A pretty sweet vulnerability scanner
Full-featured enterprise network management tool
A transparent and secure way to look up public keys
Crypt encryption and decryption is based on ASCII Table Shift.
Full featured script to visualize statistics from a Kippo SSH honeypot
Network Intrusion Detection and Full Packet Capture System
Full featured script to visualize statistics from a honeyd honeypot.