With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Secure File Transfer for Windows with Cerberus by Redwood
Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.
Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
VulnOS are a series of deliberately vulnerable operating systems packed as virtual machines to teach Offensive IT Security and to enhance penetration testing skills. For educational purposes!
The program Virtual Network Simulator for Web 2.0 is a tool that allows the simulation of assembly and configuration of computer network projects, virtual or physical. It also simulate the sending of a package between the hots of origin and destinati
Jasmin is a Java Assembler. It takes ASCII descriptions for Java classes, written in a simple assembler-like syntax. It converts them into binary Java .class class files suitable for loading into a Java Virtual Machine implementation.
Hardware Simulation and Vitualization Environment: Unfortunately I have lost my source code in a freak accident (My roommate dropped a bed onto my laptop) for this project. Please be patient and visit http://devsoft.ath.cx/crisis for more information.
Fully graphical mips simulator, with a simple text editor. The aim is to not only have the entire mips isa implemented and simulated, but to have a mips ide. The text highlighting for the mips instructions set is currently underway. Version 3 Available.