this tool helps a hacker to scan vulnerabilities.
Two-factor authentication system
Authentication, Access Control, and Single Sign-On
A push-button wireless hacking and Man-in-the-Middle attack toolkit
Linux Exploit Suggester; based on operating system release number
Perl implementation of a SCAP benchmark tool
GHDB
The Identity Manager provides a solution to manage the user life cycle
JCRYPT - JMasters Encryption/Decryption Service
An extensible pki based enterprise password utility
Free Web Application Firewall
A forensic file identification tool using neural networks
Manage your Snort rules with N.S.M.
Encrypt Your Text documents with XOR encryption
Testing for XSS via IPTC metadata
Implementation of the protocols PACE, Terminal and Chip Authentication
Python Based Brute Force Password Cracking Assistant By Clownsec
Ciphermail email encryption gateway (S/MIME, OpenPGP, PDF encryption)
software cryptographic data protection