C2/post-exploitation framework
create useful statistics and traffic on your site
Lightweight, high-performance, powerful intranet penetration proxy
Leak git repositories from misconfigured websites
The box to keep the Internet under your control
Control your Network by Disconnect/Connected Devices from your router
Phishing Campaign Toolkit
Veronica Security Suite
Latency and Fault Tolerance for Distributed Systems
SIA receiver for Galaxy security control panels.
Nash Operating System for Modern Ecommerce
Control which folders programs can be run from.
FIDO strong authentication, encryption, digital signature engine
An OrBAC policy editor
Hot directory
Manage PERCo locks
Encrypt youre images on a pixel level
Provides control of Various Functions with pasword protected interface
A Java library for Attribute-based Access Control Policies
inserts backdoor into windows
LOIC SLOW NOW WITH IRC CONTROL
LOIC-0 Now with IRC control