With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
A PHP based auto Local Exploit trigger. It detects kernel version ,gcc and auto pwn it for specific vulnerabilities. A standard proof of concept.This PHP based script, when allows to upload on vulnerable server .
The purpose of this project is to demonstrate Information Card interoperability on heterogeneous platforms written using Java language to support Apache Tomcat, JBoss & SUN Application Server platforms running on Linux.
This is a tool that has per objective to audit a system Unix. In order to make this procedure, this tool has verifications of configurations and variables of the Operating system.
Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.
Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
VERISIL - Secure Data Deletion Technology And Library ® is perfectly developed and opensource secure data removal library. The name of project is Turkish (means "CLEAN DATA").
VERISIL is developed in delphi, compatible with Lazarus & FreePascal.
This project is made with batch scripting. This tool is a virus removal tool that has many tools that are freeware and not opensource in it but for obvious reasons why it's not. It also has a scanning feature have many viruses and Malware.
Network Intrusion Detection Library. Allows the application programmer to easily capture, classify and detect anomalies in network traffic. Libebox supports modules {engines and parsers} that can be written and later loaded by an application.
Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material. First and foremost for memory dump analysis and forensics usage. Able to identify AES, Serpent, Twofish and RSA keys as of version 0.0.3.
Classe para a criação de captcha sem imagens. (Cria captcha com letras, números, símbolos, ou calculos matemáticos.)
Class for creating captcha without images.
Clase para crear Captcha sin imágenes.
We wish to explore the use of Java annotations for object validation, and specifically for input validation. The result should be a framework which should be easy to add to an existing application.
Simple Intrusion Detection System which monitors failed access (SSH and Dovecot) attempts. If hack attempt is detected above the configurable threshold level then a number of actions are taken to block the IP and alert administrators of the attempts.
This is a Hash Calculating tool that calculates MD2,MD5,SHA-1,SHA-256,SHA-384,SHA-512 hash of text or a file. This has GUI developed in java swings.All it needs is sun jre installed.
Process Memory Dumper it's developed for IT Consultants IT Security Consultants that need to dump the entire memory of a process and/or save informations about all running processes and modules.
It's developed in C++ using MFC
The IEEE 1619 Committee open-source reference implementations of encryption algorithms, plus testing and certification suites, for each encryption algorithm included in the standard.
The objective of the GridTrust project is to develop new Grid Security technologies in order to manage Trust and Security in Grid for the Next Generation Grids from the requirement level down to the application, middleware and foundation levels.
Useful for quick security assessment. [Now]Edittable form fields with submit button. Added Ajax Framework Fingerprinting.Likely to be updated over time. [version 0.2]Integrated with JS-file fingerprinting, fuzzing, bruteforcing.
Botan is a C++ crypto library Note: all versions of botan served on sf are OBSOLETE AND NOT SUPPORTED IN ANY WAY. Go to http://botan.randombit.net for the latest stable/supported release.