Shows how easy it would be to gain unauthorized access to a system
The pattern matching swiss knife for malware researchers
Extremely fast non-cryptographic hash algorithm
World's fastest and most advanced password recovery utility
Distro Penetrasing Live System Burn to USB Flash Disk & Run.
edit and replay captured network traffic
Implementation of GlobalPlatform smart card specification
The PE file analysis toolkit
cross-platform, encryption application
Web Gateway Appliance
Powerful webdav client and sync tools with client-side AES encryption
SHA-256 Algorithm Implementation in C
Fine-grained authorizations and single sign-on for SSH remote commands
Fast Wipe
Secure wiping/shredding of free disk space with many methods
Bringing intranet on the internet with Zero-Config Mesh VPNS.
Tranalyzer flow generator packet analyzer moved to: tranalyzer.com
52 Hash Functions In One Program, plus each with HMAC or KMAC