ROuter MAN HUNTER detects wireless attackers and captures their MAC
Sending encrypted data through internet web applications.
Directory traversal exploitation tool for web developers.
One-time Pad Encryption
Automatic SQL Injection Exploitation Tool
Portable Windows 8 Screen Lock and Powerful Security Solution
Active-probing-based network IDS for wireless networks
PIN Knock Auth for Web Projects
Forensic scripts for evidence acquisitions, analysis and more
A Java application for transferring computer files in 5 letter groups
Simple application to encrypt and decrypt strings
Software de controle deBraço Robotico em Linux
Break The Security Linux is a Penetration testing OS based on Ubuntu
OCD-01 [OSSEC Cool Dashboard]
Secure File Sharing
Enumeration and automation of file discovery for your sec tools.
Extracts multiple proxies from a list of websites
Trusted Computing Platform Management Tool
An open source malware analysis tool
Lightweight Linux distro for penetration testing
A protocol agnostic application layer denial of service attack.
A free Password Generator written in Java