Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.
Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
Sign Up Free
Go From AI Idea to AI App Fast
One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
AUTHd: Admission control daemon is a system aiming to provide authentication and authorisation services to other services. Uses the keynote trust managementsystem. It is accessible via IPC, network (OpenSSL support) and kernel-space.
A robust and reliable user management sub-system is critical to an enterprise application system. Esecurity is a web services-based user management component that provides services for user authentication, access control, user profile management etc.
Software for a van eck phreaking device. Please use to test security only.
<a href="http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci550525,00.html">Here</a>'s an explanation if you don't know what van eck phreaking is.
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
intra:Q is a content managementsystem designed for intranet use. The system is modular, and can provide an intranet site, content filtering, and replacements for standard browser widgets.
OSA::net project main goal is to create an extensible, scalable framework for management of security related devices in middle-sized and large computer networks.
Web Image Security combines some javascript, php, and htaccess techniques to make it extremely challenging for would-be image- or bandwidth-thieves from violating your image copyrights via bulk download, scripted download, or unethical hyper-linking.
OpenElection is a secure election managementsystem encompassing ballot creation/localization, voting terminal management, vote counting, and key management. Written using Java and Swing.
Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
Eliminate the mundain tasks & ease the use of basic http authentication in php. A lightweight php class that handles http authentication, & user mgmt tasks from flatfile or any SQL compliant db server.
QuIDScor is a daemon software integrating Intrusion Detection Systems (IDS) and vulnerability assesment and management platforms.
Today QuIDScor correlates and verifies Snort alerts against QualysGuard vulnerability assessment data.
A modular, flexible and extensible Identity and Access Managementsystem for integrated login, access and profile management across disparate security domains. Supports Apache, PAM, Webcrossing, XMLRPC and SOAP from C, Perl, and Java with more to come.
A Perl CGI JavaScript framework for implementing a MD5 based encryption Secure login on both client and server machines. The password is never stored or transmitted as plain text. Also encrypts cookies to maintain sessions.
php-backdoor all-in-one administration tool designed as a single phpscript for linux and windows os. features are: browse filesystem, download, upload, create dirs and run phpcode. this tool also can be used to test server security.
QT based Linux web security tool that it is designed to test targets for weak passwords using crack, leech and URL testing functions. Plugins allow potentially any protocol (eg http, ftp) or server to be attacked, while remaining anonymous using proxys.
Visual IP is a network protocol
analyzer that works in any operating system with a java VM. At the
moment it only allows you to examine data from the disk, and created
by tcpdump. You can interactively browse the capture data, viewing
summary and det
Java security module using JAAS with JDBC. A Pluggable Authentication Module (PAM) using database store user information. Contains implementation over Tocam Realm, JBoss JAAS. Sponsored by http://knowledgesurf.com.
Open Source Stenography engine usable from the command line. Uses various techniques for hiding and retriving stenographic information. Includes a small image analysis suite for detecting stenographic images.
NetDraw is a general purpose net mapper. It will map local network and display it graphically.
To achive this many techniques will be used from ICMP ping to raw sniffing.
The purpose of SNX is to have a modular series of components that report back to a central repository and 'AI' for pattern recognition and anomoly detection. This is to help with IDS systems, and to move to the next generation of security.
*PassGuard suite provides a series of application used to manage your numerous passwords in an encrypted file. Additionally, a C++ framework is provided to create password management applications. Plugins system managed different encryption methods.
Automated Computer Auditing Daemon - Keep a track of what's going on with your systems: suid, sgid, world writable, hidden and unowned files monitoring as well as important file's md5sums management audits sent to your mailbox on a regular basis.
grIDS is a managementsystem for Security Engineers. grIDS integrates snort as the IDS, nessus as the vulnerability scanner, a port reference, a host information database, and canned reports into a web-based managementsystem.