Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
Try Auth0 for Free
Go from Code to Production URL in Seconds
Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.
Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
A network security analysis and monitoring toolkit Linux distribution.
Network Security Toolkit (NST) is a bootable ISO image (Live USB Flash Drive) based on Fedora 42 providing easy access to best-of-breed OpenSource Network Security Applications and should run on most x86_64 systems.
The main intent of developing this toolkit was to provide the security professional and network administrator with a comprehensive set of OpenSource Network Security Tools. The majority of tools published in the article: Top 125 Security Tools by INSECURE.ORG are available in the toolkit. ...
Security Officers Management and Analysis Project (SOMAP) is all about defining security management work methods and supplying Security Officers with tools to do their job more efficient and following standards easily.
OpenSignature is an open source project for the digital signature of documents. It works with all cards supported by OpenSC and focuses on adding support for cards from accredited Italian CAs. The goal of the project is to provide a first single product
ConAlyzer (CONsistency anALYZER) is an experimental tool for finding inconsistencies between log files and file system metadata, implemented in Tcl/Tk. At present it only handles FTP log files produced by the Serv-U FTP server on the Windows platform.
RSA Public Key Crypotgraphy for Web Browsers.
Use JavaScript to RSA-encrypt data that can only be decrypted on the server, and not by prying eyes.
The poor man's SSL...
ISO 17799 - Code of practice for information security management. Creation of methodology and documentation for audit adapted to ISO. One is made up of an introduction on general aspects of the security of the information.