With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Cloud tools for web scraping and data extraction
Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.
Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
A smart malware creator to create 26 types of malwares.
...In this era of computers, threats have increased more then before & that's why software's like these come in handy. With this software we can create malwares in different formats. We can view & edit the sourcecode of those malwares. Ethical Hackers can use this software in a secure way during pen testing.
Help to convert text into secret codes , so that you can mail,chat and transfer text securely to prevent hacking.
How to use :
Step one - Open Endico 14
Step two - Decide what to do (Text Encode/Text Decode)
Step three - If You Selected Text Encode -> Then Type/Copy/Open .txt file to convert.
Step four - Copy the converted text into clipboard to chat,mail,print process etc.
Step five - If you want to Decode the code the again follow step two.
Step six - ...
A free utility that finds malware and other threats
...However, HijackThis does not make value based calls between what is considered good or bad. It is important to exercise caution and avoid making changes to your computer settings, unless you have expert knowledge. Sourcecode is available SourceForge, under Code and also as a zip file under Files.
Gestore di passwords open source. Sorgenti disponibili in Visual Basic 6. Applicazione pienamente funzionante. Nota: le password memorizzate vengono cifrate tramite semplice algoritmo proprietario. Esperti sicurezza cercasi per collaborazione e scamb
It's a modern take on desktop management that can be scaled as per organizational needs.
Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
BinaryPix is a Tool to create "Binary-Visual" Code out of ASCII-Text Then it places it on a choosen picture. Then you are able to water-mark your pictures with the "binary-hidden" code.
SFV.net is a sfv (Simple File Verificator) file creator and validator application. All code written by vb.net and requires .net framework for run or compile
The FreePKI project aims to create practical, interoperable & free code and services for Certificate and Registration Authorities based on the X.509 standard, including nearly zero-cost ID verification through a PGP-like web of trust scoring system.
The goal of Operation Project X is to crack the 2048-bit RSA private encryption key Microsoft uses to sign Xbox media, by using distributed computing. This key could be used by Xbox owners to run homebrew code on their machines.
The chgpw utility changes account passwords on machines across a peer-to-peer LAN. Shows how VB.NET can make interop calls to some of the Net API functions.
Rise Vision is the #1 digital signage company, offering easy-to-use cloud digital signage software compatible with any player across multiple screens. Forget about static displays. Save time and boost sales with 500+ customizable content templates for your screens. If you ever need help, get free training and exceptionally fast support.
ISO 17799 - Code of practice for information security management. Creation of methodology and documentation for audit adapted to ISO. One is made up of an introduction on general aspects of the security of the information.