With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Context for your AI agents
Crawl websites, sync to vector databases, and power RAG applications. Pre-built integrations for LLM pipelines and AI assistants.
Build data pipelines that feed your AI models and agents without managing infrastructure. Crawl any website, transform content, and push directly to your preferred vector store. Use 10,000+ tools for RAG applications, AI assistants, and real-time knowledge bases. Monitor site changes, trigger workflows on new data, and keep your AIs fed with fresh, structured information. Cloud-native, API-first, and free to start until you need to scale.
JChecksum allows you to obtain the hash of a given file using a simple GUI. Hash algorithms supported include MD2, MD5, SHA-1, SHA-256, SHA-384, and SHA-512.
The Crypthing project aims to develop cryptographic software for business, government and personal use within the context of Brazilian Public-Key Infrastructure.The first delivery is an application to sign documents for non-repudiation purposes.
This is a simple password manager for java enabled mobile phones. It is supposed to work with all MIDP1 compatible devices. It has been around for a long time and no comatibility problems have been reported in the last few years. FreeSafe uses a TwoFish
Axe Credit Portal - ACP- is axefinance’s future-proof AI-driven solution to digitalize the loan process from KYC to servicing, available as a locally hosted or cloud-based software.
Banks, lending institutions
Founded in 2004, axefinance is a global market-leading software provider focused on credit risk automation for lenders looking to provide an efficient, competitive, and seamless omnichannel financing journey for all client segments (FI, Retail, Commercial, and Corporate.)
This is a simple app, created around an original sudoku solver based only on heuristics, not brute force. It's coded in Java/SWT(GUI toolkit). It's an example of MVC and of Visitor, Observer, Strategy, Abstract Factory, Singleton Design Patterns.
The project consist in an open source implementation of the W3C Recommendation of the XML Key Management Specification 2.0 XKMS 2.0. It is compound of a XKMS Server and a Client API to access to the Server via Web Service.
An easy-to-use generator for large numbers of passwords.
Originally for my school's IT Department, I have now released the source code under the GNU GPL. It supports the random generation of huge numbers of passwords that can be determined in a variety of ways.
SJEA version 1.0 - SimpleJava Encryption Algorithm. SJEA is a simple command-line binary encryption algorithm (symmetric block cipher) written in JAVA. It uses a password and a byte-vector array to scramble the input file.
"HelloWorld goes mobile" is a decentralized social network for mobile phones running under Google Android. It is based on XML and different JAVA encryption technologies. The software-structure is based on the desktop-orientated project "HelloWorld".
Companies searching for an Employer of Record solution to mitigate risk and manage compliance, taxes, benefits, and payroll anywhere in the world
With G-P's industry-leading Employer of Record (EOR) and Contractor solutions, you can hire, onboard and manage teams in 180+ countries — quickly and compliantly — without setting up entities.
Project Sypher is a Java program that is intended to take a document and cipher the text, output the result in a new document and delete the original file.
The main purpose of this project is to develop a Graphic policy definition editor implemented in Java language and based on the XACML standard which manages access control policies
Console of administration WEB for clients with installed ClamWin. The objective of this project is to use an opensource software, and generate a comprehensive solution of Antivirus. The antivirus ClamWin was selected. The project is a Web interface for a
Safe all your passwords and encrypt them with a single password? Yawn. Synchronize your encrypted entries between different machines? Without compromising your security? Here comes SyncYourSecrets
This project has moved. Please see http://projects.darkaslight.com/ SAM is a near real-rime Snort alert monitor. SAM provides many ways to indicate that you may be experiencing an intrusion attempt on your network.
obov stands for OATH Based OTP validator. It's a 100% pure Java library that provides simple to use methods to validate (and related utilities) one time passwords generated by OATH compliant devices.
With this system, a person can ask a yes/no-question to group of people while their answer is kept completely anonymous. The project is based on the dining cryptographers protocol.
This is a fork of the JSch project (Java Secure Channel) which fixes bug 1849771 (infinite loop when password is incorrect). It is hoped that the JSch author will incorporate this fix into the official JSch project.
This programm is able to block your computer.
so other people are only able to access you computer if they know how to use the program and if they know your personal password.
The goal of this project is to create an expandable secure content store along the lines described by JSR 283 supporting an access model, which incorporates both discretionary and mandatory access controls.
ISB is a java-developed software for Education purpose only. The codename are TKBot and Guepard Project. This software will let you connect any computer to any IRC server and channel. Do not use this software if you don't have the permission of the comp
A simplejava library (1.5.* and higher versions) in order to crypt (or decrypt) a file using a password. The library accepts the following parameters: an input file, the operation to perform, and the user password.
XMLStore is a new project that cares about XML-based Databases Access with users Authentication and Authorization and more such as dead-lock accesses.
It will be soon introduced to other kind of databases such as SQL,...
This project can be used to manage plugins in JAVA applications the framework provides checking of electronic signatures as well as hooks for user interaction (for example when certs are found that are not issued from a trusted authority
This project provides a simpleJava-based steganography tool that can hide a message inside a 24-bit colour image so that knowing how it was embedded, or performing statistical analysis, does not make it any easier to find the concealed information.