With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
The aim of securiApp is to help people who do not know much about internet security to be able, with minimum effort to automatically configure their firewall to protect a Mac OS X system from hackers.
Grained Login is a fine-grained login system for Qt applications. It uses SHA1 hashed passwords to retrieve user rights from a SQLite database. An administration dialog handles the maintenance of the users, the roles, the rights and the password history.
a small library for cryptography (e.g. for the MicroEdition of Java) that supports AES (256 bit only), SHA-512 and CBC. The library is available in Java and JavaScript.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
BarTex is a system designed to create inexpensive tickets for events. It uses a crypto system to verify tickets using barcodes; thus eliminating the cost of expensive, colorful tickets that cannot be photocopied/forged.
stores a free text field strongly encrypted on a cell-phone or PDA using AES encryption with 256 bit -- can be used for storing passwords, pins and other sensitive data
TURing human IDentification, a textual highly accessible alternative to image CAPTCHAs involving the usage of simple phrases and based on the language recognition features of the user, supposedly human.
Cryptomni is a program which can encrypt and decrypt files using the one-time pad cipher. If a key is truly random, kept secret, and never reused, this encryption algorithm can be proven to be unbreakable.
FedStage FedSAML is a software aiming to implement security SAML2.0 standard, supporting low ((de)serialization) and higher level (easy way of creating and verifying security-related data, own extension elements,...) of creating SAML-related data for Web
RemoteFinder is a graphical SCP program for Mac OS X. It will provide features similar to other programs such as WinSCP. The Look and Feel will be Mac-Like.
In the future, other Protocols such als FTP and WebDAV will be implemented.
Random Password Generator. Generates random password either by defaults (numbers, upper case and lower case letters. 10 characters long) or by commandline options
Sting is a simple, host-based approach to detecting arp cache poisoning based man in the middle attacks (such as made by ettercap) on your LAN. It uses SNMP to periodically query the arp cache of your router and make sure its entry for you is correct.
Privale is a p2p network following the form of onion routing/mixmaster networks. But, it is an anonymous publish and retrieval medium, not a proxy system. Privale attempts to defend against denial of service attacks, Sybil attacks, and traffic analysis
A framework for information security management. It has the centralized server for managing the IDS sensors, log consolidation and correlation, report generation etc. Also it has customized IDS sensor based on snort.
HumanSudokuSolver is intended to solve Sudoku puzzles in a way human beings would do (non brute force). It currently solves most of the puzzles I tried and can output a step-by-step solution. Developers who want to contribute are welcome!
The PeerTrust system uses policies to describe trust and security requirements. Such policies are a component of Peertrust run-time system that can negotiate to establish trust among systems on the Semantic Web