Intended for Developers to highlight their security weak coding and show them how attackers can abuse these weaknesses. Refer to the following web sites for directly viewing training movies online. http://yehg.net/lab/#training http://core.yehg.net/lab/#training
Caditor is a portable tabbed text editor featuring encryption, syntax highlighting, autocomplete, line numbering and a functional plugin system.
LINReS is a tool which can be used by Incident Response and Computer Forensic Teams during initial response phase to collect volatile and other non-volatile data from a compromised Linux machine using statically compiled binaries.
An administrative tool
T RunAs allows you to run a program with administrator rights. it is very useful for administrators who want to grant certain rights for users with no power.
USA CRYPT is a smart, powerful and easy-to-use file-encryption tool that works with Advanced Encryption Standard (AES) algorithm - 256bit key. Operation mode: OFB
A collection of hacking tools in PHP
Use the processing power and bandwidth of the hosting server! Remote Attack Vector makes all connections from the hosting server, thus making you totally anonymous!
This toolkit has complete security Package start from Tweak manager , Updater , Virus scanner ,Proxy server and many more This will be help full for user from corporate to small user we have already started working on it will completed with 2 months
the pupose of this program is seal the data in a bmp file;the bmp file will still ok;you can unseal the data from the bmp file in the future
Our aim is providing fixed nodes with redundancy, share unused bandwidth, and create hotspots with base services(web,email,IM,etc.) for any roaming user. GOAL - To make sharing your excess bandwidth as easy as setting up a NAT (Or XP ICS). Admins Needed!
Time-stamp of a created file can be modified by attacker. This project is meant to track File timestamp values , using NTFS data structures rather than trusting the original time stamp modified by attacker.
Fractal Encryption was once a dream, this is a quest to find the ultimate encryption layers behind the FES Protocol Released in ANTdb 2005.. It in it own base is the module to drive geometric fractal interlaced data.
My project on Image Processing have three parts.In the 1st part we design Visual Encompression.It is mainly used to send an secret image over the unsecured network.2nd part is of Digital Watermarking.3rd part is Steganography.
A Computer Algebraic System. Designed to do advanced mathematical operations and calculations with a simple user interface.
Real Time Port Scanner and Detection for Network Backbone and Packet Filter
Securing mails without involving user. Secures them as often as possible if it is possible. Shows security-state and process of mails and mail-partners.
Peer Agent is a system that enable a group of users to carry out automated complex interaction via email services without relying on a trusted third party.
Saoirse rogha. Freedom of Choice in Gaelic Open source cross platform community initiative to promote the awareness of open source software and build a fun, active community
SpaceKey is a high-performance lossless compression and password protected encryption utility. These two functions are combined in one easy to use program. It will compress and encrypt, or restore, any binary or text data.
Visual IP is a network protocol analyzer that works in any operating system with a java VM. At the moment it only allows you to examine data from the disk, and created by tcpdump. You can interactively browse the capture data, viewing summary and det
A voice Biometric system.
This software package includes a word proscessor and an internet browser. Only for Playstation.
directvirus is a free anti-virus and malware tool to remove any threats on your pc
DHCPv6-TR is the basic implementation of the DHCPv6 protocol in .NET framework. DHCPv6-TR mainly conforms to the following standards: RFC3315, RFC3118 and RFC3646. Secure communication between DHCPv6 Clients and Servers is the main aim of the project.[GD
This software shall enable users to send / receive denyable messages: Nobody can prove a message is from / for a specific user. Messages can be made private (by using password) or are public. All messages have an expiration time/date / event
One of the project groups in Intake 6 is planning on doing a IM client which is secure. This includes messenging, file sending, picture drawing, video transmissions by far.