Shows how easy it would be to gain unauthorized access to a system
Automatic SQL injection and database takeover tool
Brook is a cross-platform strong encryption and not detectable proxy
The first messaging platform operating without user identifiers
Vulnerable Pentesting Lab Environment
A powerful MongoDB auditing and pentesting tool
A small, simple PHP MVC framework skeleton that encapsulates a lot of
Calculate primes by using extremely fast sorting
Framework for Man-In-The-Middle attacks
an extremely buggy web app !
Vulnerable Virtual Machine to Learn
Linux Security Distro for Data Forensics, Pen. Testing, and IR.
Password recovery tool for compressed archives and md5, sha-1/2 hashes
A web crawler oriented to information security.