Encrypted volumes through command line
57 Hash Functions In One Program, plus each with HMAC or KMAC
Inspect a command's effects before modifying your live system
Copies IP packets from source to destination PCAP files.
One-time-pad encryption using a virtual pad
Modular Digestion Tool