With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Trumba is an All-in-one Calendar Management and Event Registration platform
Great for live, virtual and hybrid events
Publish, promote and track your events more affordably and effectively—all in one place.
Orizon is a framework intended to provide tools and facilities to test java sources for security flaws. The main goal is to detect common threats as described in Owasp top 10 vulnerability document.
fm (file masker) is an easy-to-use command line cryptographic tool that's small, portable across operating systems, quite secure for most purposes, and licensed to you along with its sourcecode under the gpl.
Netdeep Cop is a security network gateway. It features stateful packet filtering, proxies, content filtering, IDS/IPS and VPN. This project has been started with your code based in IPCop and Smoothwall project.
Award-Winning Medical Office Software Designed for Your Specialty
Succeed and scale your practice with cloud-based, data-backed, AI-powered healthcare software.
RXNT is an ambulatory healthcare technology pioneer that empowers medical practices and healthcare organizations to succeed and scale through innovative, data-backed, AI-powered software.
An easy-to-use generator for large numbers of passwords.
Originally for my school's IT Department, I have now released the sourcecode under the GNU GPL. It supports the random generation of huge numbers of passwords that can be determined in a variety of ways.
Powerfuzzer is a highly automated web fuzzer based on many other Open Source fuzzers available (incl. cfuzzer, fuzzled, fuzzer.pl, jbrofuzz, webscarab, wapiti, Socket Fuzzer). It can detect XSS, Injections (SQL, LDAP, commands, code, XPATH) and other
Portscan is a simple TCP port scanner (connect scan, similar to nmap -sC).
It is implemented with threads for better speed.
Please see the code and review it. Criticism is more than welcome.
Helps needed to make it robust.
The eXtensible Access Control Markup Language (XACML) allows for generic access control policies in XML format. pam_xacml provides XACML support for many existing pam enabled applications (no changes to the code required).
BogoSec is a utility that calculates sourcecode security quality metrics. A flexible framework interprets the results of existing scanners to compute these metrics. BogoSec is useful to track security quality across releases and competing packages.
Run applications fast and securely in a fully managed environment
Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.
Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
For system user to take backup of any confidential file(it may be code/important document)as it may contain content not meant for the others to view or the system may crash.We will be securing the backup of selected files at regular intervals of time.
Brute is a brute force hash cracker, it allows the user to specify how many threads he want running simultaneously. It is fast, and modular, all the hash algorithm dependent code lies in a module (a shared library). Modules available: MD5; SHA256; SHA512
The Memory Encryption and Transparent Aegis Library (METAL) functions as a shim library, allowing applications to transparently hide memory from rogue applications. It can be used with legacy applications without code modification.
PHPSandbox is a tool used to execute PHP code in a secure mode. You can specify which functions/classes are restricted or accessible to the code. This allows executing untrusted PHP code without worrying about security vulnerabilities.
The Secure Java Code Filter (SJCF) provides an ICAP-based filter mechanism for mobile Java code and the signatures applied to it. Administrators can define a centralized policy determining which applications and signatures respectively are allowed.
A Cryptography php module very easy to use, could be used to protect databases, files, ad hash codes in every server that support php. Nowdays the most used hash algoritms are weak and there are many huge database with the hash code and the relative pass
Libraries and tools written in .NET managed code (MS/mono) to interact with GRC's Perfect Paper Password system [https://www.grc.com/ppp.htm] Source moved to GitHub: http://github.com/ErebusBat/pppNET
Milk is a security sourcecode assessment tool using Orizon as API. Milk scans java and .NET source file in order to perform a security code review trying to point out safe coding best practices misuse.
Perl-based syslog watcher that matches certain login failures (SSH, FTP, POP3) and can dynamically block and email an alert, helping to monitor and manage hosting servers. NOTE: Although no recent updates, I'm still able/willing to update this code.
A toolkit of nitty-gritty classes from real-life projects. Contains generic snippets along with things like server-side DOM implementation or RSA or code generation tools.
Open2SA is the 2 Step Authenticator, a PIN ciphering, 2 Factor Authentication process using a Dynamic Grid Card. The authentication technique is simple and secure and the code required for the process is compact and easy to understand.
POLUS, a software maintenance tool capable of iteratively evolving running software into new versions, aims to retain backward binary compatibility, support for multithread software and recover already tainted state of running software with low overhead.
WorkingCode gives you what the name says working pieces of codes in Java. We are talking about code snippets and full utility apps for Java and J2me. It's use is intended as a library.
This software is a set of tools that hides C sourcecode in txt files. Also the software is able to restore the txt files to C sourcecode again. This work is based on the tool c2txt2c by Leevi Martilla. Csteg needs a book file in txt format to hide C so
Deobscufates .NET assemblies, primarily by rearranging IL code (basic block reordering) and removing junk.
Designed to be modular, it is built from reusable pieces.