With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
This simple Java applet will use a few URL obfuscation methods to mask a URL. This isn't meant to be anything earth shattering, but maybe useful. It does more than basic URL encoding (although it does that). Also contains a library to do it all.
usfmapop [ i know it sounds horrible ;-) ] stands for "useful scripts for me and (perhaps) other people". The goal is the publish some scripts i wrote to make my work easier. More informations on the project homepage.
Steganography framework with support for several carrier file formats: Pixel graphics, RIFF WAVE format, any sound to save lossy/analog, standard MIDI File Format, IL or .NET assemblies, XML documents, unsorted text lists.
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
Fdump is a general low-level file/directory manipulation program. Fdump can split, reconstruct, scan, update, encode/decode, extend and compare any kind of file. It dumps files in several formats, while re-encoding from: B2/B16/B32/B64/B85.
adlc (amp-off debian livecd) is a security-oriented debian livecd. It contains tools and frameworks to perform security audits. for login try: root/toor and have a look at adlc.sourceforge.net. It's like a README ...
TorK is an Anonymity Manager for the KDE Desktop. Browse anonymously on Konqueror/Firefox/Opera. Send anonymous email via the MixMinion network. Use ssh/irc/IM anonymously. Control and monitor your anonymous traffic on the Tor network.
EDSS stands for Easy Debian Security Script and it is a very easy to use script that installs additional software, configures the software, and scans a GNU/Linux Debian server for possible security risks.
Captive Portal to use with IPTables (with ip_set module). It's permit to control access from a sub-net to internet or to another sub-net. Uses unix account to validate users. It's an alternative to Natacl, Sphirewall, Zorp, Nocat, Nufw and others.
efw-toolbox. Is a collection of applications/scripts and other odds and ends that are useful to have. These are currently not available in the current Endian Firewall Project. This project is intended to work alongside with Endian Firewall project .
Amnesia is a design-rich 'host-proof' web application that encrypts and remembers all sorts of personal information from passwords to private notes. Project now hosted at Google Code: https://code.google.com/p/amnesia-app/
a perl script to perform Vigenere (polialphabetic enciphering and deciphering) for teaching classes. Keys are stored in a dedicated file in order to have a one time pad to use for messages exchange.
DotNetSSH is a pure .NET implementation of the SSH2 client protocol suite. DotNetSSH development is alive and active. DotNetSSH is a fork of Tamir's excellent SharpSSH, itself is a port of JCraft's java Jsch.
This is a simple encryption tool to work with home-grown encryption algorithms.
It can run as either a GUI, a command-line application, or a network proxy.
Kryptographie is a student project to implement historic encryption methods. It has a linux style command line interface. This project will also include the notes for my talk I'll hold on cryptography in school. (in German).
SIFA (Secure Information Flow Analyser) uses a graph-based approach to reason about the possible vulnerabilities of a system from an information security perspective, supporting multiple views over the system. SIFA is an experimental prototype.
inundator is a tool used to anonymously inundate intrusion detection logs with false positives to obfuscate a real attack, leaving the IDS analyst feeling completely inundated.
phpKeyMgr is a PHP based SSH key managing software.
You can create multiple keys, define servers, and choose valid keys for each servers.
After this you can export the authorized_keys file with ease.
A Javascript implementation of the Blowfish Encryption Algorithm described by Bruce Shneier circa 1993. Blowfish is a keyed, symmetric block cipher common in cipher suites and was placed, by Mr. Shneier, in the public domain.