With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Streamline Hiring with Skill Assessments
Say goodbye to hiring guesswork. Use Canditech’s job simulation tests to assess real-world skills and make data-driven decisions.
Canditech offers innovative, cheat-proof skill assessments and job simulations to transform your hiring process. From technical skills to soft skills, we help you assess candidates on actual job performance. With over 500 customizable tests and powerful video interview features, you can evaluate real-world capabilities, streamline your hiring, and reduce biases. Whether you’re hiring for remote roles, mass hiring, or looking to expand your diversity pool, Canditech’s data-driven platform ensures the right candidates are chosen for the job every time.
The ELF-Encrypter program suite is a collection of programs to encrypt your ELF binaries using various algorithms. GnuPG is required in order to use some encryption techniques.
The suite also contains programs to inject code into ELF binaries.
KIside is a message digest computing and displaying tool. It computes and shows the hash code of any file as a string of hexadecimal numbers. KIside implements standard algorithms such as MD4, MD5, SHA1, SHA256, SHA384, SHA512, TIGER, RIPEMD160.
using PHP (and some ShellScript) to protect your linux server against bruke force attacks(http://en.wikipedia.org/wiki/Brute_force_attack).
also keep a log in MySQL and have email reporting
Polydish is a polymorphic Internet server capable of accepting pluggable protocols (written in Python or Ruby), and can thereby serve any type of content imaginable. The backend code is a fast, secure, C-based server, employing thread pools and OpenSSL.
Launch, manage, and measure any social impact program with Submittable's all-in-one platform.
Accept and review any type of submission with Submittable, a cloud-based submission management platform. Whether you're looking to receive editorial, resumes, applications, contest entries, or portfolios, Submittable provides the tools to help you receive and manage all types of digital content so you can make better decsions. Top tools include form customization, team management and reviewing, submitter communication, and reports and data.
"mASN1" - mini ASN.1 framework is a light ASN.1 framework written in C# for .NET
framework. It can be used for creating classes that model ASN.1 types and
are capable of encoding/decoding themselves to BER/DER codes. PER support is planned.
InsecureWebApp is a web app that includes common web application vulnerabilities including SQL&Html Injection- see owasp.org. It is a target for automated and manual penetration testing, source code analysis, vulnerability assessments and threat modeling.
Gate Guardian is a library of C/C++ functions that can be used to avoid common security problems when a process forks or is forked from a parent process, or runs / is run by an external program. The code is meant to be portable across many UNIX variants.
Valid CGI Values is (currently) a XHTML forms based technologie for validating CGI values submitted by these forms. It consists of a form parser that analyzes web forms and a package with validation functions.
siggen is a cool email signature generator for encrypted ansi c (confused), brainf*ck, ... signatures. Use it in combination with vi(m), emacs, mutt, pine, or what ever. (tested on Solaris, Linux and Windoze). Optimized only for geeks :-)
Manage your fitness club more efficiently and keep your members engaged
Gym managers and businesses in search of a gym management solution to handle all their fitness management needs and requirements
An all-in-one cloud-based management solution for a variety of health and fitness centers, Shapenet delivers a full suite of integrated technology solutions.
Started as part of the Google Summer of Code 2005, this tool adjusts security settings on Linux systems, including firewall and SELinux policies. This tool aims to replace the system-config-securitylevel tool from Red Hat and Fedora Core systems.
Project Identity aims to develop an Open source Biometric Solution i.e. complete set of tools and libraries for Biometric identifiction systems.
This project has intial code done by students as their summer project at Echo IT Labs Pvt. Ltd.
GPL PHP AntiVirus for webmasters. Scans your web server's file system for dangerous and malicious code in public HTML, PHP, CGI and text files, usually caused by defacement or security holes in shared hosting accounts.
Set of tools and libs for
managing structured data
in a very flexible way:
Imp./Exp. ASCII, XML, SQL,
PS, Tex/LaTex, RTF
GUI: X-Windows, MS-Windows
Interface to C++, DBs, Perl,
PHP, Java, TCP/IP
LISP-like interpreter
written in C++ using C-LIB
This site is intended as a location containing a suite of tools to (1) Aid in the design of db APIs to be utilized in a J2EE environment and (2) generate stubs for the db API, Java classes and SQL DDL necessary to support the MVC pattern and the Data Own
Twe (Twe Whitelist Enforcer).
Language: php4.
Twe is used to enforce pre defined html code.
Twe takes (evil) html as input and returns html matched against
a flexible and easy to extend set of rules. Use Twe to avoid cross side scripting (xss).
A user-space solution for configurably disabling the ability of a process to access the internet. It is especially useful for foiling code that is suspected of containing spyware.
Java Mechanic can modify public, private and protected fields and activate methods of live running apps. Also decompiles,or saves any objects or source code. Using a built in java code interpreter, objects can be created on the fly. Contains many tools.
A criteria selection for guiding and assuring activities concerned with the analysis of digital evidence, It covers legal, police and operational aspects. It is not a technical manual for computer forensic analysis, It is a criteria-based manual.
The FreePKI project aims to create practical, interoperable & free code and services for Certificate and Registration Authorities based on the X.509 standard, including nearly zero-cost ID verification through a PGP-like web of trust scoring system.