With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Cloud tools for web scraping and data extraction
Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.
Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
A small encryption / decryption application that we are giving away free of charge.
Version 1.0.00 - RSA only at the moment.
But later versions will have a plug-in system for adding more algorithms.
A Visual Basic implementation of Bruce Schneier's Solitaire Encryption Algorithm that encrypts plain text by means of a deck of ordinary playing cards.
OpenSource Anti-Trojan Made From VB.NET 2005(Comes With A Few Signatures). But, There Is No Full System Scan...YOU Have To See For Your Self!(Uncontinued As .EXE)
From quote to cash and with AI in mind, our ERP software will become the most valuable asset at your company.
Global Shop Solutions AI-integrated ERP software provides the applications needed to deliver a quality part on time, every time from quote to cash and everything in between, including shop management, scheduling, inventory, accounting, quality control, CRM and 25 more.
WinRAP ( Windows Running Applications Protector ) is a utility which allows you to hide windows application, and hide programs which are running on your screen. It will instantly hide all or certain programs on your screen with a key press.
Yet Another Process Monitor (YAPM) is a powerful process viewer for Windows that monitors the services & processes, their modules, threads, handles, windows, TCP/UDP connections... etc. running on local system or on any of the computers on your network.
Start Gemaad on a computer and it will :
- Create or complete a text file containing the computers MAC address
- Set the WIFI card to DHCP mode
You can now simply copy this MAC address to your admin console for any case of MAC address filtering
Epicor BisTrack is a powerful business management software designed specifically for the needs of the building materials industry, including lumberyards, construction suppliers, and distributors.
For construction companies looking for a business management solution for building centers
Epicor BisTrack is a powerful business management software designed specifically for the needs of the building materials industry, including lumberyards, construction suppliers, and distributors. Known for its comprehensive suite of tools, BisTrack streamlines operations by integrating inventory management, purchasing, sales, and delivery processes into a single, user-friendly platform. Its advanced reporting and analytics capabilities enable businesses to make data-driven decisions, optimize workflows, and enhance customer service. With robust mobile functionality and seamless cloud-based deployment options, BisTrack supports real-time collaboration and efficient operations across teams, ensuring businesses stay competitive in a fast-paced industry.
Recolition is a simple file encryption program which uses AES as it's algorithm. It will encrypt exisiting files to the .encrypt file extension and then decrypt them back to thier original state.
Innovative prototype of network applications such as TCP fuzzers that can be used for many purposes such as network and application security assessments and more. Adapt it freely to fit your needs or to simply understand how TCP works in .NET.
Visit http://sourceforge.net/projects/nreg to view the new one. This is the update! It has better serial protection, more customizable options, and it has a better key maker! It has a ban and used key list system, and emails you when someone registers.
BcryptFE is a graphical frontend for controlling the bcrypt win32 command line utility. Written in vb.net 2008 and designed to allow easier encryption/decryption of multiple files and directories. Filenames can be hidden in an index file to stay private.
This is a website username and password database tool. It stores your website's username and password in an Access 2007 database for one click retrieval. Requires AccessDatabaseEngine.exe to be installed if Access 2007 is not present on the system. Vers
Accepts machine specific, time sensitive password from standard user to then allow the user to run a new application as local Administrator. Released under GPL.
With this application you can hide files in a picture. Now the data are hidden in the picture and can be extracted with WinZip or an another Zip-Programm. Browse all Packages for all Releases: .Net and Java
Ein einfacher Passwort Generator, welcher 3 verschiedene Typen von Passwörtern erstellt: Buchstaben, ZahlenMix, Spezial. Sobald ein Passwort generiert wurde, wird dessen Qualität geprüft. Weiter kann ein eigenes Passwort auf Sicherheit überprüft wer
Crypto.Net is a free and open cryptography library for C# and .Net. AES (Rijndeal), Twofish, Blowfish, RSA, Diffie-Hellman, SSL/TLS, X509-Certificate builder, stream cipher modes or a secure netowrk stream are only some features of this library.
NMAP Configurator is a GUI frontend for NMAP on Windows systems. User must have installed NMAP for this program to work properly. New version fixes the problem of inability to access buttons if display is set to 800x600.
wssecure Application Monitor is a free software that can monitor processes in real time. It will alert automatically whenever a new process is detected and it will again alert if it becomes modified.
This project is based off of Sam Rape. The final product is a bootable floppy which copies the sam file, compresses it and puts it on a disk. A detailed description can be found at datastronghold.com/archive/t10429.html
Bildsoft releases under GPL License the Blackhorse Algorythm, used by all its software.
Blackhorse provides high-level encryption for any file.
Blackhorse is very quick to encrypt/decrypt data, thanks to a particular technology.