptography algorithm. It can be easily implemented into any project, and is complete with ECB, padding, and a simple API.