Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
Start Free
Stop Storing Third-Party Tokens in Your Database
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
HumanSudokuSolver is intended to solve Sudoku puzzles in a way human beings would do (non brute force). It currently solves most of the puzzles I tried and can output a step-by-step solution. Developers who want to contribute are welcome!
Privale is a p2p network following the form of onion routing/mixmaster networks. But, it is an anonymous publish and retrieval medium, not a proxy system. Privale attempts to defend against denial of service attacks, Sybil attacks, and traffic analysis
NOTE: Development has moved to github: http://www.github.com/jaymzh/check_x509
check_x509 is a generic script to check X509 entities for expiration periods. It can be run from nagios, nrpe, cron, on the command line, or in other scripts or programs.
S/Key - OTP Generator for J2ME architecture. An RFC2289 compliant One-Time Password generator for mobile phone supporting Java language. It uses MD4 and MD5 hash algorithms.
The PeerTrust system uses policies to describe trust and security requirements. Such policies are a component of Peertrust run-time system that can negotiate to establish trust among systems on the Semantic Web
The Inside Security Rescue Toolkit is a multi-purpose disaster recovery and network analysis system. It runs from a credit card-sized CD-ROM for convenient transport or download. It has read-write support for NTFS-partitions, full partition handling supp
Hash Cracker is an application developed in java swings that allows a user to crack MD2, MD5, SHA-1,SHA-256,SHA-384,SHA-512 hashes either using brute force or using wordlists of the user's choice based on the users choice.
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
A one-time password system that is simple and can be integrated with most current pages! We are sorry we have no website setup but we are having problems with shell access, we plan to have at least a demo up and running soon!
Soicmp is a remote shell system, similar to telnet or netcat that allows a user to connect to a remote shell daemon, by using ICMP protocol instead of classical TCP. http://soicmp.sourceforge.net/ http://billiejoex.altervista.org/Prj_Py_soicmp.shtml
Merovingian is very easy to use but powerful GUI interface for GnuPG. It intends to be well integrated with GNOME, but still usable with other desktop environments too.
wlfXchanger is a point-to-point communication software which enable developers to cooperate in a secure way, using an asymmetric encryption system (Public Key Cryptography).
HashserGUI is a GUI interface for Jacksum. It is intended to provide a graphical tool to create hashes for files within a directory, and check the hashes generated. It works with many hash functions, as md5, sha1, sha256, sha512, md4, crc, etc.
PHP script to protect DIV content (e.g. private data) from indexation by bots, spammers etc...The content is encrypted in the source and decrypted by entering the key in the CAPTCHA.
BRUTALIS - BRUTeforce ALternative Is Stupid. Brutalis generate brute force passwords. It can be integrated in any command line for an attack and support resume, character panel, minimum and maximum length, special separating characters and more.
Stegeek is very simple tool, that takes several files,encrypt, and mix them into one file. Also add some redundancy. The result is, that we have one archive and N keys. It should not be possible to guess N, if you have archive and up to N-1 keys.
Waste.net is a .NET-driven application geared towards providing a secure online encrypted file-sharing service. This is a purely managed .NET 2.0 port of the original Waste client/server.
Offers a complete structure of security for Spring-based projects. It turns any bean in a protected resource. It uses a non invasive approach, and once you create a security policy it makes the bean a PEP (Policy Enforcement Point).