Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.
Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
Sign up for free
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Originally made to crack /etc/passwd files from *nix utilizing the GPU. Uses GLSL and OpenGL. Acts as a parallel to John the Ripper, but for the GPU. Supports both ATI and nVidia, anywhere OpenGL can run.
Secrets is a complete, standalone, personal encryption solution that works much like PGP (Pretty Good Privacy). With Secrets you can encrypt information before emailing it to a friend or coworker, or before storing it on a removable disk. Secrets is buil
Ikedectypt is a perl script to decrypt IKEv1 packets in libpcap formatted trace file.
You can use Ethereal(http://www.ethereal.com) to analyze decrypted trace.
Key information(first initialization vector, skeyid_e) is needed to be supplied by user.
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Replace text with POS equivalent text, in a reversible fashion.
Program takes (currently) english text sentences, and replaces each word in a given sentence with another word having the same Part of Speach (POS) tag. This creates a new sentence containing none of the original words. This new sentence can then be transmitted to a remote user, and using the same software, "de-crypted" into yielding the original sentence.
The software relies on having a known "seed" value for the random number generator, which is known only by the sender and receiver. It also relies on the sender and receiver having a shared (identical) vocabulary file.
The project contains code to test input sentences for inclusion of words in the current vocabulary, and can create entries for new words as needed.
The vocabulary has a "MD-5 hash" value to make sure that the share vocabulary file is identical for both sender and receiver.
The software also contains a "bad-words" list of words that should never be generated in the text to be sent.
Software solution for creation and verification of digitral signatures. Can replace tokens and smart cards with mobile phones. Components included are client and server. Can creates, verifiy and store content and signatures. Offers secure sharing.
jCryptPad stores text informationen hierarchical, e.g. passwords, important texts etc. The data is saved in a encrypted xml file. Encryption is done with the AES algorithm. Additionally a password generator and a text encryption editor is also included.
Advanced built-in security helps IT prevent breaches before they happen
Defend against security incidents with Chrome Enterprise. Create customizable controls, manage extensions and set proactive alerts to keep your data and employees protected without slowing down productivity.
Java Based Cryptographic P2P Messaging Client, is based on a client-server architecture. The Client is made in SWING. The server is text based. Server keeps tabs on presense and the users public keys. Presentation: http://varun.accosted.net/talks.php
jFileCrypt encrypts and decrypts files and directories fast and secure. It is written in Java 5 and uses the Java Cryptographic Extensions. It supports the following algorithms: Blowfish, DES, 3DES, AES and RC4.
jHashCalc is a GPL implementation of the popular hashing utility "HashCalc" from SlavaSoft. jHashCalc is written in Java language, and uses the GNU Crypto API to perform the algorithms' computing.
jWaste is a Java based implemtation of the WASTE-Protocol. WASTE is a mesh-based workgroup tool that allows for encrypted, private communication between distant parties on the internet, independant of local network organization.
An API and test suite, or possibly an application unto itself, to manage keys and allow mail user agents (such as pine or mutt) to use encryption and authentication systems (such as S/MIME) via the services of external encryption suites (such as OpenSSL)
jmom is a cross platform email client, written in java and taking advantage of SWT for a faster, native look and feel. Supports imap, pgp, ssl, and filters. Also an IM Client supporting AOL Instant Messenger and MSN Messenger, and CVS Client are in the
Store several passwords with a single portable program. Just remember only one password. It's up to you to decide how many password you want to store, and which name you want to give to that password.
"kedi" şifreleme, veri bütünlüğü ve rastgele sayı üretim algoritmalarını bünyesinde barındıran, tamamen özgün ve açık kaynak kodlu bir kriptoloji projesidir. Proje uygulamayı göstermesi için bir .exe dosyası içeren proje ile birlikte sunulmuştur.
Legalfinger is a bunch of Java-based software including a set of portable software installed inside an USB finger to protect any digital content copied onto the USB finger.
libapache2-mod-scramble-ip encrypts IPs in the apache-server in a way, that you can still work with them (for analytics etc.) but its not possible to find out the original IP.
This is C++ implementation of russian GOST 28147-89 encryption
and R34.11-94 hash algorithms.
The main objective of project is not speed, but portability. Test suite included.
A formally verified implementation of cryptographic algorithms using the SPARK programming language. For the complete library proofs of the absence of run-time errors are available. Some of its subprograms include proofs of partial correctness.