Shows how easy it would be to gain unauthorized access to a system
Automatic SQL injection and database takeover tool
Brook is a cross-platform strong encryption and not detectable proxy
The first messaging platform operating without user identifiers
A Gradle plugin for printing beautiful logs on the console
MaddCrypt is a simple Protector for your .NET application
IEC 104 Multiple Masters to Single Slave
Vulnerable Pentesting Lab Environment
A powerful MongoDB auditing and pentesting tool
A very secure file vault for private files to avoid hackers
Unlock Your ISP and access all your restricted websites
Framework for Man-In-The-Middle attacks
A small, simple PHP MVC framework skeleton that encapsulates a lot of
Calculate primes by using extremely fast sorting
an extremely buggy web app !
Vulnerable Virtual Machine to Learn
Data Encrypton Software utilizing IMPACT
Linux Security Distro for Data Forensics, Pen. Testing, and IR.
Password recovery tool for compressed archives and md5, sha-1/2 hashes
A web crawler oriented to information security.
Unprotect Excel workbook or sheets in a few seconds