Shows how easy it would be to gain unauthorized access to a system
Privilege Escalation Awesome Scripts SUITE
The Ray Tracing in One Weekend series of books
World's fastest and most advanced password recovery utility
C2 framework used to aid red teamers with post-exploitation
Easy to use cryptographic framework for data protection
Open source disk encryption with strong security for the Paranoid
Intelligently block brute-force attacks by aggregating system logs
Distro Penetrasing Live System Burn to USB Flash Disk & Run.
Yggdrasil Network address CPU miner in C++
Portable Penetration Testing Operating System
Klotsky class block slider puzzles.
C2 shellcode generator/compiler/handler
A post exploitation framework designed to operate covertly
Advanced Ethical Hacking and Penetration Testing Platform
Advanced Network Packet Generator
A tool to dump the login password from the current linux user
SSH man-in-the-middle tool
C# Sudoku solver that uses human techniques; no brute-forcing.
a Toolset for Molecular Mechanical Force Field Parameterization
A Windows password cracker based on rainbow tables
OMEN: Ordered Markov ENumerator - Password Guesser
Calculate primes by using extremely fast sorting
ARP handler inspection