With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Cloud tools for web scraping and data extraction
Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.
Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
XML carver which can carve damaged or non-standard XML out of any file. It rebuilds the XML tree, along with giving the offsets for all the carved XML data. This tool was developed for the DFRWS 2010 Forensics Challenge.
A web-based system to assign a set of known persons anonymous ids, such that every person only receives one id. The ids cannot be mapped to the corresponding persons afterwards.
SteGUI is a graphical front-end to Steghide. It lets users view the images and play the sounds that Steghide allows as cover files, and command the program all with one tool. It also embeds a simple text editor to manage text payload files.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Tener un software avanzado para gestión de proyectos basada en trac. Disponibilidad de Firma Electrónica mediante Tarjetas Inteligentes o archivos de claves. Crear un sistema completo de información de forma muy rápida
Tool for encrypting files using blowfish, aes, des or cast5,
File hashing with md5, sha and ripemd160,
compresssion with gzip, and a nice user interface.
Created using C++ with Qt framework, depends on QCA third-part Qt Library and OpenSSL.
Perl Password Generator using LINUX /dev/urandom, randomized by time signature and hash final masking. Usage: /usr/bin/perl mkpw-hash-alpha.pl [--hash=MD5/SHA1/SHA256/SHA512] [--length=integer<17] [--cycles=integer=1...3]
This project has moved to github at:
https://github.com/mirandadam/parallelhash
Parallelhash is a multithreaded command line utility for hashing a file. It supports algorithms md5, sha1, sha256 and sha512 and can perform multiple simultaneous hash calculations. It's initial goal is to be faster at hashing than dcfldd.
This is a script. It's created to make WEP crack work easier. It depends on aircrack-ng and macchanger. However, if you don't want to change your MAC address, macchanger is not essential.
the PPHPLIB allows users to easy create standard web pages which are using a DB as a backend. In addition the library provides other functionallity, like classes for authentication and authorization, abstraction of DB layers and many more.
snavtclient is free opensource network client program for CCTV security surveillance digital video recorders (DVR) manufactured by the AV TECH Corporation. For more information please see software web site: http://snavtclient.epipe.com/
Squid redirector written in python implements a dynamic whitelisting scheme. Users add new websites to the whitelist via a webform, which is user-friendly and sysadmin-friendly, but mitigates compromise and data exfiltration over the web.
C Based OpenSource Web application firewall (WAF) for detecting SQL and xss attacks Simply works on the Access logs of Apache once an attack is detected it Grabs the Attackers IP and shoves it in an IPTables rule to drop once and for all.
Simple-VPN is an IPsec configuration tool. It abstracts the myriad of IPsec options and allows easy inter-operation of different implementations. Currently supports Racoon, Openswan and Strongswan.
Perfenc is a encryption program that encrypts/decrypts files or the standard input with a one-time pad.
More information about one-time pads is available at http://en.wikipedia.org/wiki/One-time_pad
This is is a modular, test driven website that tries to break web clients of all kind. If you are developing applications that interact with websites you might want to throw it at this website first and see if it survives.
Kotak is just another cracking tool which is based on Java. It is used to crack various types of hash functions with various types of attacks. It's developed to be as simple as possible, so that anyone can use this tool easily.
Q Disassembler is a flexible disassembly engine that aims to provide precise information about machine instructions while maintaining OS-independence and performance.
Simple tool for file encryption and folder content encryption with AES 256. Files can also be hashed with a SHA1 signature. A command line version is available as well as a GUI version. One other useful feature is to encrypt messages for emails.