One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
Try Free
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Set of tools and libs for
managing structured data
in a very flexible way:
Imp./Exp. ASCII, XML, SQL,
PS, Tex/LaTex, RTF
GUI: X-Windows, MS-Windows
Interface to C++, DBs, Perl,
PHP, Java, TCP/IP
LISP-like interpreter
written in C++ using C-LIB
GiANT is a graphical interface for computer algebra systems (OS X/UNIX/Win). Currently GiANT lets the user work with number fields via KASH, but we aim to develop it into a GUI Library to run on top of any CAS and expose any of its functions.
Anonycat is web-based software that allows you to surf the web anonymously and bypass overly restrictive corporate firewalls or monitoring/blocking software. It can be used online (http://anonycat.com), or run as a service on your own webserver.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
The J-WASTE project aims at the implementation of a platform independent client/server Java implementation of the WASTE protocol. This project started as a mandatory project course in networking at the Luleĺ University of Technology in Sweden.
BIS Development Kit protects your web content (texts, images, html etc) from copying and direct downloading. It also protects your Java(tm) applications from reverse engineering and your algorithms and ideas from the plagiarism.
Java Randomness Test Suite is a gui application to run randomness tests on random stream resource (file or algorithm). Application can be run in command line. Includes general statistical tests, NIST and DIEHARD tests.
This site is intended as a location containing a suite of tools to (1) Aid in the design of db APIs to be utilized in a J2EE environment and (2) generate stubs for the db API, Java classes and SQL DDL necessary to support the MVC pattern and the Data Own
Java servlet implementation of the Lightweight Identity Management (LID), URL Management Software. More information about LID can be found at <a href="http://lid.netmesh.org>http://lid.netmesh.org</a>
x:einfach simple java components is a library for java. it includes various things like a page cache for web-content, a virtual string table, an ip subnet checker, string and date handling utilities, a connection pool and other simple things.
Cryptix is an international volunteer effort to produce robust, open-source cryptographic software libraries. Cryptix products are free, both for commercial and non-commercial use and are being used by developers all over the world.
SecurityFilter is a Java Servlet Filter that mimics the behavior and configuration format of container managed security, with several development and deployment advantages. See the Home Page for more details.
It moves by itself inside networks like virus infection & plagues, it is being written to solve computer virus problem drastically and responsibly. It is legal, free and open for public domain to improve W3 ICT Security.
OpenFIM is an implementation of the authentication process involved in Federated Identity Management using secure SOAP. The server software has been developed using MySQL and PHP. The client software has been implemented in PHP, Java, .NET, and Perl.
The goal of this project is to design and write comercial quality software and aplications with fully respect to free software (like in "free speach"). The software designed by us will target various fields: from scientific applications to multimedia an
crcRepair is a utility that is able to fix corrupt files by consulting a database and file mirrors. It is written in pure Java, so it can be used on all platforms with the Java JRE installed.
Enables a user to view & alter
all aspects of comunications with a web site via a proxy. Primarily used for security
based penetration testing of web sites, it can also be used for
debugging during development. Seen as part of a hacker toolkit.
Please note: not having time to complete jSai myself; I came across the ACEGI project which I now recommend instead.
jSai; a Servlet Authentication Implementation. jSai aims to allow easier to use, more powerful authentication for Java Servlets.
A robust and reliable user management sub-system is critical to an enterprise application system. Esecurity is a web services-based user management component that provides services for user authentication, access control, user profile management etc.
Java Mechanic can modify public, private and protected fields and activate methods of live running apps. Also decompiles,or saves any objects or source code. Using a built in java code interpreter, objects can be created on the fly. Contains many tools.
Execution monitor for Java Applications.<br/>
BERSERK implements the Intercepting Filter design pattern. <br/>
Allows composing and runtime editing of execution flow and intercept services with access control, logging or any user-defined filters.
This project provides an interface to Sun's JCE (Java Cryptographic Extensions) as a JSP taglib. It brings strong encryption algorithms such as AES and Blowfish to your JSP applications. It uses the bouncycastle.org cleanroom JCE 1.2.1 implementation as