Store, manage, and share passwords, files, SSH keys, and DevOps secrets among IT teams. Enforce password security best practices. Ensure compliance with industry standards using comprehensive audit trails.
Learn More
Find out just how much your login box can do for your customer | Auth0
With over 53 social login options, you can fast-track the signup and login experience for users.
From improving customer experience through seamless sign-on to making MFA as easy as a click of a button – your login box must find the right balance between user convenience, privacy and security.
The CRY utility provides the ability to perform AES-256 symmetric key encryption of files. This is a light weight Linux utility and does not depend on PKI infrastructure. Rather, pre-shared encryption keys are used to protect your files.
talkLock is voice encryption software for your cell phone. talkLock includes a server component so that you own all points of encryption and decryption of your communications.
Parasoft: Automated Testing to Deliver Superior Quality Software
Parasoft provides test automation for every phase of the software development life cycle.
Parasoft helps organizations continuously deliver high-quality software with its AI-powered software testing platform and automated test solutions. Supporting the embedded, enterprise, and IoT markets, Parasoft’s proven technologies reduce the time, effort, and cost of delivering secure, reliable, and compliant software by integrating everything from deep code analysis and unit testing to web UI and API testing, plus service virtualization and complete code coverage, into the delivery pipeline. Bringing all this together, Parasoft’s award-winning reporting and analytics dashboard provides a centralized view of quality, enabling organizations to deliver with confidence and succeed in today’s most strategic ecosystems and development initiatives—security, safety-critical, Agile, DevOps, and continuous testing.
JSRSA is a Javascript/PHP implementation of RSA algorithm which help you to simulate SSL-Like secure data transmission over the net as easy as possible !
Inferno is a simple and fast program that can securely delete files using the same methods as the U.S. Department of Defense. Inferno can also securely delete internet and windows history. Also it can even encrypt and decrypt your private files.
"HelloWorld goes mobile" is a decentralized social network for mobile phones running under Google Android. It is based on XML and different JAVA encryption technologies. The software-structure is based on the desktop-orientated project "HelloWorld".
Businesses of all sizes seeking an AI-enhanced, all-in-one communication platform to unify voice, video, and messaging for improved team collaboration
Dialpad Connect is an AI-powered unified communications platform that combines voice, video, and messaging to enhance team collaboration and customer interactions. It features real-time call transcription, automated call summaries, and AI-generated action items to help users stay focused during conversations. The platform integrates seamlessly with popular business apps like Salesforce, Zendesk, Microsoft Teams, and Google Workspace to streamline workflows. Designed for businesses of all sizes, Dialpad Connect delivers enterprise-grade reliability with 100% uptime SLA and robust disaster recovery. Security and privacy are core priorities, meeting standards like GDPR, HIPAA, and SOC 2 compliance. Dialpad Connect helps companies elevate customer experiences while boosting team productivity.
BcryptFE is a graphical frontend for controlling the bcrypt win32 command line utility. Written in vb.net 2008 and designed to allow easier encryption/decryption of multiple files and directories. Filenames can be hidden in an index file to stay private.
Extend the functionality of the mount and the umount commands by adding support for basic device mapper devices, for key files and scripts and for filesystem checking at mount time while retaining support for loop device encryption.
EGDW is a random number daemon for Microsoft Windows. It sits in the background and collects randomness, and makes this random data available to cryptographic software. It has an EGD compatible interface, at least as compatible as Windows allows.
This project includes: 1 A php linux extension to include encrypted php source files - c; 2 A command line linux application to encrypt/decrypt php source files - c; 3 A windows application to encrypt/decrypt php source files - builder c++
Kahunapule's Password Vault and Kahunapule's Random Password Generator allow you to generate and keep track of random passwords and other sensitive data. Requires Mono or .NET; runs on Linux, OS X, & Windows.
it is about a GUI (Graphical User Interface ) program based on Qt4 library ,that hides data on a picture using differents method depending on picture format (BMP,JPG,PNG,...) (this is called Steganography) the data can be on any file format
SKIF ppds - Personal Password and Data Sentinel- password manager and data security-tools. Single file (main database) encrypted Blowfish-cipher - for storage user acсounts and any text data. "Crypto" tools - Blowfish-cipher,SHA,MD5,DIFF,MAC and other
Safe all your passwords and encrypt them with a single password? Yawn. Synchronize your encrypted entries between different machines? Without compromising your security? Here comes SyncYourSecrets
Secure Storage service is a set of tools to store in a secure way and in an encrypted format confidential data on the grid storage elements. The service has been designed for the grid Middleware of the EGEE infrastructure, gLite.
platform independent solution to encrypt files on a portable Device. Files will be encrypted with TripleDES and hold in an XML-File. No local Installation needed.
Encrypti is a multi platform, easy to use encrypting tool for keeping your files secure. This application offers portability of encrypted files between various platforms. Secure your files with Encrypti!
The PowerCiph Data Encryption Algorithm is a versatile, yet simplistic, encryption algorithm/protocol. The ultimate goal of the algorithm is simplicity, compactness, and a lack of prerequisites.
The Cryptographic Implementations Analysis Toolkit (CIAT) is compendium of command line and graphical tools whose aim is to help in the detection and analysis of encrypted byte sequences within files (executable and non-executable).
Bloppy Blowfish PHP (En/De)crypter can crypt, with a private key, text messages or files, send it via e-mail and decrypt it. You can inject a crypted message into any kind of file (like JPEG image) and send it via e-mail.