Build or enhance your payments stack, while maintaining control with an open-source, full-stack and modular infrastructure.
Juspay's Payments Orchestration Platform offers a comprehensive product suite for businesses, including open-source payment orchestration, global payouts, seamless authentication, payment tokenization, fraud & risk management, end-to-end reconciliation, unified payment analytics & more. The company’s offerings also include end-to-end white label payment gateway solutions & real-time payments infrastructure for banks. These solutions help businesses achieve superior conversion rates, reduce fraud, optimize costs, and deliver seamless customer experiences at scale.
Learn More
Infor M3 ERP
Enterprise manufacturers and distributors requiring a solution to manage and execute complex processes
Efficiently executing the complex processes of enterprise manufacturers and distributors. Infor M3 is a cloud-based, manufacturing and distribution ERP system that leverages the latest technologies to provide an exceptional user experience and powerful analytics in a multicompany, multicountry, and multisite platform. Infor M3 and related CloudSuite™ industry solutions include industry-leading functionality for the chemical, distribution, equipment, fashion, food and beverage, and industrial manufacturing industries. Staying ahead of the competition means staying agile. Our new capabilities bring improved data-driven insights and streamlined workflows to help you make informed decisions and take quick action.
mystic-crypt is designed as a Java library that can be used for simple and complex encryption and decryption.
The sourcecode for the library is available under https://github.com/astrapi69/mystic-crypt
For demonstration what the library can do there is a graphical client:
The sourcecode for the ui is available under https://github.com/astrapi69/mystic-crypt-ui
InsecureWebApp is a web app that includes common web application vulnerabilities including SQL&Html Injection- see owasp.org. It is a target for automated and manual penetration testing, sourcecode analysis, vulnerability assessments and threat modeling.