Automatic SQL injection and database takeover tool
The AWS exploitation framework, designed for testing security
IEC 104 Multiple Masters to Single Slave
A Stealthy Trojan Spyware
Java, Brute Force, Recursive Sudoku Solver
Linux Security Distro for Data Forensics, Pen. Testing, and IR.
Unprotect Excel workbook or sheets in a few seconds