Distributed Denial of Service Attack Simulator
STROBE cryptographic protocol framework
Strong Folder/File hider for your windows using AES Encryption.
Vulnerable Pentesting Lab Environment
SSH man-in-the-middle tool
Command Line File Encrypter / Decrypter, Using AES256-CBC Cryptography
A command-line utility for calculating and verifying file checksums.
Fastest way to make secure text.
Sending encrypted data through internet web applications.
BWST is a short word for Brute-force Word-list Segmentation Technique.
Version one of ICRON's Basic Keylogger
Vigenere brute force / dictionary cracking tool
Monitor Activity on your Computer by Auto Screenshot Capture
WikiwordS crafts wordlists from Wikipedia articles