Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
Start Free
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Brute Force Grid is a Process sharing framework on Peer to Peer overlay network. To demonstrate the application we have used the brute force attack to the hashes by hashing algorithms. License : GNU General Public License version 3 (GPLv3)
A simple keylogger written in python. It is primarily designed for backup purposes, but can be used as a stealth keylogger, too. It does not raise any trust issues, since it is a set of [relatively] short python scripts that you can easily examine.
CloudKey is a multi-user password manager. It allows multiple users to store passwords, PINs, usernames, etc... in a searchable database for retrieval from anywhere.
Project still in development, not all features are available yet.
Access competitive interest rates on your digital assets.
Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform.
Geographic restrictions, eligibility, and terms apply.
Advanced Perl script for DES password cracking. Might be handy for password QA. Brut-force, load Unix passwd/shadow, multi hash crack, input/output file, save/resume cracking state.
If you use tripwire, you have to review and accept changes on a daily basis. Logging into multiple servers to accept the changes is troublesome. Enter CentralWire: a web-based centralized console to review and accept changes detected by tripwire.
It load the current public-timestamp-block from publictimestamp.org and store it in a file to use it e.g. as a signature in an e-mail software.
The project is inactive and not under development anymore.
A C library providing client access to Atlassian's Crowd application. Also includes a command line interface and an Apache authentication/authorization module.
Sharemind is a secure multiparty computation system that allows you to process data without seeing it.
IMPORTANT: The version available on this page is a seriously outdated version that is kept available as an educational tool. More recent versions with more features and better quality are available from http://sharemind.cyber.ee/.
This is a tool that has per objective to audit a system Unix. In order to make this procedure, this tool has verifications of configurations and variables of the Operating system.
Common role (ComoRo) lets you manage all roles for your applications in a centralized way, being the natural extension to single-sign-on (sso).
Comoro recommends the use of a SSO system, like CAS.
A configurable system for synchronising multiple passwords of different types. Password quality can be imposed by using histories, cracklib based tests, and forcing certain passwords to be distinct. CGI and PAM modules exist for tight integration.
Cross Site Scripting Anonymous Browser (XAB) leverages web sites and client browsers to build a network of drones. It is not to replace the current anonymous browsing applications, but provides an alternative that does not require willing participants.
Hoppy the {H}ttp {O}tions {P}rober in {PY}thon checks the availability of http methods on a specified server. It will probe these methods to see if they are active and in some cases disclose configuration issues leaking system information
jKeePass ist ein Passwort Verwaltung Tool. Mit einigen iTAN bzw TAN features. jKeePass ist NICHT Binär kompatibel zu KeePass und speichert ein eigenes Format. Es hat einige Features daraus übernommen und ist ein Komplet neu in Java geschriebenes Tool.
Suite of tools and APIs to manage centralized logs: collectors to get remote logs, tools to navigate through stored logs, tools for datamining over stored logs.
PHP security system that protect your web applications adding on your source ONLY ONE LINE OF CODE! Administrators can manage policies, authentication and authorisation for as many users and groups, all through a single and intuitive Ajax based interface
Lite Security Module: a daemon to handle PKCS11 Secure Boxes
Lite Security Module: a daemon to handle Secure Boxes (files containing cryptographic keys, X509 certificates and data objects), accessible through a PKCS#11 library, supporting non-certified (lite) Software or Hardware Security Modules (www.clizio.com)
Pure managed C# implementation of well-known cryptographic hash functions such as SHA-family (SHA0, SHA1, SHA2), MD-family (MD2, MD4, MD5), RIPEMD, Tiger, Haval, Snefru and others.
Moved to Github: https://github.com/AndreyRusyaev/acryptohashnet
sanesigner is a high level digital signature api component. it support generating and verifying digital signatures as well as encryption and decryption using public keys, and lots of other features in between.