Kernel privilege escalation vulnerability collection
Orchestrate end-to-end encryption, mutual authentication
Password toolbox that supports national secret
Anti-Spam SMTP Proxy Server implements multiple spam filters
A secure socks5 proxy for Windows
Face Mask Detection system based on computer vision and deep learning
A library for blocking access to network on-the-fly
A library for secure deleting data on-the-fly
A library for hiding the local IP address from applications.
A Git-driven task runner built to facilitate GitOps and Infrastructure
Security, Development and Privacy Defense, all in one place.
Linux for Penetration testing and Programming
CIntruder - OCR Bruteforcing Toolkit
Whonix is an Anonymous Operating System.
Another C++ Hack
Open Source Implementation of KMIP 1.0 in Java
a deliberately vulnerable Web application
Generates using (OUI) Verified MAC Addresses
Protect your personal data with SafePassDB.
ISC lets you encrypt & decrypt text and files of any type up to 4GB
Manage your Snort rules with N.S.M.
Password protected zip file cracker.
Linux Security Distro for Data Forensics, Pen. Testing, and IR.