No hidden charges. No surprise bills. Cancel anytime.
Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
Start Free
Stop Storing Third-Party Tokens in Your Database
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
VulnOS are a series of deliberately vulnerable operating systems packed as virtual machines to teach Offensive IT Security and to enhance penetration testing skills. For educational purposes!
The program Virtual Network Simulator for Web 2.0 is a tool that allows the simulation of assembly and configuration of computer network projects, virtual or physical. It also simulate the sending of a package between the hots of origin and destinati
Jasmin is a Java Assembler. It takes ASCII descriptions for Java classes, written in a simple assembler-like syntax. It converts them into binary Java .class class files suitable for loading into a Java Virtual Machine implementation.
The `Turing Machine Compiler Collection' (tmcc) contains a virtual machine which emulates a Turing Machine such as an assembler and a C-like compiler which assemble/compile the written code into the delta-notation.
Fully graphical mips simulator, with a simple text editor. The aim is to not only have the entire mips isa implemented and simulated, but to have a mips ide. The text highlighting for the mips instructions set is currently underway. Version 3 Available.