DOP Software’s mission is to streamline waste and recycling business’ processes by providing them with dynamic, comprehensive software and services that increase productivity and quality of performance.
Learn More
All-in-one security tool helps you prevent ransomware and breaches.
SIEM + Detection and Response for IT Teams
Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.
Python Based Brute Force Password Cracking Assistant By Clownsec
A python script used to generate all possible password combinations for cracking WAP and other logins or password files.
This program is open source. If you see the need to repair or change something by all means do so, but share your findings. *HONK*
Usage: wordpie.py [-h] [-o OUTPUT] [-min MIN_SIZE] [-max MAX_SIZE] [-N] [-L] [-U] [-S] [-A] [-v]
Generate a wordlist with all possible combinations of letters including:
-L (Lowercase Letters)
-U (Uppercase Letters)
-N...
Visual Cryptography and Bit-Plane Complexity Segmentation in Python
Hide secret messages in your pictures!
Cyberbit lets you transmit a secret message to an intended person in a new manner.
The secret message is an 1-bit deep black & white image. The message can contain
written text, a drawing, a secret code etc. Using Visual Cryptography the
application splits the secret message into two "shadow images" called <<shares>>.
Any of the two shares will be embedded into a "normal" image file called by tradition
<<vessel>>. You can use a method of hand to...
CryptoPy is a pure python implmentation of cryptographic algorithms and applications. The algorithms are developed for readability more than speed. The collection now includes IEEE 802.11i specific algorithms that generated the test vectors for 802.11i.