With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Try Google Cloud Risk-Free With $300 in Credit
No hidden charges. No surprise bills. Cancel anytime.
Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
In DeCrypto you will find a collection of scripts for helping decrypt messages. Eventully I am going to put these scripts together into a nice interface.
A number of tools to enhance management/coding of NFR (http://www.nfr.net) IDA, and various other admin tools that can be used for both NFR and hand coding other appliance scripts.
The Ada Cryptographic Framework (ACF) is a set of Ada packages that implement the most popular cryptographic algorithms. The main goal of the proyect is to implement a complete set of cryptographic primitives entirely in Ada 95
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Update: The code from this project has been contributed to the GNU Crypto project.
The Cryptix SASL Library is an implementation of the Java SASL bindings and a number of SASL mechanisms.
RanPass 2.0, the successor to the simple and MS-DOS interfaced RanPass 1.0. RanPass is a Random Password Generator. RanPass will use a unique Algarythm(s) to generate a Random Password. This type of software is really useful to a Secure Network.
AVUpdate is an script-package to automatically update the
AntiVir antivirus Software from H+BEDV on Linux/BSD Machines for
which H+BEDV haven't created an auto-updater.
The scripts can also update the antivir-Tree for the Antivir/Win-Feature "Intrane
Trace2ip is to hold one trace of all connections IP, memory the information into the file. The file to have like unique key ip_source and like associate data header IP. Alternative Key:Audit, Trace, Monitor, Dump, IP.
xPG was about an OpenPGP-GUI in Java. Some source-code is still available for reference purposes. See http://www.cryptix.org/ for a current implementation of OpenPGP for Java.
The K Network will provide a network infrastructure for encrypted anonymous distibuted communication. Distributed chat will be the first application. Goals are anonymity for both sender and receiver, no central point of failure, and scalability.
petrovich is a GPLed filesystem integrity checker similar to Tripwire. It is written in Perl using standard perl modules available from www.cpan.org. It currently supports Base64 MD2, MD5, and SHA1 hashes. Petrovich has been tested on windows 2000, Ope
Snarfzilla was a GUI and web browser for the official Freenet Java server.
The first web browser for the dark web.
It hasn't been compatible with Freenet for several years and development ceased.
GNotary is an asynchronous peer-to-peer digital notary service based on email. The server polls POP3 mail boxes scanning for specified key words in the subject line. A digital signature of the email body is returned to the sender.
The goal of this project is to develop a network protocol (Peer Instant Messenger Protocol, PIMP) that creates a distributed, peer-to-peer network for the transmission of instant messages, along with a graphical client that will allow users to access the
This is a project that simulates the German Military Enigma machine during WWII.. It is a project for beginers to learn to program and to meet people. If anyone is interested in helping, please email me @ dustin@rockhill.org
Free Crypto Token will be a free, operating system independent and standard driven interface to smartcards, key files and other hard- and software crypto tokens. In fact FCT will be a framework for PKCS#11 modules that will also include some implementati
The functional objective is to provide a simple secure socket infrastructure for client/server apps. The usability objective is to allow inexperienced developers to deploy the system and write "Hello World" with a single page of documentation.
The RAZip bitstream format was designed to provide a faster
random access to compressed data than what is currently
possible using the GZIP format. During the desing phase,
some other features were added, like encryption and error correction.
An API and test suite, or possibly an application unto itself, to manage keys and allow mail user agents (such as pine or mutt) to use encryption and authentication systems (such as S/MIME) via the services of external encryption suites (such as OpenSSL)