With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
The ABKey plugin for Apple's Address Book allows you to quickly view GPG key information for contacts as well as specify per-contact preferences for how GPGMail (the Apple Mail plugin for GPG) handles encrypting and signing of emails.
The OpenSSL shell/batch script collection offers insight in how to setup a hierarchical PKI structure consisting of a Root CA, several sub CA's and end entity digital certificates. The scripts are available for unix and windows.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
The Eclipse XML-Security Plug-In allows you to experiment with the W3C recommendations on digital signatures and encryption and to learn all about their background. Arbitrary XML documents can be canonicalized, signed, verified and en- or decrypted.
Virgil is a utility for generating SELinux policy for user domains not covered by the distributed policy packages. The Virgil GUI allows a policy creator to select options and identify file system resources, then generate the desired source policy files.
INTIX-JSIGNER is a java web application for signing documents (XML and/or PDF) of unattended way and in the server side. It has as main modules the following: Authentication, XML and PDF Signing and Keys and Certificates Management.
Open WS-Policy,an OpenSource Web Services Policy Framework implementation,is a set of opensourceJava libraries that implement the ws-policy specifications.
The Free Digital Money project aims to promote ideas and stimulate further innovation in the field of digital money. It provides a e-money implementation that can be used by anyone to try out ideas, build sample applications, or for further development.
The Algebraic Toy Cipher is a toy cipher for algebraic research. It is scalable in the number of bits and in the number of rounds. Works over two fields GF(2)/P, being one for the s-box invertion and the other for the mixing layer linear transformation.
secWWW is PHP and JavaScript library. It ciphers data transferred over the network. It supports secure login into a Web application without sending the password over the Internet.
Imagine being able to send an encrypted message as a single file to someone working on any Operating System, without them having to install any software to decrypt it. Just send them an Inkjar. Or you can store your own passwords on a usb key anywhere.
The Moonbounce API is a set of high level objects that encapsulate pieces of the Bouncycastle lightweight crypto API. Moonbounce significantly simplifies RSA key generation, signing, encryption/decryption and verification of both byte arrays and files.
Private-key, symmetrical (same password to encrypt and decode) file encryption with 8-bit to 2147483647-bit (2^3 to 2^31) encryption using my own algorithm and my own extension of MD5 (http://blog.robtoth.net/2009/06/tencryption-computer-programming.html
MacHash is intended to be a HashCalc clone for Mac OS X. Sporting a neat Aqua interface, it allows you to calculate a variety of popular hash values like MD5 or CRC32 from diffent input sources such as a line of text or a file on disk.
Compute shared RSA keys for two parties using Gilboa's protocol. Other protocols may be added. Contains JAVAsource for Benaloh, Naccache-Stern and Goldwasser-Michali crypto-algorithms. Oblivious transfers and BiPrimaliy tests also implemented.
Enigweb is a firefox extension similar to the Thunderbird Enigmail extension. It will encrypt or sign textareas, and decrypt/verify OpenPGP data. Additionally extensions will be provided for major webmail providers.
A Java based HTTP/HTTPS proxy for assessing web application vulnerability. It supports editing/viewing HTTP messages on-the-fly. Other featuers include spiders, client certificate, proxy-chaining, intelligent scanning for XSS and SQL injections etc.
The Bro Re-usable Architecture (BRA) is a project by Christopher Jay Manders that will allow one, with minimal effort, to set up a working Bro (real-time intrusion detection) environment.
Four-channel daemon of video observation for IP video servers Aviosys IP9100A (B, Plus).
This program is intended for indemnification of hardware restrictions four-channel IP video servers Aviosys